Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2021-0129 (GCVE-0-2021-0129)
Vulnerability from cvelistv5
- information disclosure
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-03T15:32:09.439Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00517.html"
},
{
"name": "[debian-lts-announce] 20210623 [SECURITY] [DLA 2689-1] linux security update",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "https://lists.debian.org/debian-lts-announce/2021/06/msg00020.html"
},
{
"name": "[debian-lts-announce] 20210623 [SECURITY] [DLA 2690-1] linux-4.19 security update",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "https://lists.debian.org/debian-lts-announce/2021/06/msg00019.html"
},
{
"name": "[debian-lts-announce] 20210626 [SECURITY] [DLA 2692-1] bluez security update",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "https://lists.debian.org/debian-lts-announce/2021/06/msg00022.html"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://security.netapp.com/advisory/ntap-20210716-0002/"
},
{
"name": "DSA-4951",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN",
"x_transferred"
],
"url": "https://www.debian.org/security/2021/dsa-4951"
},
{
"name": "GLSA-202209-16",
"tags": [
"vendor-advisory",
"x_refsource_GENTOO",
"x_transferred"
],
"url": "https://security.gentoo.org/glsa/202209-16"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "BlueZ",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "See references"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Improper access control in BlueZ may allow an authenticated user to potentially enable information disclosure via adjacent access."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "information disclosure",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2022-09-29T16:07:23",
"orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
"shortName": "intel"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00517.html"
},
{
"name": "[debian-lts-announce] 20210623 [SECURITY] [DLA 2689-1] linux security update",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "https://lists.debian.org/debian-lts-announce/2021/06/msg00020.html"
},
{
"name": "[debian-lts-announce] 20210623 [SECURITY] [DLA 2690-1] linux-4.19 security update",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "https://lists.debian.org/debian-lts-announce/2021/06/msg00019.html"
},
{
"name": "[debian-lts-announce] 20210626 [SECURITY] [DLA 2692-1] bluez security update",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "https://lists.debian.org/debian-lts-announce/2021/06/msg00022.html"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://security.netapp.com/advisory/ntap-20210716-0002/"
},
{
"name": "DSA-4951",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN"
],
"url": "https://www.debian.org/security/2021/dsa-4951"
},
{
"name": "GLSA-202209-16",
"tags": [
"vendor-advisory",
"x_refsource_GENTOO"
],
"url": "https://security.gentoo.org/glsa/202209-16"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "secure@intel.com",
"ID": "CVE-2021-0129",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "BlueZ",
"version": {
"version_data": [
{
"version_value": "See references"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Improper access control in BlueZ may allow an authenticated user to potentially enable information disclosure via adjacent access."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "information disclosure"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00517.html",
"refsource": "MISC",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00517.html"
},
{
"name": "[debian-lts-announce] 20210623 [SECURITY] [DLA 2689-1] linux security update",
"refsource": "MLIST",
"url": "https://lists.debian.org/debian-lts-announce/2021/06/msg00020.html"
},
{
"name": "[debian-lts-announce] 20210623 [SECURITY] [DLA 2690-1] linux-4.19 security update",
"refsource": "MLIST",
"url": "https://lists.debian.org/debian-lts-announce/2021/06/msg00019.html"
},
{
"name": "[debian-lts-announce] 20210626 [SECURITY] [DLA 2692-1] bluez security update",
"refsource": "MLIST",
"url": "https://lists.debian.org/debian-lts-announce/2021/06/msg00022.html"
},
{
"name": "https://security.netapp.com/advisory/ntap-20210716-0002/",
"refsource": "CONFIRM",
"url": "https://security.netapp.com/advisory/ntap-20210716-0002/"
},
{
"name": "DSA-4951",
"refsource": "DEBIAN",
"url": "https://www.debian.org/security/2021/dsa-4951"
},
{
"name": "GLSA-202209-16",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/202209-16"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
"assignerShortName": "intel",
"cveId": "CVE-2021-0129",
"datePublished": "2021-06-09T19:50:59",
"dateReserved": "2020-10-22T00:00:00",
"dateUpdated": "2024-08-03T15:32:09.439Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"nvd": "{\"cve\":{\"id\":\"CVE-2021-0129\",\"sourceIdentifier\":\"secure@intel.com\",\"published\":\"2021-06-09T20:15:08.830\",\"lastModified\":\"2024-11-21T05:42:01.513\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Improper access control in BlueZ may allow an authenticated user to potentially enable information disclosure via adjacent access.\"},{\"lang\":\"es\",\"value\":\"Un control de acceso inapropiado en BlueZ puede permitir a un usuario autenticado permitir potencialmente una divulgaci\u00f3n de informaci\u00f3n por medio de un acceso adyacente\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N\",\"baseScore\":5.7,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"ADJACENT_NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":2.1,\"impactScore\":3.6}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:A/AC:L/Au:S/C:P/I:N/A:N\",\"baseScore\":2.7,\"accessVector\":\"ADJACENT_NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"SINGLE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"baseSeverity\":\"LOW\",\"exploitabilityScore\":5.1,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-Other\"}]}],\"configurations\":[{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:bluez:bluez:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"5.57\",\"matchCriteriaId\":\"EB5A8356-8D54-48BF-BB7C-399E792B08F6\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"2.6.12\",\"versionEndExcluding\":\"4.4.270\",\"matchCriteriaId\":\"A2E6872F-0224-4926-998D-21C18423039C\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.9\",\"versionEndExcluding\":\"4.9.270\",\"matchCriteriaId\":\"37CBDA9D-1990-4FE7-BBAE-74295AF17599\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.14\",\"versionEndExcluding\":\"4.14.234\",\"matchCriteriaId\":\"74E79EFE-C6F5-4D33-9025-36CC6916EF0A\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.19\",\"versionEndExcluding\":\"4.19.192\",\"matchCriteriaId\":\"44029CEE-959D-499F-8913-FED343DA6B65\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"5.4\",\"versionEndExcluding\":\"5.4.122\",\"matchCriteriaId\":\"C3787113-B7B0-4615-85C5-DDAAE38C1F46\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"5.10\",\"versionEndExcluding\":\"5.10.40\",\"matchCriteriaId\":\"FAEFD181-62CD-41CD-BFE5-7BC337ADE1CA\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"5.12\",\"versionEndExcluding\":\"5.12.7\",\"matchCriteriaId\":\"13460FFE-8AA9-4F1C-963C-30982D8858D1\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:5.13:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"0CBAD0FC-C281-4666-AB2F-F8E6E1165DF7\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"142AD0DD-4CF3-4D74-9442-459CE3347E3A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F4CFF558-3C47-480D-A2F0-BABF26042943\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DEECE5FC-CACF-4496-A3E7-164736409252\"}]}]}],\"references\":[{\"url\":\"https://lists.debian.org/debian-lts-announce/2021/06/msg00019.html\",\"source\":\"secure@intel.com\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2021/06/msg00020.html\",\"source\":\"secure@intel.com\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2021/06/msg00022.html\",\"source\":\"secure@intel.com\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://security.gentoo.org/glsa/202209-16\",\"source\":\"secure@intel.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://security.netapp.com/advisory/ntap-20210716-0002/\",\"source\":\"secure@intel.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.debian.org/security/2021/dsa-4951\",\"source\":\"secure@intel.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00517.html\",\"source\":\"secure@intel.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2021/06/msg00019.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2021/06/msg00020.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2021/06/msg00022.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://security.gentoo.org/glsa/202209-16\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://security.netapp.com/advisory/ntap-20210716-0002/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.debian.org/security/2021/dsa-4951\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00517.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]}]}}"
}
}
opensuse-su-2021:2202-1
Vulnerability from csaf_opensuse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel",
"title": "Title of the patch"
},
{
"category": "description",
"text": "The SUSE Linux Enterprise 15 SP3 azure kernel was updated to receive various security and bugfixes.\n\n\nThe following security bugs were fixed:\n\n- CVE-2020-26558: Bluetooth LE and BR/EDR secure pairing in Bluetooth Core Specification 2.1 may permit a nearby man-in-the-middle attacker to identify the Passkey used during pairing by reflection of the public key and the authentication evidence of the initiating device, potentially permitting this attacker to complete authenticated pairing with the responding device using the correct Passkey for the pairing session. (bnc#1179610 bnc#1186463)\n- CVE-2021-0129: Improper access control in BlueZ may have allowed an authenticated user to potentially enable information disclosure via adjacent access (bnc#1186463).\n- CVE-2020-36385: Fixed a use-after-free in drivers/infiniband/core/ucma.c which could be triggered if the ctx is reached via the ctx_list in some ucma_migrate_id situations where ucma_close is called (bnc#1187050).\n- CVE-2020-36386: Fixed a slab out-of-bounds read in hci_extended_inquiry_result_evt (bnc#1187038).\n\nThe following non-security bugs were fixed:\n\n- ACPICA: Clean up context mutex during object deletion (git-fixes).\n- ALSA: hda/cirrus: Set Initial DMIC volume to -26 dB (git-fixes).\n- ALSA: hda/realtek: fix mute/micmute LEDs and speaker for HP Elite Dragonfly G2 (git-fixes).\n- ALSA: hda/realtek: fix mute/micmute LEDs and speaker for HP EliteBook x360 1040 G8 (git-fixes).\n- ALSA: hda/realtek: fix mute/micmute LEDs for HP EliteBook 840 Aero G8 (git-fixes).\n- ALSA: hda/realtek: fix mute/micmute LEDs for HP ZBook Power G8 (git-fixes).\n- ALSA: hda/realtek: headphone and mic do not work on an Acer laptop (git-fixes).\n- ALSA: hda: Fix for mute key LED for HP Pavilion 15-CK0xx (git-fixes).\n- ALSA: hda: Fix for mute key LED for HP Pavilion 15-CK0xx (git-fixes).\n- ALSA: hda: update the power_state during the direct-complete (git-fixes).\n- ALSA: seq: Fix race of snd_seq_timer_open() (git-fixes).\n- ALSA: timer: Fix master timer notification (git-fixes).\n- ASoC: Intel: soc-acpi: remove TGL RVP mixed SoundWire/TDM config (git-fixes).\n- ASoC: amd: fix for pcm_read() error (git-fixes).\n- ASoC: cs43130: handle errors in cs43130_probe() properly (git-fixes).\n- ASoC: max98088: fix ni clock divider calculation (git-fixes).\n- Bluetooth: fix the erroneous flush_work() order (git-fixes).\n- Enable CONFIG_PCI_PF_STUB for Nvidia Ampere vGPU support (jsc#SLE-17882 jsc#ECO-3691)\n- HID: i2c-hid: Skip ELAN power-on command after reset (git-fixes).\n- HID: i2c-hid: fix format string mismatch (git-fixes).\n- HID: magicmouse: fix NULL-deref on disconnect (git-fixes).\n- HID: multitouch: require Finger field to mark Win8 reports as MT (git-fixes).\n- HID: pidff: fix error return code in hid_pidff_init() (git-fixes).\n- NFC: SUSE specific brutal fix for runtime PM (bsc#1185589).\n- NFS: Deal correctly with attribute generation counter overflow (git-fixes).\n- NFS: Do not corrupt the value of pg_bytes_written in nfs_do_recoalesce() (git-fixes).\n- NFS: Do not discard pNFS layout segments that are marked for return (git-fixes).\n- NFS: Do not gratuitously clear the inode cache when lookup failed (git-fixes).\n- NFS: Do not revalidate the directory permissions on a lookup failure (git-fixes).\n- NFS: Fix an Oopsable condition in __nfs_pageio_add_request() (git-fixes).\n- NFS: fix an incorrect limit in filelayout_decode_layout() (git-fixes).\n- NFSD: Repair misuse of sv_lock in 5.10.16-rt30 (git-fixes).\n- NFSv4.2 fix handling of sr_eof in SEEK\u0027s reply (git-fixes).\n- NFSv4.2: Always flush out writes in nfs42_proc_fallocate() (git-fixes).\n- NFSv4.2: fix return value of _nfs4_get_security_label() (git-fixes).\n- NFSv42: Copy offload should update the file size when appropriate (git-fixes).\n- NFSv4: Do not discard segments marked for return in _pnfs_return_layout() (git-fixes).\n- NFSv4: Fix a NULL pointer dereference in pnfs_mark_matching_lsegs_return() (git-fixes).\n- NFSv4: Fix v4.0/v4.1 SEEK_DATA return -ENOTSUPP when set NFS_V4_2 config (git-fixes).\n- PCI/LINK: Remove bandwidth notification (bsc#1183712).\n- PM: sleep: Add pm_debug_messages kernel command line option (bsc#1186752).\n- SUNRPC: Move fault injection call sites (git-fixes).\n- SUNRPC: Set memalloc_nofs_save() for sync tasks (git-fixes).\n- UCSI fixup of array of PDOs (git-fixes).\n- USB: f_ncm: ncm_bitrate (speed) is unsigned (git-fixes).\n- USB: serial: cp210x: fix alternate function for CP2102N QFN20 (git-fixes).\n- USB: serial: ftdi_sio: add IDs for IDS GmbH Products (git-fixes).\n- USB: serial: option: add Telit LE910-S1 compositions 0x7010, 0x7011 (git-fixes).\n- USB: serial: pl2303: add device id for ADLINK ND-6530 GC (git-fixes).\n- USB: serial: quatech2: fix control-request directions (git-fixes).\n- USB: serial: ti_usb_3410_5052: add startech.com device id (git-fixes).\n- USB: usbfs: Do not WARN about excessively large memory allocations (git-fixes).\n- ath6kl: return error code in ath6kl_wmi_set_roam_lrssi_cmd() (git-fixes).\n- bcache: Convert to DEFINE_SHOW_ATTRIBUTE (bsc#1187357).\n- bcache: Use 64-bit arithmetic instead of 32-bit (bsc#1187357).\n- bcache: avoid oversized read request in cache missing code path (bsc#1187357, bsc#1185570, bsc#1184631).\n- bcache: do not pass BIOSET_NEED_BVECS for the \u0027bio_set\u0027 embedded in \u0027cache_set\u0027 (bsc#1187357).\n- bcache: fix a regression of code compiling failure in debug.c (bsc#1187357).\n- bcache: inherit the optimal I/O size (bsc#1187357).\n- bcache: reduce redundant code in bch_cached_dev_run() (bsc#1187357).\n- bcache: remove PTR_CACHE (bsc#1187357).\n- bcache: remove bcache device self-defined readahead (bsc#1187357, bsc#1185570, bsc#1184631).\n- bcache: use NULL instead of using plain integer as pointer (bsc#1187357).\n- blk-settings: align max_sectors on \u0027logical_block_size\u0027 boundary (bsc#1185195).\n- block: return the correct bvec when checking for gaps (bsc#1187143).\n- block: return the correct bvec when checking for gaps (bsc#1187144).\n- brcmfmac: Add clm_blob firmware files to modinfo (bsc#1186677).\n- brcmfmac: properly check for bus register errors (git-fixes).\n- btrfs: open device without device_list_mutex (bsc#1176771).\n- bus: ti-sysc: Fix flakey idling of uarts and stop using swsup_sidle_act (git-fixes).\n- char: hpet: add checks after calling ioremap (git-fixes).\n- chelsio/chtls: unlock on error in chtls_pt_recvmsg() (jsc#SLE-15129).\n- cxgb4/ch_ktls: Clear resources when pf4 device is removed (jsc#SLE-15129).\n- cxgb4: avoid accessing registers when clearing filters (git-fixes).\n- cxgb4: avoid link re-train during TC-MQPRIO configuration (jsc#SLE-8389).\n- cxgb4: fix regression with HASH tc prio value update (jsc#SLE-15131).\n- devlink: Correct VIRTUAL port to not have phys_port attributes (jsc#SLE-15172).\n- dmaengine: idxd: Use cpu_feature_enabled() (git-fixes).\n- dmaengine: idxd: add missing dsa driver unregister (git-fixes).\n- dmaengine: qcom_hidma: comment platform_driver_register call (git-fixes).\n- drm/amd/amdgpu: fix a potential deadlock in gpu reset (git-fixes).\n- drm/amd/amdgpu: fix refcount leak (git-fixes).\n- drm/amd/display: Disconnect non-DP with no EDID (git-fixes).\n- drm/amd/display: Disconnect non-DP with no EDID (git-fixes).\n- drm/amdgpu/jpeg2.0: add cancel_delayed_work_sync before power gate (git-fixes).\n- drm/amdgpu/jpeg2.5: add cancel_delayed_work_sync before power gate (git-fixes).\n- drm/amdgpu/jpeg3: add cancel_delayed_work_sync before power gate (git-fixes).\n- drm/amdgpu/vcn1: add cancel_delayed_work_sync before power gate (git-fixes).\n- drm/amdgpu/vcn2.0: add cancel_delayed_work_sync before power gate (git-fixes).\n- drm/amdgpu/vcn2.5: add cancel_delayed_work_sync before power gate (git-fixes).\n- drm/amdgpu/vcn3: add cancel_delayed_work_sync before power gate (git-fixes).\n- drm/amdgpu: Do not query CE and UE errors (git-fixes).\n- drm/amdgpu: Fix a use-after-free (git-fixes).\n- drm/amdgpu: make sure we unpin the UVD BO (git-fixes).\n- drm/amdgpu: stop touching sched.ready in the backend (git-fixes).\n- drm/amdkfd: correct sienna_cichlid SDMA RLC register offset error (git-fixes).\n- drm/i915/selftests: Fix return value check in live_breadcrumbs_smoketest() (git-fixes).\n- drm/mcde: Fix off by 10^3 in calculation (git-fixes).\n- drm/msm/a6xx: fix incorrectly set uavflagprd_inv field for A650 (git-fixes).\n- drm/msm/a6xx: update/fix CP_PROTECT initialization (git-fixes).\n- efi/libstub: prevent read overflow in find_file_option() (git-fixes).\n- efi: Allow EFI_MEMORY_XP and EFI_MEMORY_RO both to be cleared (git-fixes).\n- efi: cper: fix snprintf() use in cper_dimm_err_location() (git-fixes).\n- fs/nfs: Use fatal_signal_pending instead of signal_pending (git-fixes).\n- gpio: cadence: Add missing MODULE_DEVICE_TABLE (git-fixes).\n- gpio: wcd934x: Fix shift-out-of-bounds error (git-fixes).\n- gve: Add NULL pointer checks when freeing irqs (git-fixes).\n- gve: Correct SKB queue index validation (git-fixes).\n- gve: Update mgmt_msix_idx if num_ntfy changes (git-fixes).\n- gve: Upgrade memory barrier in poll routine (git-fixes).\n- hwmon: (dell-smm-hwmon) Fix index values (git-fixes).\n- i2c: imx: fix reference leak when pm_runtime_get_sync fails (git-fixes).\n- i2c: qcom-geni: Suspend and resume the bus during SYSTEM_SLEEP_PM ops (git-fixes).\n- ice: Allow all LLDP packets from PF to Tx (jsc#SLE-7926).\n- ice: Fix VFR issues for AVF drivers that expect ATQLEN cleared (git-fixes).\n- ice: Fix allowing VF to request more/less queues via virtchnl (jsc#SLE-12878).\n- ice: handle the VF VSI rebuild failure (jsc#SLE-12878).\n- iommu/amd: Keep track of amd_iommu_irq_remap state (https://bugzilla.kernel.org/show_bug.cgi?id=212133).\n- iommu/virtio: Add missing MODULE_DEVICE_TABLE (bsc#1187345).\n- iommu/vt-d: Remove WO permissions on second-level paging entries (bsc#1187346).\n- iommu/vt-d: Report right snoop capability when using FL for IOVA (bsc#1187347).\n- iommu/vt-d: Use user privilege for RID2PASID translation (bsc#1187348).\n- iommu: Fix a boundary issue to avoid performance drop (bsc#1187344).\n- isdn: mISDN: correctly handle ph_info allocation failure in hfcsusb_ph_info (git-fixes).\n- isdn: mISDNinfineon: check/cleanup ioremap failure correctly in setup_io (git-fixes).\n- ixgbe: fix large MTU request from VF (git-fixes).\n- kABI workaround for rtw88 (git-fixes).\n- kABI workaround for struct lis3lv02d change (git-fixes).\n- lib: crc64: fix kernel-doc warning (bsc#1187357).\n- libertas: register sysfs groups properly (git-fixes).\n- locking/mutex: clear MUTEX_FLAGS if wait_list is empty due to signal (git-fixes).\n- md: Fix missing unused status line of /proc/mdstat (git-fixes).\n- md: bcache: Trivial typo fixes in the file journal.c (bsc#1187357).\n- md: bcache: avoid -Wempty-body warnings (bsc#1187357).\n- media: dvb: Add check on sp8870_readreg return (git-fixes).\n- media: dvb: Add check on sp8870_readreg return (git-fixes).\n- media: gspca: mt9m111: Check write_bridge for timeout (git-fixes).\n- media: gspca: mt9m111: Check write_bridge for timeout (git-fixes).\n- media: gspca: properly check for errors in po1030_probe() (git-fixes).\n- media: gspca: properly check for errors in po1030_probe() (git-fixes).\n- mei: request autosuspend after sending rx flow control (git-fixes).\n- mmc: sdhci: Clear unused bounce buffer at DMA mmap error path (bsc#1187039).\n- net/mlx4: Fix EEPROM dump support (git-fixes).\n- net/mlx5: DR, Create multi-destination flow table with level less than 64 (jsc#SLE-8464).\n- net/mlx5: Set reformat action when needed for termination rules (jsc#SLE-15172).\n- net/mlx5: Set term table as an unmanaged flow table (jsc#SLE-15172).\n- net/mlx5e: Fix error path of updating netdev queues (jsc#SLE-15172).\n- net/mlx5e: Fix incompatible casting (jsc#SLE-15172).\n- net/mlx5e: Fix multipath lag activation (git-fixes).\n- net/mlx5e: Fix null deref accessing lag dev (jsc#SLE-15172).\n- net/mlx5e: Fix nullptr in add_vlan_push_action() (git-fixes).\n- net/mlx5e: reset XPS on error flow if netdev isn\u0027t registered yet (jsc#SLE-15172).\n- net/sched: act_ct: Offload connections with commit action (jsc#SLE-15172).\n- net/sched: fq_pie: fix OOB access in the traffic path (jsc#SLE-15172).\n- net/sched: fq_pie: re-factor fix for fq_pie endless loop (jsc#SLE-15172).\n- net: bnx2: Fix error return code in bnx2_init_board() (git-fixes).\n- net: fix iteration for sctp transport seq_files (git-fixes).\n- net: hns3: Limiting the scope of vector_ring_chain variable (git-fixes).\n- net: hns3: fix incorrect resp_msg issue (jsc#SLE-14777).\n- net: hns3: put off calling register_netdev() until client initialize complete (bsc#1154353).\n- net: zero-initialize tc skb extension on allocation (bsc#1176447).\n- netfilter: nf_tables: missing error reporting for not selected expressions (bsc#1176447).\n- netfilter: nft_set_pipapo_avx2: Add irq_fpu_usable() check, fallback to non-AVX2 version (bsc#1176447).\n- nfc: fix NULL ptr dereference in llcp_sock_getname() after failed connect (git-fixes).\n- nfsd: register pernet ops last, unregister first (git-fixes).\n- nvme-multipath: fix double initialization of ANA state (bsc#1178612, bsc#1184259, bsc#1186155).\n- nvme: add new line after variable declatation (bsc#1184259, bsc#1178612, bsc#1186155).\n- nvme: do not check nvme_req flags for new req (bsc#1184259, bsc#1178612, bsc#1186155).\n- nvme: mark nvme_setup_passsthru() inline (bsc#1184259, bsc#1178612, bsc#1186155).\n- nvme: reduce checks for zero command effects (bsc#1184259, bsc#1178612, bsc#1186155).\n- nvme: rename nvme_init_identify() (bsc#1184259, bsc#1178612, bsc#1186155).\n- nvme: split init identify into helper (bsc#1184259, bsc#1178612, bsc#1186155).\n- nvme: use NVME_CTRL_CMIC_ANA macro (bsc#1184259, bsc#1178612, bsc#1186155).\n- nvmet: use new ana_log_size instead the old one (bsc#1178612, bsc#1184259, bsc#1186155).\n- pNFS/NFSv4: Fix a layout segment leak in pnfs_layout_process() (git-fixes).\n- pNFS/flexfiles: fix incorrect size check in decode_nfs_fh() (git-fixes).\n- pid: take a reference when initializing `cad_pid` (bsc#1152489).\n- platform/x86: hp-wireless: add AMD\u0027s hardware id to the supported list (git-fixes).\n- platform/x86: hp_accel: Avoid invoking _INI to speed up resume (git-fixes).\n- platform/x86: intel_punit_ipc: Append MODULE_DEVICE_TABLE for ACPI (git-fixes).\n- platform/x86: touchscreen_dmi: Add info for the Mediacom Winpad 7.0 W700 tablet (git-fixes).\n- powerpc/32: Fix boot failure with CONFIG_STACKPROTECTOR (jsc#SLE-13847 git-fixes).\n- powerpc/kprobes: Fix validation of prefixed instructions across page boundary (jsc#SLE-13847 git-fixes).\n- regulator: core: resolve supply for boot-on/always-on regulators (git-fixes).\n- regulator: max77620: Use device_set_of_node_from_dev() (git-fixes).\n- rtw88: 8822c: add LC calibration for RTL8822C (git-fixes).\n- scsi: aacraid: Fix an oops in error handling (bsc#1187072).\n- scsi: aacraid: Remove erroneous fallthrough annotation (bsc#1186950).\n- scsi: aacraid: Use memdup_user() as a cleanup (bsc#1186951).\n- scsi: acornscsi: Fix an error handling path in acornscsi_probe() (bsc#1186952).\n- scsi: be2iscsi: Fix a theoretical leak in beiscsi_create_eqs() (bsc#1186953).\n- scsi: be2iscsi: Revert \u0027Fix a theoretical leak in beiscsi_create_eqs()\u0027 (bsc#1187067).\n- scsi: bfa: Fix error return in bfad_pci_init() (bsc#1186954).\n- scsi: bnx2fc: Fix Kconfig warning \u0026 CNIC build errors (bsc#1186955).\n- scsi: bnx2i: Requires MMU (bsc#1186956).\n- scsi: csiostor: Fix wrong return value in csio_hw_prep_fw() (bsc#1186957).\n- scsi: cumana_2: Fix different dev_id between request_irq() and free_irq() (bsc#1186958).\n- scsi: cxgb3i: Fix some leaks in init_act_open() (bsc#1186959).\n- scsi: cxgb4i: Fix TLS dependency (bsc#1186960).\n- scsi: eesox: Fix different dev_id between request_irq() and free_irq() (bsc#1186961).\n- scsi: fnic: Fix error return code in fnic_probe() (bsc#1186962).\n- scsi: hisi_sas: Fix IRQ checks (bsc#1186963).\n- scsi: hisi_sas: Remove preemptible() (bsc#1186964).\n- scsi: jazz_esp: Add IRQ check (bsc#1186965).\n- scsi: libfc: Fix enum-conversion warning (bsc#1186966).\n- scsi: libsas: Fix error path in sas_notify_lldd_dev_found() (bsc#1186967).\n- scsi: libsas: Reset num_scatter if libata marks qc as NODATA (bsc#1187068).\n- scsi: libsas: Set data_dir as DMA_NONE if libata marks qc as NODATA (bsc#1186968).\n- scsi: lpfc: Fix ancient double free (bsc#1186969).\n- scsi: lpfc: Fix failure to transmit ABTS on FC link (git-fixes).\n- scsi: megaraid_sas: Check user-provided offsets (bsc#1186970).\n- scsi: megaraid_sas: Clear affinity hint (bsc#1186971).\n- scsi: megaraid_sas: Do not call disable_irq from process IRQ poll (bsc#1186972).\n- scsi: megaraid_sas: Fix MEGASAS_IOC_FIRMWARE regression (bsc#1186973).\n- scsi: megaraid_sas: Remove undefined ENABLE_IRQ_POLL macro (bsc#1186974).\n- scsi: mesh: Fix panic after host or bus reset (bsc#1186976).\n- scsi: mpt3sas: Do not use GFP_KERNEL in atomic context (bsc#1186977).\n- scsi: mpt3sas: Fix error return code of mpt3sas_base_attach() (bsc#1186978).\n- scsi: mpt3sas: Fix ioctl timeout (bsc#1186979).\n- scsi: myrs: Fix a double free in myrs_cleanup() (bsc#1186980).\n- scsi: pm80xx: Fix error return in pm8001_pci_probe() (bsc#1186981).\n- scsi: powertec: Fix different dev_id between request_irq() and free_irq() (bsc#1186982).\n- scsi: qedi: Check for buffer overflow in qedi_set_path() (bsc#1186983).\n- scsi: qedi: Fix error return code of qedi_alloc_global_queues() (bsc#1186984).\n- scsi: qedi: Fix missing destroy_workqueue() on error in __qedi_probe (bsc#1186985).\n- scsi: qla2xxx: Prevent PRLI in target mode (git-fixes).\n- scsi: qla4xxx: Fix an error handling path in \u0027qla4xxx_get_host_stats()\u0027 (bsc#1186986).\n- scsi: qla4xxx: Remove in_interrupt() (bsc#1186987).\n- scsi: scsi_debug: Add check for sdebug_max_queue during module init (bsc#1186988).\n- scsi: scsi_dh_alua: Retry RTPG on a different path after failure (bsc#1174978 bsc#1185701).\n- scsi: sd: Fix Opal support (bsc#1186989).\n- scsi: smartpqi: Add additional logging for LUN resets (bsc#1186472).\n- scsi: smartpqi: Add host level stream detection enable (bsc#1186472).\n- scsi: smartpqi: Add new PCI IDs (bsc#1186472).\n- scsi: smartpqi: Add phy ID support for the physical drives (bsc#1186472).\n- scsi: smartpqi: Add stream detection (bsc#1186472).\n- scsi: smartpqi: Add support for BMIC sense feature cmd and feature bits (bsc#1186472).\n- scsi: smartpqi: Add support for RAID1 writes (bsc#1186472).\n- scsi: smartpqi: Add support for RAID5 and RAID6 writes (bsc#1186472).\n- scsi: smartpqi: Add support for long firmware version (bsc#1186472).\n- scsi: smartpqi: Add support for new product ids (bsc#1186472).\n- scsi: smartpqi: Add support for wwid (bsc#1186472).\n- scsi: smartpqi: Align code with oob driver (bsc#1186472).\n- scsi: smartpqi: Convert snprintf() to scnprintf() (bsc#1186472).\n- scsi: smartpqi: Correct request leakage during reset operations (bsc#1186472).\n- scsi: smartpqi: Correct system hangs when resuming from hibernation (bsc#1186472).\n- scsi: smartpqi: Disable WRITE SAME for HBA NVMe disks (bsc#1186472).\n- scsi: smartpqi: Fix blocks_per_row static checker issue (bsc#1186472).\n- scsi: smartpqi: Fix device pointer variable reference static checker issue (bsc#1186472).\n- scsi: smartpqi: Fix driver synchronization issues (bsc#1186472).\n- scsi: smartpqi: Refactor aio submission code (bsc#1186472).\n- scsi: smartpqi: Refactor scatterlist code (bsc#1186472).\n- scsi: smartpqi: Remove timeouts from internal cmds (bsc#1186472).\n- scsi: smartpqi: Remove unused functions (bsc#1186472).\n- scsi: smartpqi: Synchronize device resets with mutex (bsc#1186472).\n- scsi: smartpqi: Update OFA management (bsc#1186472).\n- scsi: smartpqi: Update RAID bypass handling (bsc#1186472).\n- scsi: smartpqi: Update SAS initiator_port_protocols and target_port_protocols (bsc#1186472).\n- scsi: smartpqi: Update device scan operations (bsc#1186472).\n- scsi: smartpqi: Update enclosure identifier in sysfs (bsc#1186472).\n- scsi: smartpqi: Update event handler (bsc#1186472).\n- scsi: smartpqi: Update soft reset management for OFA (bsc#1186472).\n- scsi: smartpqi: Update suspend/resume and shutdown (bsc#1186472).\n- scsi: smartpqi: Update version to 2.1.8-045 (bsc#1186472).\n- scsi: smartpqi: Use host-wide tag space (bsc#1186472).\n- scsi: sni_53c710: Add IRQ check (bsc#1186990).\n- scsi: sun3x_esp: Add IRQ check (bsc#1186991).\n- scsi: ufs-qcom: Fix scheduling while atomic issue (bsc#1187002).\n- scsi: ufs: Add quirk to disallow reset of interrupt aggregation (bsc#1186992).\n- scsi: ufs: Add quirk to enable host controller without hce (bsc#1186993).\n- scsi: ufs: Add quirk to fix abnormal ocs fatal error (bsc#1186994).\n- scsi: ufs: Add quirk to fix mishandling utrlclr/utmrlclr (bsc#1186995).\n- scsi: ufs: Do not update urgent bkops level when toggling auto bkops (bsc#1186997).\n- scsi: ufs: Fix race between shutdown and runtime resume flow (bsc#1186998).\n- scsi: ufs: Introduce UFSHCD_QUIRK_PRDT_BYTE_GRAN quirk (bsc#1187000).\n- scsi: ufs: Make ufshcd_print_trs() consider UFSHCD_QUIRK_PRDT_BYTE_GRAN (bsc#1187069).\n- scsi: ufs: Properly release resources if a task is aborted successfully (bsc#1187001).\n- scsi: ufs: core: Narrow down fast path in system suspend path (bsc#1186996).\n- scsi: ufs: ufshcd-pltfrm: Fix deferred probing (bsc#1187003).\n- scsi: ufshcd: use an enum for quirks (bsc#1186999).\n- serial: 8250_pci: handle FL_NOIRQ board flag (git-fixes).\n- serial: max310x: unregister uart driver in case of failure and abort (git-fixes).\n- serial: rp2: use \u0027request_firmware\u0027 instead of \u0027request_firmware_nowait\u0027 (git-fixes).\n- staging: rtl8723bs: Fix uninitialized variables (git-fixes).\n- sunrpc: fix refcount leak for rpc auth modules (git-fixes).\n- svcrdma: disable timeouts on rdma backchannel (git-fixes).\n- thermal/drivers/intel: Initialize RW trip to THERMAL_TEMP_INVALID (git-fixes).\n- thunderbolt: usb4: Fix NVM read buffer bounds and offset issue (git-fixes).\n- tpm: fix error return code in tpm2_get_cc_attrs_tbl() (git-fixes).\n- ttyprintk: Add TTY hangup callback (git-fixes).\n- usb: chipidea: imx: Fix Battery Charger 1.2 CDP detection (git-fixes).\n- usb: core: reduce power-on-good delay time of root hub (git-fixes).\n- usb: fix various gadgets null ptr deref on 10gbps cabling (git-fixes).\n- usb: musb: fix MUSB_QUIRK_B_DISCONNECT_99 handling (git-fixes).\n- usb: pd: Set PD_T_SINK_WAIT_CAP to 310ms (git-fixes).\n- usb: typec: intel_pmc_mux: Put fwnode in error case during -\u003eprobe() (git-fixes).\n- usb: typec: mux: Fix copy-paste mistake in typec_mux_match (git-fixes).\n- usb: typec: mux: Fix matching with typec_altmode_desc (git-fixes).\n- usb: typec: tcpm: Use LE to CPU conversion when accessing msg-\u003eheader (git-fixes).\n- usb: typec: ucsi: Clear PPM capability data in ucsi_init() error path (git-fixes).\n- usb: typec: ucsi: Retrieve all the PDOs instead of just the first 4 (git-fixes).\n- usb: typec: wcove: Use LE to CPU conversion when accessing msg-\u003eheader (git-fixes).\n- vfio/pci: Fix error return code in vfio_ecap_init() (git-fixes).\n- vfio/pci: zap_vma_ptes() needs MMU (git-fixes).\n- vfio/platform: fix module_put call in error flow (git-fixes).\n- vmlinux.lds.h: Avoid orphan section with !SMP (git-fixes).\n- vsock/vmci: log once the failed queue pair allocation (git-fixes).\n- wireguard: allowedips: initialize list head in selftest (git-fixes).\n- wireguard: do not use -O3 (git-fixes).\n- wireguard: peer: allocate in kmem_cache (git-fixes).\n- wireguard: peer: put frequently used members above cache lines (git-fixes).\n- wireguard: queueing: get rid of per-peer ring buffers (git-fixes).\n- wireguard: selftests: make sure rp_filter is disabled on vethc (git-fixes).\n- wireguard: selftests: remove old conntrack kconfig value (git-fixes).\n- wireguard: use synchronize_net rather than synchronize_rcu (git-fixes).\n- x86/apic: Mark _all_ legacy interrupts when IO/APIC is missing (bsc#1152489).\n- x86/boot/64: Explicitly map boot_params and command line (jsc#SLE-14337).\n- x86/boot/compressed/64: Add 32-bit boot #VC handler (jsc#SLE-14337).\n- x86/boot/compressed/64: Add CPUID sanity check to 32-bit boot-path (jsc#SLE-14337).\n- x86/boot/compressed/64: Check SEV encryption in 64-bit boot-path (jsc#SLE-14337).\n- x86/boot/compressed/64: Check SEV encryption in the 32-bit boot-path (jsc#SLE-14337).\n- x86/boot/compressed/64: Cleanup exception handling before booting kernel (jsc#SLE-14337).\n- x86/boot/compressed/64: Introduce sev_status (jsc#SLE-14337).\n- x86/boot/compressed/64: Reload CS in startup_32 (jsc#SLE-14337).\n- x86/boot/compressed/64: Sanity-check CPUID results in the early #VC handler (jsc#SLE-14337).\n- x86/boot/compressed/64: Setup IDT in startup_32 boot path (jsc#SLE-14337).\n- x86/cpufeatures: Force disable X86_FEATURE_ENQCMD and remove update_pasid() (bsc#1178134).\n- x86/fault: Do not send SIGSEGV twice on SEGV_PKUERR (bsc#1152489).\n- x86/fpu: Prevent state corruption in __fpu__restore_sig() (bsc#1178134).\n- x86/head/64: Check SEV encryption before switching to kernel page-table (jsc#SLE-14337).\n- x86/head/64: Disable stack protection for head$(BITS).o (jsc#SLE-14337).\n- x86/ioremap: Map efi_mem_reserve() memory as encrypted for SEV (bsc#1186885).\n- x86/sev-es: Do not return NULL from sev_es_get_ghcb() (bsc#1187349).\n- x86/sev-es: Do not support MMIO to/from encrypted memory (jsc#SLE-14337).\n- x86/sev-es: Forward page-faults which happen during emulation (bsc#1187350).\n- x86/sev-es: Replace open-coded hlt-loops with sev_es_terminate() (jsc#SLE-14337).\n- x86/sev-es: Use __put_user()/__get_user() for data accesses (bsc#1187351).\n- x86/sev: Check SME/SEV support in CPUID first (jsc#SLE-14337).\n- x86/sev: Do not require Hypervisor CPUID bit for SEV guests (jsc#SLE-14337).\n- x86: fix seq_file iteration for pat.c (git-fixes).\n- xfrm: policy: Read seqcount outside of rcu-read side in xfrm_policy_lookup_bytype (bsc#1185675).\n- xprtrdma: Avoid Receive Queue wrapping (git-fixes).\n- xprtrdma: rpcrdma_mr_pop() already does list_del_init() (git-fixes).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-SLE-15.3-2021-2202",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2021_2202-1.json"
},
{
"category": "self",
"summary": "URL for openSUSE-SU-2021:2202-1",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/T4PWFRJWECGAGZTBIOYHZ6KUMSA6KC43/"
},
{
"category": "self",
"summary": "E-Mail link for openSUSE-SU-2021:2202-1",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/T4PWFRJWECGAGZTBIOYHZ6KUMSA6KC43/"
},
{
"category": "self",
"summary": "SUSE Bug 1152489",
"url": "https://bugzilla.suse.com/1152489"
},
{
"category": "self",
"summary": "SUSE Bug 1154353",
"url": "https://bugzilla.suse.com/1154353"
},
{
"category": "self",
"summary": "SUSE Bug 1174978",
"url": "https://bugzilla.suse.com/1174978"
},
{
"category": "self",
"summary": "SUSE Bug 1176447",
"url": "https://bugzilla.suse.com/1176447"
},
{
"category": "self",
"summary": "SUSE Bug 1176771",
"url": "https://bugzilla.suse.com/1176771"
},
{
"category": "self",
"summary": "SUSE Bug 1178134",
"url": "https://bugzilla.suse.com/1178134"
},
{
"category": "self",
"summary": "SUSE Bug 1178612",
"url": "https://bugzilla.suse.com/1178612"
},
{
"category": "self",
"summary": "SUSE Bug 1179610",
"url": "https://bugzilla.suse.com/1179610"
},
{
"category": "self",
"summary": "SUSE Bug 1183712",
"url": "https://bugzilla.suse.com/1183712"
},
{
"category": "self",
"summary": "SUSE Bug 1184259",
"url": "https://bugzilla.suse.com/1184259"
},
{
"category": "self",
"summary": "SUSE Bug 1184436",
"url": "https://bugzilla.suse.com/1184436"
},
{
"category": "self",
"summary": "SUSE Bug 1184631",
"url": "https://bugzilla.suse.com/1184631"
},
{
"category": "self",
"summary": "SUSE Bug 1185195",
"url": "https://bugzilla.suse.com/1185195"
},
{
"category": "self",
"summary": "SUSE Bug 1185570",
"url": "https://bugzilla.suse.com/1185570"
},
{
"category": "self",
"summary": "SUSE Bug 1185589",
"url": "https://bugzilla.suse.com/1185589"
},
{
"category": "self",
"summary": "SUSE Bug 1185675",
"url": "https://bugzilla.suse.com/1185675"
},
{
"category": "self",
"summary": "SUSE Bug 1185701",
"url": "https://bugzilla.suse.com/1185701"
},
{
"category": "self",
"summary": "SUSE Bug 1186155",
"url": "https://bugzilla.suse.com/1186155"
},
{
"category": "self",
"summary": "SUSE Bug 1186286",
"url": "https://bugzilla.suse.com/1186286"
},
{
"category": "self",
"summary": "SUSE Bug 1186463",
"url": "https://bugzilla.suse.com/1186463"
},
{
"category": "self",
"summary": "SUSE Bug 1186472",
"url": "https://bugzilla.suse.com/1186472"
},
{
"category": "self",
"summary": "SUSE Bug 1186672",
"url": "https://bugzilla.suse.com/1186672"
},
{
"category": "self",
"summary": "SUSE Bug 1186677",
"url": "https://bugzilla.suse.com/1186677"
},
{
"category": "self",
"summary": "SUSE Bug 1186752",
"url": "https://bugzilla.suse.com/1186752"
},
{
"category": "self",
"summary": "SUSE Bug 1186885",
"url": "https://bugzilla.suse.com/1186885"
},
{
"category": "self",
"summary": "SUSE Bug 1186928",
"url": "https://bugzilla.suse.com/1186928"
},
{
"category": "self",
"summary": "SUSE Bug 1186949",
"url": "https://bugzilla.suse.com/1186949"
},
{
"category": "self",
"summary": "SUSE Bug 1186950",
"url": "https://bugzilla.suse.com/1186950"
},
{
"category": "self",
"summary": "SUSE Bug 1186951",
"url": "https://bugzilla.suse.com/1186951"
},
{
"category": "self",
"summary": "SUSE Bug 1186952",
"url": "https://bugzilla.suse.com/1186952"
},
{
"category": "self",
"summary": "SUSE Bug 1186953",
"url": "https://bugzilla.suse.com/1186953"
},
{
"category": "self",
"summary": "SUSE Bug 1186954",
"url": "https://bugzilla.suse.com/1186954"
},
{
"category": "self",
"summary": "SUSE Bug 1186955",
"url": "https://bugzilla.suse.com/1186955"
},
{
"category": "self",
"summary": "SUSE Bug 1186956",
"url": "https://bugzilla.suse.com/1186956"
},
{
"category": "self",
"summary": "SUSE Bug 1186957",
"url": "https://bugzilla.suse.com/1186957"
},
{
"category": "self",
"summary": "SUSE Bug 1186958",
"url": "https://bugzilla.suse.com/1186958"
},
{
"category": "self",
"summary": "SUSE Bug 1186959",
"url": "https://bugzilla.suse.com/1186959"
},
{
"category": "self",
"summary": "SUSE Bug 1186960",
"url": "https://bugzilla.suse.com/1186960"
},
{
"category": "self",
"summary": "SUSE Bug 1186961",
"url": "https://bugzilla.suse.com/1186961"
},
{
"category": "self",
"summary": "SUSE Bug 1186962",
"url": "https://bugzilla.suse.com/1186962"
},
{
"category": "self",
"summary": "SUSE Bug 1186963",
"url": "https://bugzilla.suse.com/1186963"
},
{
"category": "self",
"summary": "SUSE Bug 1186964",
"url": "https://bugzilla.suse.com/1186964"
},
{
"category": "self",
"summary": "SUSE Bug 1186965",
"url": "https://bugzilla.suse.com/1186965"
},
{
"category": "self",
"summary": "SUSE Bug 1186966",
"url": "https://bugzilla.suse.com/1186966"
},
{
"category": "self",
"summary": "SUSE Bug 1186967",
"url": "https://bugzilla.suse.com/1186967"
},
{
"category": "self",
"summary": "SUSE Bug 1186968",
"url": "https://bugzilla.suse.com/1186968"
},
{
"category": "self",
"summary": "SUSE Bug 1186969",
"url": "https://bugzilla.suse.com/1186969"
},
{
"category": "self",
"summary": "SUSE Bug 1186970",
"url": "https://bugzilla.suse.com/1186970"
},
{
"category": "self",
"summary": "SUSE Bug 1186971",
"url": "https://bugzilla.suse.com/1186971"
},
{
"category": "self",
"summary": "SUSE Bug 1186972",
"url": "https://bugzilla.suse.com/1186972"
},
{
"category": "self",
"summary": "SUSE Bug 1186973",
"url": "https://bugzilla.suse.com/1186973"
},
{
"category": "self",
"summary": "SUSE Bug 1186974",
"url": "https://bugzilla.suse.com/1186974"
},
{
"category": "self",
"summary": "SUSE Bug 1186976",
"url": "https://bugzilla.suse.com/1186976"
},
{
"category": "self",
"summary": "SUSE Bug 1186977",
"url": "https://bugzilla.suse.com/1186977"
},
{
"category": "self",
"summary": "SUSE Bug 1186978",
"url": "https://bugzilla.suse.com/1186978"
},
{
"category": "self",
"summary": "SUSE Bug 1186979",
"url": "https://bugzilla.suse.com/1186979"
},
{
"category": "self",
"summary": "SUSE Bug 1186980",
"url": "https://bugzilla.suse.com/1186980"
},
{
"category": "self",
"summary": "SUSE Bug 1186981",
"url": "https://bugzilla.suse.com/1186981"
},
{
"category": "self",
"summary": "SUSE Bug 1186982",
"url": "https://bugzilla.suse.com/1186982"
},
{
"category": "self",
"summary": "SUSE Bug 1186983",
"url": "https://bugzilla.suse.com/1186983"
},
{
"category": "self",
"summary": "SUSE Bug 1186984",
"url": "https://bugzilla.suse.com/1186984"
},
{
"category": "self",
"summary": "SUSE Bug 1186985",
"url": "https://bugzilla.suse.com/1186985"
},
{
"category": "self",
"summary": "SUSE Bug 1186986",
"url": "https://bugzilla.suse.com/1186986"
},
{
"category": "self",
"summary": "SUSE Bug 1186987",
"url": "https://bugzilla.suse.com/1186987"
},
{
"category": "self",
"summary": "SUSE Bug 1186988",
"url": "https://bugzilla.suse.com/1186988"
},
{
"category": "self",
"summary": "SUSE Bug 1186989",
"url": "https://bugzilla.suse.com/1186989"
},
{
"category": "self",
"summary": "SUSE Bug 1186990",
"url": "https://bugzilla.suse.com/1186990"
},
{
"category": "self",
"summary": "SUSE Bug 1186991",
"url": "https://bugzilla.suse.com/1186991"
},
{
"category": "self",
"summary": "SUSE Bug 1186992",
"url": "https://bugzilla.suse.com/1186992"
},
{
"category": "self",
"summary": "SUSE Bug 1186993",
"url": "https://bugzilla.suse.com/1186993"
},
{
"category": "self",
"summary": "SUSE Bug 1186994",
"url": "https://bugzilla.suse.com/1186994"
},
{
"category": "self",
"summary": "SUSE Bug 1186995",
"url": "https://bugzilla.suse.com/1186995"
},
{
"category": "self",
"summary": "SUSE Bug 1186996",
"url": "https://bugzilla.suse.com/1186996"
},
{
"category": "self",
"summary": "SUSE Bug 1186997",
"url": "https://bugzilla.suse.com/1186997"
},
{
"category": "self",
"summary": "SUSE Bug 1186998",
"url": "https://bugzilla.suse.com/1186998"
},
{
"category": "self",
"summary": "SUSE Bug 1186999",
"url": "https://bugzilla.suse.com/1186999"
},
{
"category": "self",
"summary": "SUSE Bug 1187000",
"url": "https://bugzilla.suse.com/1187000"
},
{
"category": "self",
"summary": "SUSE Bug 1187001",
"url": "https://bugzilla.suse.com/1187001"
},
{
"category": "self",
"summary": "SUSE Bug 1187002",
"url": "https://bugzilla.suse.com/1187002"
},
{
"category": "self",
"summary": "SUSE Bug 1187003",
"url": "https://bugzilla.suse.com/1187003"
},
{
"category": "self",
"summary": "SUSE Bug 1187038",
"url": "https://bugzilla.suse.com/1187038"
},
{
"category": "self",
"summary": "SUSE Bug 1187039",
"url": "https://bugzilla.suse.com/1187039"
},
{
"category": "self",
"summary": "SUSE Bug 1187050",
"url": "https://bugzilla.suse.com/1187050"
},
{
"category": "self",
"summary": "SUSE Bug 1187052",
"url": "https://bugzilla.suse.com/1187052"
},
{
"category": "self",
"summary": "SUSE Bug 1187067",
"url": "https://bugzilla.suse.com/1187067"
},
{
"category": "self",
"summary": "SUSE Bug 1187068",
"url": "https://bugzilla.suse.com/1187068"
},
{
"category": "self",
"summary": "SUSE Bug 1187069",
"url": "https://bugzilla.suse.com/1187069"
},
{
"category": "self",
"summary": "SUSE Bug 1187072",
"url": "https://bugzilla.suse.com/1187072"
},
{
"category": "self",
"summary": "SUSE Bug 1187143",
"url": "https://bugzilla.suse.com/1187143"
},
{
"category": "self",
"summary": "SUSE Bug 1187144",
"url": "https://bugzilla.suse.com/1187144"
},
{
"category": "self",
"summary": "SUSE Bug 1187167",
"url": "https://bugzilla.suse.com/1187167"
},
{
"category": "self",
"summary": "SUSE Bug 1187334",
"url": "https://bugzilla.suse.com/1187334"
},
{
"category": "self",
"summary": "SUSE Bug 1187344",
"url": "https://bugzilla.suse.com/1187344"
},
{
"category": "self",
"summary": "SUSE Bug 1187345",
"url": "https://bugzilla.suse.com/1187345"
},
{
"category": "self",
"summary": "SUSE Bug 1187346",
"url": "https://bugzilla.suse.com/1187346"
},
{
"category": "self",
"summary": "SUSE Bug 1187347",
"url": "https://bugzilla.suse.com/1187347"
},
{
"category": "self",
"summary": "SUSE Bug 1187348",
"url": "https://bugzilla.suse.com/1187348"
},
{
"category": "self",
"summary": "SUSE Bug 1187349",
"url": "https://bugzilla.suse.com/1187349"
},
{
"category": "self",
"summary": "SUSE Bug 1187350",
"url": "https://bugzilla.suse.com/1187350"
},
{
"category": "self",
"summary": "SUSE Bug 1187351",
"url": "https://bugzilla.suse.com/1187351"
},
{
"category": "self",
"summary": "SUSE Bug 1187357",
"url": "https://bugzilla.suse.com/1187357"
},
{
"category": "self",
"summary": "SUSE Bug 1187711",
"url": "https://bugzilla.suse.com/1187711"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-26558 page",
"url": "https://www.suse.com/security/cve/CVE-2020-26558/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-36385 page",
"url": "https://www.suse.com/security/cve/CVE-2020-36385/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-36386 page",
"url": "https://www.suse.com/security/cve/CVE-2020-36386/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-0129 page",
"url": "https://www.suse.com/security/cve/CVE-2021-0129/"
}
],
"title": "Security update for the Linux Kernel",
"tracking": {
"current_release_date": "2021-06-29T11:11:26Z",
"generator": {
"date": "2021-06-29T11:11:26Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2021:2202-1",
"initial_release_date": "2021-06-29T11:11:26Z",
"revision_history": [
{
"date": "2021-06-29T11:11:26Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "kernel-devel-azure-5.3.18-38.8.1.noarch",
"product": {
"name": "kernel-devel-azure-5.3.18-38.8.1.noarch",
"product_id": "kernel-devel-azure-5.3.18-38.8.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-azure-5.3.18-38.8.1.noarch",
"product": {
"name": "kernel-source-azure-5.3.18-38.8.1.noarch",
"product_id": "kernel-source-azure-5.3.18-38.8.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-azure-5.3.18-38.8.1.x86_64",
"product": {
"name": "cluster-md-kmp-azure-5.3.18-38.8.1.x86_64",
"product_id": "cluster-md-kmp-azure-5.3.18-38.8.1.x86_64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-azure-5.3.18-38.8.1.x86_64",
"product": {
"name": "dlm-kmp-azure-5.3.18-38.8.1.x86_64",
"product_id": "dlm-kmp-azure-5.3.18-38.8.1.x86_64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-azure-5.3.18-38.8.1.x86_64",
"product": {
"name": "gfs2-kmp-azure-5.3.18-38.8.1.x86_64",
"product_id": "gfs2-kmp-azure-5.3.18-38.8.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-azure-5.3.18-38.8.1.x86_64",
"product": {
"name": "kernel-azure-5.3.18-38.8.1.x86_64",
"product_id": "kernel-azure-5.3.18-38.8.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-azure-devel-5.3.18-38.8.1.x86_64",
"product": {
"name": "kernel-azure-devel-5.3.18-38.8.1.x86_64",
"product_id": "kernel-azure-devel-5.3.18-38.8.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-azure-extra-5.3.18-38.8.1.x86_64",
"product": {
"name": "kernel-azure-extra-5.3.18-38.8.1.x86_64",
"product_id": "kernel-azure-extra-5.3.18-38.8.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-azure-livepatch-devel-5.3.18-38.8.1.x86_64",
"product": {
"name": "kernel-azure-livepatch-devel-5.3.18-38.8.1.x86_64",
"product_id": "kernel-azure-livepatch-devel-5.3.18-38.8.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-azure-optional-5.3.18-38.8.1.x86_64",
"product": {
"name": "kernel-azure-optional-5.3.18-38.8.1.x86_64",
"product_id": "kernel-azure-optional-5.3.18-38.8.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-syms-azure-5.3.18-38.8.1.x86_64",
"product": {
"name": "kernel-syms-azure-5.3.18-38.8.1.x86_64",
"product_id": "kernel-syms-azure-5.3.18-38.8.1.x86_64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-azure-5.3.18-38.8.1.x86_64",
"product": {
"name": "kselftests-kmp-azure-5.3.18-38.8.1.x86_64",
"product_id": "kselftests-kmp-azure-5.3.18-38.8.1.x86_64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-azure-5.3.18-38.8.1.x86_64",
"product": {
"name": "ocfs2-kmp-azure-5.3.18-38.8.1.x86_64",
"product_id": "ocfs2-kmp-azure-5.3.18-38.8.1.x86_64"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-azure-5.3.18-38.8.1.x86_64",
"product": {
"name": "reiserfs-kmp-azure-5.3.18-38.8.1.x86_64",
"product_id": "reiserfs-kmp-azure-5.3.18-38.8.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Leap 15.3",
"product": {
"name": "openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:leap:15.3"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-azure-5.3.18-38.8.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.8.1.x86_64"
},
"product_reference": "cluster-md-kmp-azure-5.3.18-38.8.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-azure-5.3.18-38.8.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.8.1.x86_64"
},
"product_reference": "dlm-kmp-azure-5.3.18-38.8.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-azure-5.3.18-38.8.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.8.1.x86_64"
},
"product_reference": "gfs2-kmp-azure-5.3.18-38.8.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-azure-5.3.18-38.8.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-azure-5.3.18-38.8.1.x86_64"
},
"product_reference": "kernel-azure-5.3.18-38.8.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-azure-devel-5.3.18-38.8.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.8.1.x86_64"
},
"product_reference": "kernel-azure-devel-5.3.18-38.8.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-azure-extra-5.3.18-38.8.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.8.1.x86_64"
},
"product_reference": "kernel-azure-extra-5.3.18-38.8.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-azure-livepatch-devel-5.3.18-38.8.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.8.1.x86_64"
},
"product_reference": "kernel-azure-livepatch-devel-5.3.18-38.8.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-azure-optional-5.3.18-38.8.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.8.1.x86_64"
},
"product_reference": "kernel-azure-optional-5.3.18-38.8.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-azure-5.3.18-38.8.1.noarch as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.8.1.noarch"
},
"product_reference": "kernel-devel-azure-5.3.18-38.8.1.noarch",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-azure-5.3.18-38.8.1.noarch as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.8.1.noarch"
},
"product_reference": "kernel-source-azure-5.3.18-38.8.1.noarch",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-azure-5.3.18-38.8.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.8.1.x86_64"
},
"product_reference": "kernel-syms-azure-5.3.18-38.8.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kselftests-kmp-azure-5.3.18-38.8.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.8.1.x86_64"
},
"product_reference": "kselftests-kmp-azure-5.3.18-38.8.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-azure-5.3.18-38.8.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.8.1.x86_64"
},
"product_reference": "ocfs2-kmp-azure-5.3.18-38.8.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-azure-5.3.18-38.8.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.8.1.x86_64"
},
"product_reference": "reiserfs-kmp-azure-5.3.18-38.8.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2020-26558",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-26558"
}
],
"notes": [
{
"category": "general",
"text": "Bluetooth LE and BR/EDR secure pairing in Bluetooth Core Specification 2.1 through 5.2 may permit a nearby man-in-the-middle attacker to identify the Passkey used during pairing (in the Passkey authentication procedure) by reflection of the public key and the authentication evidence of the initiating device, potentially permitting this attacker to complete authenticated pairing with the responding device using the correct Passkey for the pairing session. The attack methodology determines the Passkey value one bit at a time.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.8.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.8.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.8.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-38.8.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.8.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.8.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.8.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.8.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.8.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.8.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.8.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.8.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.8.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-26558",
"url": "https://www.suse.com/security/cve/CVE-2020-26558"
},
{
"category": "external",
"summary": "SUSE Bug 1179610 for CVE-2020-26558",
"url": "https://bugzilla.suse.com/1179610"
},
{
"category": "external",
"summary": "SUSE Bug 1186463 for CVE-2020-26558",
"url": "https://bugzilla.suse.com/1186463"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.8.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.8.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.8.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-38.8.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.8.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.8.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.8.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.8.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.8.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.8.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.8.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.8.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.8.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.8.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.8.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.8.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-38.8.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.8.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.8.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.8.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.8.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.8.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.8.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.8.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.8.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.8.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-29T11:11:26Z",
"details": "moderate"
}
],
"title": "CVE-2020-26558"
},
{
"cve": "CVE-2020-36385",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-36385"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel before 5.10. drivers/infiniband/core/ucma.c has a use-after-free because the ctx is reached via the ctx_list in some ucma_migrate_id situations where ucma_close is called, aka CID-f5449e74802c.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.8.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.8.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.8.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-38.8.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.8.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.8.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.8.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.8.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.8.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.8.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.8.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.8.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.8.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-36385",
"url": "https://www.suse.com/security/cve/CVE-2020-36385"
},
{
"category": "external",
"summary": "SUSE Bug 1187050 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1187050"
},
{
"category": "external",
"summary": "SUSE Bug 1187052 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1187052"
},
{
"category": "external",
"summary": "SUSE Bug 1189302 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1189302"
},
{
"category": "external",
"summary": "SUSE Bug 1196174 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1196174"
},
{
"category": "external",
"summary": "SUSE Bug 1196810 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1196810"
},
{
"category": "external",
"summary": "SUSE Bug 1196914 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1196914"
},
{
"category": "external",
"summary": "SUSE Bug 1200084 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1200084"
},
{
"category": "external",
"summary": "SUSE Bug 1201734 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1201734"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.8.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.8.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.8.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-38.8.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.8.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.8.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.8.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.8.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.8.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.8.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.8.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.8.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.8.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.8.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.8.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.8.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-38.8.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.8.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.8.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.8.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.8.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.8.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.8.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.8.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.8.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.8.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-29T11:11:26Z",
"details": "important"
}
],
"title": "CVE-2020-36385"
},
{
"cve": "CVE-2020-36386",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-36386"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel before 5.8.1. net/bluetooth/hci_event.c has a slab out-of-bounds read in hci_extended_inquiry_result_evt, aka CID-51c19bf3d5cf.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.8.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.8.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.8.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-38.8.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.8.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.8.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.8.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.8.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.8.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.8.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.8.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.8.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.8.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-36386",
"url": "https://www.suse.com/security/cve/CVE-2020-36386"
},
{
"category": "external",
"summary": "SUSE Bug 1187038 for CVE-2020-36386",
"url": "https://bugzilla.suse.com/1187038"
},
{
"category": "external",
"summary": "SUSE Bug 1192868 for CVE-2020-36386",
"url": "https://bugzilla.suse.com/1192868"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.8.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.8.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.8.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-38.8.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.8.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.8.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.8.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.8.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.8.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.8.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.8.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.8.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.8.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.8.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.8.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.8.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-38.8.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.8.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.8.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.8.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.8.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.8.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.8.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.8.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.8.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.8.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-29T11:11:26Z",
"details": "moderate"
}
],
"title": "CVE-2020-36386"
},
{
"cve": "CVE-2021-0129",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-0129"
}
],
"notes": [
{
"category": "general",
"text": "Improper access control in BlueZ may allow an authenticated user to potentially enable information disclosure via adjacent access.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.8.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.8.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.8.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-38.8.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.8.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.8.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.8.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.8.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.8.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.8.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.8.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.8.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.8.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-0129",
"url": "https://www.suse.com/security/cve/CVE-2021-0129"
},
{
"category": "external",
"summary": "SUSE Bug 1186463 for CVE-2021-0129",
"url": "https://bugzilla.suse.com/1186463"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.8.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.8.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.8.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-38.8.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.8.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.8.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.8.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.8.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.8.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.8.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.8.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.8.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.8.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.8.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.8.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.8.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-38.8.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.8.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.8.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.8.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.8.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.8.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.8.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.8.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.8.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.8.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-29T11:11:26Z",
"details": "moderate"
}
],
"title": "CVE-2021-0129"
}
]
}
opensuse-su-2024:12446-1
Vulnerability from csaf_opensuse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "bluez-5.65-4.1 on GA media",
"title": "Title of the patch"
},
{
"category": "description",
"text": "These are all security issues fixed in the bluez-5.65-4.1 package on the GA media of openSUSE Tumbleweed.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Tumbleweed-2024-12446",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_12446-1.json"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-9801 page",
"url": "https://www.suse.com/security/cve/CVE-2016-9801/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-9918 page",
"url": "https://www.suse.com/security/cve/CVE-2016-9918/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-0129 page",
"url": "https://www.suse.com/security/cve/CVE-2021-0129/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3588 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3588/"
}
],
"title": "bluez-5.65-4.1 on GA media",
"tracking": {
"current_release_date": "2024-06-15T00:00:00Z",
"generator": {
"date": "2024-06-15T00:00:00Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2024:12446-1",
"initial_release_date": "2024-06-15T00:00:00Z",
"revision_history": [
{
"date": "2024-06-15T00:00:00Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "bluez-5.65-4.1.aarch64",
"product": {
"name": "bluez-5.65-4.1.aarch64",
"product_id": "bluez-5.65-4.1.aarch64"
}
},
{
"category": "product_version",
"name": "bluez-auto-enable-devices-5.65-4.1.aarch64",
"product": {
"name": "bluez-auto-enable-devices-5.65-4.1.aarch64",
"product_id": "bluez-auto-enable-devices-5.65-4.1.aarch64"
}
},
{
"category": "product_version",
"name": "bluez-cups-5.65-4.1.aarch64",
"product": {
"name": "bluez-cups-5.65-4.1.aarch64",
"product_id": "bluez-cups-5.65-4.1.aarch64"
}
},
{
"category": "product_version",
"name": "bluez-deprecated-5.65-4.1.aarch64",
"product": {
"name": "bluez-deprecated-5.65-4.1.aarch64",
"product_id": "bluez-deprecated-5.65-4.1.aarch64"
}
},
{
"category": "product_version",
"name": "bluez-devel-5.65-4.1.aarch64",
"product": {
"name": "bluez-devel-5.65-4.1.aarch64",
"product_id": "bluez-devel-5.65-4.1.aarch64"
}
},
{
"category": "product_version",
"name": "bluez-devel-32bit-5.65-4.1.aarch64",
"product": {
"name": "bluez-devel-32bit-5.65-4.1.aarch64",
"product_id": "bluez-devel-32bit-5.65-4.1.aarch64"
}
},
{
"category": "product_version",
"name": "bluez-obexd-5.65-4.1.aarch64",
"product": {
"name": "bluez-obexd-5.65-4.1.aarch64",
"product_id": "bluez-obexd-5.65-4.1.aarch64"
}
},
{
"category": "product_version",
"name": "bluez-test-5.65-4.1.aarch64",
"product": {
"name": "bluez-test-5.65-4.1.aarch64",
"product_id": "bluez-test-5.65-4.1.aarch64"
}
},
{
"category": "product_version",
"name": "bluez-zsh-completion-5.65-4.1.aarch64",
"product": {
"name": "bluez-zsh-completion-5.65-4.1.aarch64",
"product_id": "bluez-zsh-completion-5.65-4.1.aarch64"
}
},
{
"category": "product_version",
"name": "libbluetooth3-5.65-4.1.aarch64",
"product": {
"name": "libbluetooth3-5.65-4.1.aarch64",
"product_id": "libbluetooth3-5.65-4.1.aarch64"
}
},
{
"category": "product_version",
"name": "libbluetooth3-32bit-5.65-4.1.aarch64",
"product": {
"name": "libbluetooth3-32bit-5.65-4.1.aarch64",
"product_id": "libbluetooth3-32bit-5.65-4.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "bluez-5.65-4.1.ppc64le",
"product": {
"name": "bluez-5.65-4.1.ppc64le",
"product_id": "bluez-5.65-4.1.ppc64le"
}
},
{
"category": "product_version",
"name": "bluez-auto-enable-devices-5.65-4.1.ppc64le",
"product": {
"name": "bluez-auto-enable-devices-5.65-4.1.ppc64le",
"product_id": "bluez-auto-enable-devices-5.65-4.1.ppc64le"
}
},
{
"category": "product_version",
"name": "bluez-cups-5.65-4.1.ppc64le",
"product": {
"name": "bluez-cups-5.65-4.1.ppc64le",
"product_id": "bluez-cups-5.65-4.1.ppc64le"
}
},
{
"category": "product_version",
"name": "bluez-deprecated-5.65-4.1.ppc64le",
"product": {
"name": "bluez-deprecated-5.65-4.1.ppc64le",
"product_id": "bluez-deprecated-5.65-4.1.ppc64le"
}
},
{
"category": "product_version",
"name": "bluez-devel-5.65-4.1.ppc64le",
"product": {
"name": "bluez-devel-5.65-4.1.ppc64le",
"product_id": "bluez-devel-5.65-4.1.ppc64le"
}
},
{
"category": "product_version",
"name": "bluez-devel-32bit-5.65-4.1.ppc64le",
"product": {
"name": "bluez-devel-32bit-5.65-4.1.ppc64le",
"product_id": "bluez-devel-32bit-5.65-4.1.ppc64le"
}
},
{
"category": "product_version",
"name": "bluez-obexd-5.65-4.1.ppc64le",
"product": {
"name": "bluez-obexd-5.65-4.1.ppc64le",
"product_id": "bluez-obexd-5.65-4.1.ppc64le"
}
},
{
"category": "product_version",
"name": "bluez-test-5.65-4.1.ppc64le",
"product": {
"name": "bluez-test-5.65-4.1.ppc64le",
"product_id": "bluez-test-5.65-4.1.ppc64le"
}
},
{
"category": "product_version",
"name": "bluez-zsh-completion-5.65-4.1.ppc64le",
"product": {
"name": "bluez-zsh-completion-5.65-4.1.ppc64le",
"product_id": "bluez-zsh-completion-5.65-4.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libbluetooth3-5.65-4.1.ppc64le",
"product": {
"name": "libbluetooth3-5.65-4.1.ppc64le",
"product_id": "libbluetooth3-5.65-4.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libbluetooth3-32bit-5.65-4.1.ppc64le",
"product": {
"name": "libbluetooth3-32bit-5.65-4.1.ppc64le",
"product_id": "libbluetooth3-32bit-5.65-4.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "bluez-5.65-4.1.s390x",
"product": {
"name": "bluez-5.65-4.1.s390x",
"product_id": "bluez-5.65-4.1.s390x"
}
},
{
"category": "product_version",
"name": "bluez-auto-enable-devices-5.65-4.1.s390x",
"product": {
"name": "bluez-auto-enable-devices-5.65-4.1.s390x",
"product_id": "bluez-auto-enable-devices-5.65-4.1.s390x"
}
},
{
"category": "product_version",
"name": "bluez-cups-5.65-4.1.s390x",
"product": {
"name": "bluez-cups-5.65-4.1.s390x",
"product_id": "bluez-cups-5.65-4.1.s390x"
}
},
{
"category": "product_version",
"name": "bluez-deprecated-5.65-4.1.s390x",
"product": {
"name": "bluez-deprecated-5.65-4.1.s390x",
"product_id": "bluez-deprecated-5.65-4.1.s390x"
}
},
{
"category": "product_version",
"name": "bluez-devel-5.65-4.1.s390x",
"product": {
"name": "bluez-devel-5.65-4.1.s390x",
"product_id": "bluez-devel-5.65-4.1.s390x"
}
},
{
"category": "product_version",
"name": "bluez-devel-32bit-5.65-4.1.s390x",
"product": {
"name": "bluez-devel-32bit-5.65-4.1.s390x",
"product_id": "bluez-devel-32bit-5.65-4.1.s390x"
}
},
{
"category": "product_version",
"name": "bluez-obexd-5.65-4.1.s390x",
"product": {
"name": "bluez-obexd-5.65-4.1.s390x",
"product_id": "bluez-obexd-5.65-4.1.s390x"
}
},
{
"category": "product_version",
"name": "bluez-test-5.65-4.1.s390x",
"product": {
"name": "bluez-test-5.65-4.1.s390x",
"product_id": "bluez-test-5.65-4.1.s390x"
}
},
{
"category": "product_version",
"name": "bluez-zsh-completion-5.65-4.1.s390x",
"product": {
"name": "bluez-zsh-completion-5.65-4.1.s390x",
"product_id": "bluez-zsh-completion-5.65-4.1.s390x"
}
},
{
"category": "product_version",
"name": "libbluetooth3-5.65-4.1.s390x",
"product": {
"name": "libbluetooth3-5.65-4.1.s390x",
"product_id": "libbluetooth3-5.65-4.1.s390x"
}
},
{
"category": "product_version",
"name": "libbluetooth3-32bit-5.65-4.1.s390x",
"product": {
"name": "libbluetooth3-32bit-5.65-4.1.s390x",
"product_id": "libbluetooth3-32bit-5.65-4.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "bluez-5.65-4.1.x86_64",
"product": {
"name": "bluez-5.65-4.1.x86_64",
"product_id": "bluez-5.65-4.1.x86_64"
}
},
{
"category": "product_version",
"name": "bluez-auto-enable-devices-5.65-4.1.x86_64",
"product": {
"name": "bluez-auto-enable-devices-5.65-4.1.x86_64",
"product_id": "bluez-auto-enable-devices-5.65-4.1.x86_64"
}
},
{
"category": "product_version",
"name": "bluez-cups-5.65-4.1.x86_64",
"product": {
"name": "bluez-cups-5.65-4.1.x86_64",
"product_id": "bluez-cups-5.65-4.1.x86_64"
}
},
{
"category": "product_version",
"name": "bluez-deprecated-5.65-4.1.x86_64",
"product": {
"name": "bluez-deprecated-5.65-4.1.x86_64",
"product_id": "bluez-deprecated-5.65-4.1.x86_64"
}
},
{
"category": "product_version",
"name": "bluez-devel-5.65-4.1.x86_64",
"product": {
"name": "bluez-devel-5.65-4.1.x86_64",
"product_id": "bluez-devel-5.65-4.1.x86_64"
}
},
{
"category": "product_version",
"name": "bluez-devel-32bit-5.65-4.1.x86_64",
"product": {
"name": "bluez-devel-32bit-5.65-4.1.x86_64",
"product_id": "bluez-devel-32bit-5.65-4.1.x86_64"
}
},
{
"category": "product_version",
"name": "bluez-obexd-5.65-4.1.x86_64",
"product": {
"name": "bluez-obexd-5.65-4.1.x86_64",
"product_id": "bluez-obexd-5.65-4.1.x86_64"
}
},
{
"category": "product_version",
"name": "bluez-test-5.65-4.1.x86_64",
"product": {
"name": "bluez-test-5.65-4.1.x86_64",
"product_id": "bluez-test-5.65-4.1.x86_64"
}
},
{
"category": "product_version",
"name": "bluez-zsh-completion-5.65-4.1.x86_64",
"product": {
"name": "bluez-zsh-completion-5.65-4.1.x86_64",
"product_id": "bluez-zsh-completion-5.65-4.1.x86_64"
}
},
{
"category": "product_version",
"name": "libbluetooth3-5.65-4.1.x86_64",
"product": {
"name": "libbluetooth3-5.65-4.1.x86_64",
"product_id": "libbluetooth3-5.65-4.1.x86_64"
}
},
{
"category": "product_version",
"name": "libbluetooth3-32bit-5.65-4.1.x86_64",
"product": {
"name": "libbluetooth3-32bit-5.65-4.1.x86_64",
"product_id": "libbluetooth3-32bit-5.65-4.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Tumbleweed",
"product": {
"name": "openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:tumbleweed"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "bluez-5.65-4.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:bluez-5.65-4.1.aarch64"
},
"product_reference": "bluez-5.65-4.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bluez-5.65-4.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:bluez-5.65-4.1.ppc64le"
},
"product_reference": "bluez-5.65-4.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bluez-5.65-4.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:bluez-5.65-4.1.s390x"
},
"product_reference": "bluez-5.65-4.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bluez-5.65-4.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:bluez-5.65-4.1.x86_64"
},
"product_reference": "bluez-5.65-4.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bluez-auto-enable-devices-5.65-4.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:bluez-auto-enable-devices-5.65-4.1.aarch64"
},
"product_reference": "bluez-auto-enable-devices-5.65-4.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bluez-auto-enable-devices-5.65-4.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:bluez-auto-enable-devices-5.65-4.1.ppc64le"
},
"product_reference": "bluez-auto-enable-devices-5.65-4.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bluez-auto-enable-devices-5.65-4.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:bluez-auto-enable-devices-5.65-4.1.s390x"
},
"product_reference": "bluez-auto-enable-devices-5.65-4.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bluez-auto-enable-devices-5.65-4.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:bluez-auto-enable-devices-5.65-4.1.x86_64"
},
"product_reference": "bluez-auto-enable-devices-5.65-4.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bluez-cups-5.65-4.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:bluez-cups-5.65-4.1.aarch64"
},
"product_reference": "bluez-cups-5.65-4.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bluez-cups-5.65-4.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:bluez-cups-5.65-4.1.ppc64le"
},
"product_reference": "bluez-cups-5.65-4.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bluez-cups-5.65-4.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:bluez-cups-5.65-4.1.s390x"
},
"product_reference": "bluez-cups-5.65-4.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bluez-cups-5.65-4.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:bluez-cups-5.65-4.1.x86_64"
},
"product_reference": "bluez-cups-5.65-4.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bluez-deprecated-5.65-4.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:bluez-deprecated-5.65-4.1.aarch64"
},
"product_reference": "bluez-deprecated-5.65-4.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bluez-deprecated-5.65-4.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:bluez-deprecated-5.65-4.1.ppc64le"
},
"product_reference": "bluez-deprecated-5.65-4.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bluez-deprecated-5.65-4.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:bluez-deprecated-5.65-4.1.s390x"
},
"product_reference": "bluez-deprecated-5.65-4.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bluez-deprecated-5.65-4.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:bluez-deprecated-5.65-4.1.x86_64"
},
"product_reference": "bluez-deprecated-5.65-4.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bluez-devel-5.65-4.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:bluez-devel-5.65-4.1.aarch64"
},
"product_reference": "bluez-devel-5.65-4.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bluez-devel-5.65-4.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:bluez-devel-5.65-4.1.ppc64le"
},
"product_reference": "bluez-devel-5.65-4.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bluez-devel-5.65-4.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:bluez-devel-5.65-4.1.s390x"
},
"product_reference": "bluez-devel-5.65-4.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bluez-devel-5.65-4.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:bluez-devel-5.65-4.1.x86_64"
},
"product_reference": "bluez-devel-5.65-4.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bluez-devel-32bit-5.65-4.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:bluez-devel-32bit-5.65-4.1.aarch64"
},
"product_reference": "bluez-devel-32bit-5.65-4.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bluez-devel-32bit-5.65-4.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:bluez-devel-32bit-5.65-4.1.ppc64le"
},
"product_reference": "bluez-devel-32bit-5.65-4.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bluez-devel-32bit-5.65-4.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:bluez-devel-32bit-5.65-4.1.s390x"
},
"product_reference": "bluez-devel-32bit-5.65-4.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bluez-devel-32bit-5.65-4.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:bluez-devel-32bit-5.65-4.1.x86_64"
},
"product_reference": "bluez-devel-32bit-5.65-4.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bluez-obexd-5.65-4.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:bluez-obexd-5.65-4.1.aarch64"
},
"product_reference": "bluez-obexd-5.65-4.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bluez-obexd-5.65-4.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:bluez-obexd-5.65-4.1.ppc64le"
},
"product_reference": "bluez-obexd-5.65-4.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bluez-obexd-5.65-4.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:bluez-obexd-5.65-4.1.s390x"
},
"product_reference": "bluez-obexd-5.65-4.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bluez-obexd-5.65-4.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:bluez-obexd-5.65-4.1.x86_64"
},
"product_reference": "bluez-obexd-5.65-4.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bluez-test-5.65-4.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:bluez-test-5.65-4.1.aarch64"
},
"product_reference": "bluez-test-5.65-4.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bluez-test-5.65-4.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:bluez-test-5.65-4.1.ppc64le"
},
"product_reference": "bluez-test-5.65-4.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bluez-test-5.65-4.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:bluez-test-5.65-4.1.s390x"
},
"product_reference": "bluez-test-5.65-4.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bluez-test-5.65-4.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:bluez-test-5.65-4.1.x86_64"
},
"product_reference": "bluez-test-5.65-4.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bluez-zsh-completion-5.65-4.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:bluez-zsh-completion-5.65-4.1.aarch64"
},
"product_reference": "bluez-zsh-completion-5.65-4.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bluez-zsh-completion-5.65-4.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:bluez-zsh-completion-5.65-4.1.ppc64le"
},
"product_reference": "bluez-zsh-completion-5.65-4.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bluez-zsh-completion-5.65-4.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:bluez-zsh-completion-5.65-4.1.s390x"
},
"product_reference": "bluez-zsh-completion-5.65-4.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bluez-zsh-completion-5.65-4.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:bluez-zsh-completion-5.65-4.1.x86_64"
},
"product_reference": "bluez-zsh-completion-5.65-4.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libbluetooth3-5.65-4.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libbluetooth3-5.65-4.1.aarch64"
},
"product_reference": "libbluetooth3-5.65-4.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libbluetooth3-5.65-4.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libbluetooth3-5.65-4.1.ppc64le"
},
"product_reference": "libbluetooth3-5.65-4.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libbluetooth3-5.65-4.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libbluetooth3-5.65-4.1.s390x"
},
"product_reference": "libbluetooth3-5.65-4.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libbluetooth3-5.65-4.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libbluetooth3-5.65-4.1.x86_64"
},
"product_reference": "libbluetooth3-5.65-4.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libbluetooth3-32bit-5.65-4.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libbluetooth3-32bit-5.65-4.1.aarch64"
},
"product_reference": "libbluetooth3-32bit-5.65-4.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libbluetooth3-32bit-5.65-4.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libbluetooth3-32bit-5.65-4.1.ppc64le"
},
"product_reference": "libbluetooth3-32bit-5.65-4.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libbluetooth3-32bit-5.65-4.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libbluetooth3-32bit-5.65-4.1.s390x"
},
"product_reference": "libbluetooth3-32bit-5.65-4.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libbluetooth3-32bit-5.65-4.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libbluetooth3-32bit-5.65-4.1.x86_64"
},
"product_reference": "libbluetooth3-32bit-5.65-4.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2016-9801",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-9801"
}
],
"notes": [
{
"category": "general",
"text": "In BlueZ 5.42, a buffer overflow was observed in \"set_ext_ctrl\" function in \"tools/parser/l2cap.c\" source file when processing corrupted dump file.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:bluez-5.65-4.1.aarch64",
"openSUSE Tumbleweed:bluez-5.65-4.1.ppc64le",
"openSUSE Tumbleweed:bluez-5.65-4.1.s390x",
"openSUSE Tumbleweed:bluez-5.65-4.1.x86_64",
"openSUSE Tumbleweed:bluez-auto-enable-devices-5.65-4.1.aarch64",
"openSUSE Tumbleweed:bluez-auto-enable-devices-5.65-4.1.ppc64le",
"openSUSE Tumbleweed:bluez-auto-enable-devices-5.65-4.1.s390x",
"openSUSE Tumbleweed:bluez-auto-enable-devices-5.65-4.1.x86_64",
"openSUSE Tumbleweed:bluez-cups-5.65-4.1.aarch64",
"openSUSE Tumbleweed:bluez-cups-5.65-4.1.ppc64le",
"openSUSE Tumbleweed:bluez-cups-5.65-4.1.s390x",
"openSUSE Tumbleweed:bluez-cups-5.65-4.1.x86_64",
"openSUSE Tumbleweed:bluez-deprecated-5.65-4.1.aarch64",
"openSUSE Tumbleweed:bluez-deprecated-5.65-4.1.ppc64le",
"openSUSE Tumbleweed:bluez-deprecated-5.65-4.1.s390x",
"openSUSE Tumbleweed:bluez-deprecated-5.65-4.1.x86_64",
"openSUSE Tumbleweed:bluez-devel-32bit-5.65-4.1.aarch64",
"openSUSE Tumbleweed:bluez-devel-32bit-5.65-4.1.ppc64le",
"openSUSE Tumbleweed:bluez-devel-32bit-5.65-4.1.s390x",
"openSUSE Tumbleweed:bluez-devel-32bit-5.65-4.1.x86_64",
"openSUSE Tumbleweed:bluez-devel-5.65-4.1.aarch64",
"openSUSE Tumbleweed:bluez-devel-5.65-4.1.ppc64le",
"openSUSE Tumbleweed:bluez-devel-5.65-4.1.s390x",
"openSUSE Tumbleweed:bluez-devel-5.65-4.1.x86_64",
"openSUSE Tumbleweed:bluez-obexd-5.65-4.1.aarch64",
"openSUSE Tumbleweed:bluez-obexd-5.65-4.1.ppc64le",
"openSUSE Tumbleweed:bluez-obexd-5.65-4.1.s390x",
"openSUSE Tumbleweed:bluez-obexd-5.65-4.1.x86_64",
"openSUSE Tumbleweed:bluez-test-5.65-4.1.aarch64",
"openSUSE Tumbleweed:bluez-test-5.65-4.1.ppc64le",
"openSUSE Tumbleweed:bluez-test-5.65-4.1.s390x",
"openSUSE Tumbleweed:bluez-test-5.65-4.1.x86_64",
"openSUSE Tumbleweed:bluez-zsh-completion-5.65-4.1.aarch64",
"openSUSE Tumbleweed:bluez-zsh-completion-5.65-4.1.ppc64le",
"openSUSE Tumbleweed:bluez-zsh-completion-5.65-4.1.s390x",
"openSUSE Tumbleweed:bluez-zsh-completion-5.65-4.1.x86_64",
"openSUSE Tumbleweed:libbluetooth3-32bit-5.65-4.1.aarch64",
"openSUSE Tumbleweed:libbluetooth3-32bit-5.65-4.1.ppc64le",
"openSUSE Tumbleweed:libbluetooth3-32bit-5.65-4.1.s390x",
"openSUSE Tumbleweed:libbluetooth3-32bit-5.65-4.1.x86_64",
"openSUSE Tumbleweed:libbluetooth3-5.65-4.1.aarch64",
"openSUSE Tumbleweed:libbluetooth3-5.65-4.1.ppc64le",
"openSUSE Tumbleweed:libbluetooth3-5.65-4.1.s390x",
"openSUSE Tumbleweed:libbluetooth3-5.65-4.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-9801",
"url": "https://www.suse.com/security/cve/CVE-2016-9801"
},
{
"category": "external",
"summary": "SUSE Bug 1013732 for CVE-2016-9801",
"url": "https://bugzilla.suse.com/1013732"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:bluez-5.65-4.1.aarch64",
"openSUSE Tumbleweed:bluez-5.65-4.1.ppc64le",
"openSUSE Tumbleweed:bluez-5.65-4.1.s390x",
"openSUSE Tumbleweed:bluez-5.65-4.1.x86_64",
"openSUSE Tumbleweed:bluez-auto-enable-devices-5.65-4.1.aarch64",
"openSUSE Tumbleweed:bluez-auto-enable-devices-5.65-4.1.ppc64le",
"openSUSE Tumbleweed:bluez-auto-enable-devices-5.65-4.1.s390x",
"openSUSE Tumbleweed:bluez-auto-enable-devices-5.65-4.1.x86_64",
"openSUSE Tumbleweed:bluez-cups-5.65-4.1.aarch64",
"openSUSE Tumbleweed:bluez-cups-5.65-4.1.ppc64le",
"openSUSE Tumbleweed:bluez-cups-5.65-4.1.s390x",
"openSUSE Tumbleweed:bluez-cups-5.65-4.1.x86_64",
"openSUSE Tumbleweed:bluez-deprecated-5.65-4.1.aarch64",
"openSUSE Tumbleweed:bluez-deprecated-5.65-4.1.ppc64le",
"openSUSE Tumbleweed:bluez-deprecated-5.65-4.1.s390x",
"openSUSE Tumbleweed:bluez-deprecated-5.65-4.1.x86_64",
"openSUSE Tumbleweed:bluez-devel-32bit-5.65-4.1.aarch64",
"openSUSE Tumbleweed:bluez-devel-32bit-5.65-4.1.ppc64le",
"openSUSE Tumbleweed:bluez-devel-32bit-5.65-4.1.s390x",
"openSUSE Tumbleweed:bluez-devel-32bit-5.65-4.1.x86_64",
"openSUSE Tumbleweed:bluez-devel-5.65-4.1.aarch64",
"openSUSE Tumbleweed:bluez-devel-5.65-4.1.ppc64le",
"openSUSE Tumbleweed:bluez-devel-5.65-4.1.s390x",
"openSUSE Tumbleweed:bluez-devel-5.65-4.1.x86_64",
"openSUSE Tumbleweed:bluez-obexd-5.65-4.1.aarch64",
"openSUSE Tumbleweed:bluez-obexd-5.65-4.1.ppc64le",
"openSUSE Tumbleweed:bluez-obexd-5.65-4.1.s390x",
"openSUSE Tumbleweed:bluez-obexd-5.65-4.1.x86_64",
"openSUSE Tumbleweed:bluez-test-5.65-4.1.aarch64",
"openSUSE Tumbleweed:bluez-test-5.65-4.1.ppc64le",
"openSUSE Tumbleweed:bluez-test-5.65-4.1.s390x",
"openSUSE Tumbleweed:bluez-test-5.65-4.1.x86_64",
"openSUSE Tumbleweed:bluez-zsh-completion-5.65-4.1.aarch64",
"openSUSE Tumbleweed:bluez-zsh-completion-5.65-4.1.ppc64le",
"openSUSE Tumbleweed:bluez-zsh-completion-5.65-4.1.s390x",
"openSUSE Tumbleweed:bluez-zsh-completion-5.65-4.1.x86_64",
"openSUSE Tumbleweed:libbluetooth3-32bit-5.65-4.1.aarch64",
"openSUSE Tumbleweed:libbluetooth3-32bit-5.65-4.1.ppc64le",
"openSUSE Tumbleweed:libbluetooth3-32bit-5.65-4.1.s390x",
"openSUSE Tumbleweed:libbluetooth3-32bit-5.65-4.1.x86_64",
"openSUSE Tumbleweed:libbluetooth3-5.65-4.1.aarch64",
"openSUSE Tumbleweed:libbluetooth3-5.65-4.1.ppc64le",
"openSUSE Tumbleweed:libbluetooth3-5.65-4.1.s390x",
"openSUSE Tumbleweed:libbluetooth3-5.65-4.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:bluez-5.65-4.1.aarch64",
"openSUSE Tumbleweed:bluez-5.65-4.1.ppc64le",
"openSUSE Tumbleweed:bluez-5.65-4.1.s390x",
"openSUSE Tumbleweed:bluez-5.65-4.1.x86_64",
"openSUSE Tumbleweed:bluez-auto-enable-devices-5.65-4.1.aarch64",
"openSUSE Tumbleweed:bluez-auto-enable-devices-5.65-4.1.ppc64le",
"openSUSE Tumbleweed:bluez-auto-enable-devices-5.65-4.1.s390x",
"openSUSE Tumbleweed:bluez-auto-enable-devices-5.65-4.1.x86_64",
"openSUSE Tumbleweed:bluez-cups-5.65-4.1.aarch64",
"openSUSE Tumbleweed:bluez-cups-5.65-4.1.ppc64le",
"openSUSE Tumbleweed:bluez-cups-5.65-4.1.s390x",
"openSUSE Tumbleweed:bluez-cups-5.65-4.1.x86_64",
"openSUSE Tumbleweed:bluez-deprecated-5.65-4.1.aarch64",
"openSUSE Tumbleweed:bluez-deprecated-5.65-4.1.ppc64le",
"openSUSE Tumbleweed:bluez-deprecated-5.65-4.1.s390x",
"openSUSE Tumbleweed:bluez-deprecated-5.65-4.1.x86_64",
"openSUSE Tumbleweed:bluez-devel-32bit-5.65-4.1.aarch64",
"openSUSE Tumbleweed:bluez-devel-32bit-5.65-4.1.ppc64le",
"openSUSE Tumbleweed:bluez-devel-32bit-5.65-4.1.s390x",
"openSUSE Tumbleweed:bluez-devel-32bit-5.65-4.1.x86_64",
"openSUSE Tumbleweed:bluez-devel-5.65-4.1.aarch64",
"openSUSE Tumbleweed:bluez-devel-5.65-4.1.ppc64le",
"openSUSE Tumbleweed:bluez-devel-5.65-4.1.s390x",
"openSUSE Tumbleweed:bluez-devel-5.65-4.1.x86_64",
"openSUSE Tumbleweed:bluez-obexd-5.65-4.1.aarch64",
"openSUSE Tumbleweed:bluez-obexd-5.65-4.1.ppc64le",
"openSUSE Tumbleweed:bluez-obexd-5.65-4.1.s390x",
"openSUSE Tumbleweed:bluez-obexd-5.65-4.1.x86_64",
"openSUSE Tumbleweed:bluez-test-5.65-4.1.aarch64",
"openSUSE Tumbleweed:bluez-test-5.65-4.1.ppc64le",
"openSUSE Tumbleweed:bluez-test-5.65-4.1.s390x",
"openSUSE Tumbleweed:bluez-test-5.65-4.1.x86_64",
"openSUSE Tumbleweed:bluez-zsh-completion-5.65-4.1.aarch64",
"openSUSE Tumbleweed:bluez-zsh-completion-5.65-4.1.ppc64le",
"openSUSE Tumbleweed:bluez-zsh-completion-5.65-4.1.s390x",
"openSUSE Tumbleweed:bluez-zsh-completion-5.65-4.1.x86_64",
"openSUSE Tumbleweed:libbluetooth3-32bit-5.65-4.1.aarch64",
"openSUSE Tumbleweed:libbluetooth3-32bit-5.65-4.1.ppc64le",
"openSUSE Tumbleweed:libbluetooth3-32bit-5.65-4.1.s390x",
"openSUSE Tumbleweed:libbluetooth3-32bit-5.65-4.1.x86_64",
"openSUSE Tumbleweed:libbluetooth3-5.65-4.1.aarch64",
"openSUSE Tumbleweed:libbluetooth3-5.65-4.1.ppc64le",
"openSUSE Tumbleweed:libbluetooth3-5.65-4.1.s390x",
"openSUSE Tumbleweed:libbluetooth3-5.65-4.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2016-9801"
},
{
"cve": "CVE-2016-9918",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-9918"
}
],
"notes": [
{
"category": "general",
"text": "In BlueZ 5.42, an out-of-bounds read was identified in \"packet_hexdump\" function in \"monitor/packet.c\" source file. This issue can be triggered by processing a corrupted dump file and will result in btmon crash.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:bluez-5.65-4.1.aarch64",
"openSUSE Tumbleweed:bluez-5.65-4.1.ppc64le",
"openSUSE Tumbleweed:bluez-5.65-4.1.s390x",
"openSUSE Tumbleweed:bluez-5.65-4.1.x86_64",
"openSUSE Tumbleweed:bluez-auto-enable-devices-5.65-4.1.aarch64",
"openSUSE Tumbleweed:bluez-auto-enable-devices-5.65-4.1.ppc64le",
"openSUSE Tumbleweed:bluez-auto-enable-devices-5.65-4.1.s390x",
"openSUSE Tumbleweed:bluez-auto-enable-devices-5.65-4.1.x86_64",
"openSUSE Tumbleweed:bluez-cups-5.65-4.1.aarch64",
"openSUSE Tumbleweed:bluez-cups-5.65-4.1.ppc64le",
"openSUSE Tumbleweed:bluez-cups-5.65-4.1.s390x",
"openSUSE Tumbleweed:bluez-cups-5.65-4.1.x86_64",
"openSUSE Tumbleweed:bluez-deprecated-5.65-4.1.aarch64",
"openSUSE Tumbleweed:bluez-deprecated-5.65-4.1.ppc64le",
"openSUSE Tumbleweed:bluez-deprecated-5.65-4.1.s390x",
"openSUSE Tumbleweed:bluez-deprecated-5.65-4.1.x86_64",
"openSUSE Tumbleweed:bluez-devel-32bit-5.65-4.1.aarch64",
"openSUSE Tumbleweed:bluez-devel-32bit-5.65-4.1.ppc64le",
"openSUSE Tumbleweed:bluez-devel-32bit-5.65-4.1.s390x",
"openSUSE Tumbleweed:bluez-devel-32bit-5.65-4.1.x86_64",
"openSUSE Tumbleweed:bluez-devel-5.65-4.1.aarch64",
"openSUSE Tumbleweed:bluez-devel-5.65-4.1.ppc64le",
"openSUSE Tumbleweed:bluez-devel-5.65-4.1.s390x",
"openSUSE Tumbleweed:bluez-devel-5.65-4.1.x86_64",
"openSUSE Tumbleweed:bluez-obexd-5.65-4.1.aarch64",
"openSUSE Tumbleweed:bluez-obexd-5.65-4.1.ppc64le",
"openSUSE Tumbleweed:bluez-obexd-5.65-4.1.s390x",
"openSUSE Tumbleweed:bluez-obexd-5.65-4.1.x86_64",
"openSUSE Tumbleweed:bluez-test-5.65-4.1.aarch64",
"openSUSE Tumbleweed:bluez-test-5.65-4.1.ppc64le",
"openSUSE Tumbleweed:bluez-test-5.65-4.1.s390x",
"openSUSE Tumbleweed:bluez-test-5.65-4.1.x86_64",
"openSUSE Tumbleweed:bluez-zsh-completion-5.65-4.1.aarch64",
"openSUSE Tumbleweed:bluez-zsh-completion-5.65-4.1.ppc64le",
"openSUSE Tumbleweed:bluez-zsh-completion-5.65-4.1.s390x",
"openSUSE Tumbleweed:bluez-zsh-completion-5.65-4.1.x86_64",
"openSUSE Tumbleweed:libbluetooth3-32bit-5.65-4.1.aarch64",
"openSUSE Tumbleweed:libbluetooth3-32bit-5.65-4.1.ppc64le",
"openSUSE Tumbleweed:libbluetooth3-32bit-5.65-4.1.s390x",
"openSUSE Tumbleweed:libbluetooth3-32bit-5.65-4.1.x86_64",
"openSUSE Tumbleweed:libbluetooth3-5.65-4.1.aarch64",
"openSUSE Tumbleweed:libbluetooth3-5.65-4.1.ppc64le",
"openSUSE Tumbleweed:libbluetooth3-5.65-4.1.s390x",
"openSUSE Tumbleweed:libbluetooth3-5.65-4.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-9918",
"url": "https://www.suse.com/security/cve/CVE-2016-9918"
},
{
"category": "external",
"summary": "SUSE Bug 1013893 for CVE-2016-9918",
"url": "https://bugzilla.suse.com/1013893"
},
{
"category": "external",
"summary": "SUSE Bug 1015173 for CVE-2016-9918",
"url": "https://bugzilla.suse.com/1015173"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:bluez-5.65-4.1.aarch64",
"openSUSE Tumbleweed:bluez-5.65-4.1.ppc64le",
"openSUSE Tumbleweed:bluez-5.65-4.1.s390x",
"openSUSE Tumbleweed:bluez-5.65-4.1.x86_64",
"openSUSE Tumbleweed:bluez-auto-enable-devices-5.65-4.1.aarch64",
"openSUSE Tumbleweed:bluez-auto-enable-devices-5.65-4.1.ppc64le",
"openSUSE Tumbleweed:bluez-auto-enable-devices-5.65-4.1.s390x",
"openSUSE Tumbleweed:bluez-auto-enable-devices-5.65-4.1.x86_64",
"openSUSE Tumbleweed:bluez-cups-5.65-4.1.aarch64",
"openSUSE Tumbleweed:bluez-cups-5.65-4.1.ppc64le",
"openSUSE Tumbleweed:bluez-cups-5.65-4.1.s390x",
"openSUSE Tumbleweed:bluez-cups-5.65-4.1.x86_64",
"openSUSE Tumbleweed:bluez-deprecated-5.65-4.1.aarch64",
"openSUSE Tumbleweed:bluez-deprecated-5.65-4.1.ppc64le",
"openSUSE Tumbleweed:bluez-deprecated-5.65-4.1.s390x",
"openSUSE Tumbleweed:bluez-deprecated-5.65-4.1.x86_64",
"openSUSE Tumbleweed:bluez-devel-32bit-5.65-4.1.aarch64",
"openSUSE Tumbleweed:bluez-devel-32bit-5.65-4.1.ppc64le",
"openSUSE Tumbleweed:bluez-devel-32bit-5.65-4.1.s390x",
"openSUSE Tumbleweed:bluez-devel-32bit-5.65-4.1.x86_64",
"openSUSE Tumbleweed:bluez-devel-5.65-4.1.aarch64",
"openSUSE Tumbleweed:bluez-devel-5.65-4.1.ppc64le",
"openSUSE Tumbleweed:bluez-devel-5.65-4.1.s390x",
"openSUSE Tumbleweed:bluez-devel-5.65-4.1.x86_64",
"openSUSE Tumbleweed:bluez-obexd-5.65-4.1.aarch64",
"openSUSE Tumbleweed:bluez-obexd-5.65-4.1.ppc64le",
"openSUSE Tumbleweed:bluez-obexd-5.65-4.1.s390x",
"openSUSE Tumbleweed:bluez-obexd-5.65-4.1.x86_64",
"openSUSE Tumbleweed:bluez-test-5.65-4.1.aarch64",
"openSUSE Tumbleweed:bluez-test-5.65-4.1.ppc64le",
"openSUSE Tumbleweed:bluez-test-5.65-4.1.s390x",
"openSUSE Tumbleweed:bluez-test-5.65-4.1.x86_64",
"openSUSE Tumbleweed:bluez-zsh-completion-5.65-4.1.aarch64",
"openSUSE Tumbleweed:bluez-zsh-completion-5.65-4.1.ppc64le",
"openSUSE Tumbleweed:bluez-zsh-completion-5.65-4.1.s390x",
"openSUSE Tumbleweed:bluez-zsh-completion-5.65-4.1.x86_64",
"openSUSE Tumbleweed:libbluetooth3-32bit-5.65-4.1.aarch64",
"openSUSE Tumbleweed:libbluetooth3-32bit-5.65-4.1.ppc64le",
"openSUSE Tumbleweed:libbluetooth3-32bit-5.65-4.1.s390x",
"openSUSE Tumbleweed:libbluetooth3-32bit-5.65-4.1.x86_64",
"openSUSE Tumbleweed:libbluetooth3-5.65-4.1.aarch64",
"openSUSE Tumbleweed:libbluetooth3-5.65-4.1.ppc64le",
"openSUSE Tumbleweed:libbluetooth3-5.65-4.1.s390x",
"openSUSE Tumbleweed:libbluetooth3-5.65-4.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:bluez-5.65-4.1.aarch64",
"openSUSE Tumbleweed:bluez-5.65-4.1.ppc64le",
"openSUSE Tumbleweed:bluez-5.65-4.1.s390x",
"openSUSE Tumbleweed:bluez-5.65-4.1.x86_64",
"openSUSE Tumbleweed:bluez-auto-enable-devices-5.65-4.1.aarch64",
"openSUSE Tumbleweed:bluez-auto-enable-devices-5.65-4.1.ppc64le",
"openSUSE Tumbleweed:bluez-auto-enable-devices-5.65-4.1.s390x",
"openSUSE Tumbleweed:bluez-auto-enable-devices-5.65-4.1.x86_64",
"openSUSE Tumbleweed:bluez-cups-5.65-4.1.aarch64",
"openSUSE Tumbleweed:bluez-cups-5.65-4.1.ppc64le",
"openSUSE Tumbleweed:bluez-cups-5.65-4.1.s390x",
"openSUSE Tumbleweed:bluez-cups-5.65-4.1.x86_64",
"openSUSE Tumbleweed:bluez-deprecated-5.65-4.1.aarch64",
"openSUSE Tumbleweed:bluez-deprecated-5.65-4.1.ppc64le",
"openSUSE Tumbleweed:bluez-deprecated-5.65-4.1.s390x",
"openSUSE Tumbleweed:bluez-deprecated-5.65-4.1.x86_64",
"openSUSE Tumbleweed:bluez-devel-32bit-5.65-4.1.aarch64",
"openSUSE Tumbleweed:bluez-devel-32bit-5.65-4.1.ppc64le",
"openSUSE Tumbleweed:bluez-devel-32bit-5.65-4.1.s390x",
"openSUSE Tumbleweed:bluez-devel-32bit-5.65-4.1.x86_64",
"openSUSE Tumbleweed:bluez-devel-5.65-4.1.aarch64",
"openSUSE Tumbleweed:bluez-devel-5.65-4.1.ppc64le",
"openSUSE Tumbleweed:bluez-devel-5.65-4.1.s390x",
"openSUSE Tumbleweed:bluez-devel-5.65-4.1.x86_64",
"openSUSE Tumbleweed:bluez-obexd-5.65-4.1.aarch64",
"openSUSE Tumbleweed:bluez-obexd-5.65-4.1.ppc64le",
"openSUSE Tumbleweed:bluez-obexd-5.65-4.1.s390x",
"openSUSE Tumbleweed:bluez-obexd-5.65-4.1.x86_64",
"openSUSE Tumbleweed:bluez-test-5.65-4.1.aarch64",
"openSUSE Tumbleweed:bluez-test-5.65-4.1.ppc64le",
"openSUSE Tumbleweed:bluez-test-5.65-4.1.s390x",
"openSUSE Tumbleweed:bluez-test-5.65-4.1.x86_64",
"openSUSE Tumbleweed:bluez-zsh-completion-5.65-4.1.aarch64",
"openSUSE Tumbleweed:bluez-zsh-completion-5.65-4.1.ppc64le",
"openSUSE Tumbleweed:bluez-zsh-completion-5.65-4.1.s390x",
"openSUSE Tumbleweed:bluez-zsh-completion-5.65-4.1.x86_64",
"openSUSE Tumbleweed:libbluetooth3-32bit-5.65-4.1.aarch64",
"openSUSE Tumbleweed:libbluetooth3-32bit-5.65-4.1.ppc64le",
"openSUSE Tumbleweed:libbluetooth3-32bit-5.65-4.1.s390x",
"openSUSE Tumbleweed:libbluetooth3-32bit-5.65-4.1.x86_64",
"openSUSE Tumbleweed:libbluetooth3-5.65-4.1.aarch64",
"openSUSE Tumbleweed:libbluetooth3-5.65-4.1.ppc64le",
"openSUSE Tumbleweed:libbluetooth3-5.65-4.1.s390x",
"openSUSE Tumbleweed:libbluetooth3-5.65-4.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2016-9918"
},
{
"cve": "CVE-2021-0129",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-0129"
}
],
"notes": [
{
"category": "general",
"text": "Improper access control in BlueZ may allow an authenticated user to potentially enable information disclosure via adjacent access.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:bluez-5.65-4.1.aarch64",
"openSUSE Tumbleweed:bluez-5.65-4.1.ppc64le",
"openSUSE Tumbleweed:bluez-5.65-4.1.s390x",
"openSUSE Tumbleweed:bluez-5.65-4.1.x86_64",
"openSUSE Tumbleweed:bluez-auto-enable-devices-5.65-4.1.aarch64",
"openSUSE Tumbleweed:bluez-auto-enable-devices-5.65-4.1.ppc64le",
"openSUSE Tumbleweed:bluez-auto-enable-devices-5.65-4.1.s390x",
"openSUSE Tumbleweed:bluez-auto-enable-devices-5.65-4.1.x86_64",
"openSUSE Tumbleweed:bluez-cups-5.65-4.1.aarch64",
"openSUSE Tumbleweed:bluez-cups-5.65-4.1.ppc64le",
"openSUSE Tumbleweed:bluez-cups-5.65-4.1.s390x",
"openSUSE Tumbleweed:bluez-cups-5.65-4.1.x86_64",
"openSUSE Tumbleweed:bluez-deprecated-5.65-4.1.aarch64",
"openSUSE Tumbleweed:bluez-deprecated-5.65-4.1.ppc64le",
"openSUSE Tumbleweed:bluez-deprecated-5.65-4.1.s390x",
"openSUSE Tumbleweed:bluez-deprecated-5.65-4.1.x86_64",
"openSUSE Tumbleweed:bluez-devel-32bit-5.65-4.1.aarch64",
"openSUSE Tumbleweed:bluez-devel-32bit-5.65-4.1.ppc64le",
"openSUSE Tumbleweed:bluez-devel-32bit-5.65-4.1.s390x",
"openSUSE Tumbleweed:bluez-devel-32bit-5.65-4.1.x86_64",
"openSUSE Tumbleweed:bluez-devel-5.65-4.1.aarch64",
"openSUSE Tumbleweed:bluez-devel-5.65-4.1.ppc64le",
"openSUSE Tumbleweed:bluez-devel-5.65-4.1.s390x",
"openSUSE Tumbleweed:bluez-devel-5.65-4.1.x86_64",
"openSUSE Tumbleweed:bluez-obexd-5.65-4.1.aarch64",
"openSUSE Tumbleweed:bluez-obexd-5.65-4.1.ppc64le",
"openSUSE Tumbleweed:bluez-obexd-5.65-4.1.s390x",
"openSUSE Tumbleweed:bluez-obexd-5.65-4.1.x86_64",
"openSUSE Tumbleweed:bluez-test-5.65-4.1.aarch64",
"openSUSE Tumbleweed:bluez-test-5.65-4.1.ppc64le",
"openSUSE Tumbleweed:bluez-test-5.65-4.1.s390x",
"openSUSE Tumbleweed:bluez-test-5.65-4.1.x86_64",
"openSUSE Tumbleweed:bluez-zsh-completion-5.65-4.1.aarch64",
"openSUSE Tumbleweed:bluez-zsh-completion-5.65-4.1.ppc64le",
"openSUSE Tumbleweed:bluez-zsh-completion-5.65-4.1.s390x",
"openSUSE Tumbleweed:bluez-zsh-completion-5.65-4.1.x86_64",
"openSUSE Tumbleweed:libbluetooth3-32bit-5.65-4.1.aarch64",
"openSUSE Tumbleweed:libbluetooth3-32bit-5.65-4.1.ppc64le",
"openSUSE Tumbleweed:libbluetooth3-32bit-5.65-4.1.s390x",
"openSUSE Tumbleweed:libbluetooth3-32bit-5.65-4.1.x86_64",
"openSUSE Tumbleweed:libbluetooth3-5.65-4.1.aarch64",
"openSUSE Tumbleweed:libbluetooth3-5.65-4.1.ppc64le",
"openSUSE Tumbleweed:libbluetooth3-5.65-4.1.s390x",
"openSUSE Tumbleweed:libbluetooth3-5.65-4.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-0129",
"url": "https://www.suse.com/security/cve/CVE-2021-0129"
},
{
"category": "external",
"summary": "SUSE Bug 1186463 for CVE-2021-0129",
"url": "https://bugzilla.suse.com/1186463"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:bluez-5.65-4.1.aarch64",
"openSUSE Tumbleweed:bluez-5.65-4.1.ppc64le",
"openSUSE Tumbleweed:bluez-5.65-4.1.s390x",
"openSUSE Tumbleweed:bluez-5.65-4.1.x86_64",
"openSUSE Tumbleweed:bluez-auto-enable-devices-5.65-4.1.aarch64",
"openSUSE Tumbleweed:bluez-auto-enable-devices-5.65-4.1.ppc64le",
"openSUSE Tumbleweed:bluez-auto-enable-devices-5.65-4.1.s390x",
"openSUSE Tumbleweed:bluez-auto-enable-devices-5.65-4.1.x86_64",
"openSUSE Tumbleweed:bluez-cups-5.65-4.1.aarch64",
"openSUSE Tumbleweed:bluez-cups-5.65-4.1.ppc64le",
"openSUSE Tumbleweed:bluez-cups-5.65-4.1.s390x",
"openSUSE Tumbleweed:bluez-cups-5.65-4.1.x86_64",
"openSUSE Tumbleweed:bluez-deprecated-5.65-4.1.aarch64",
"openSUSE Tumbleweed:bluez-deprecated-5.65-4.1.ppc64le",
"openSUSE Tumbleweed:bluez-deprecated-5.65-4.1.s390x",
"openSUSE Tumbleweed:bluez-deprecated-5.65-4.1.x86_64",
"openSUSE Tumbleweed:bluez-devel-32bit-5.65-4.1.aarch64",
"openSUSE Tumbleweed:bluez-devel-32bit-5.65-4.1.ppc64le",
"openSUSE Tumbleweed:bluez-devel-32bit-5.65-4.1.s390x",
"openSUSE Tumbleweed:bluez-devel-32bit-5.65-4.1.x86_64",
"openSUSE Tumbleweed:bluez-devel-5.65-4.1.aarch64",
"openSUSE Tumbleweed:bluez-devel-5.65-4.1.ppc64le",
"openSUSE Tumbleweed:bluez-devel-5.65-4.1.s390x",
"openSUSE Tumbleweed:bluez-devel-5.65-4.1.x86_64",
"openSUSE Tumbleweed:bluez-obexd-5.65-4.1.aarch64",
"openSUSE Tumbleweed:bluez-obexd-5.65-4.1.ppc64le",
"openSUSE Tumbleweed:bluez-obexd-5.65-4.1.s390x",
"openSUSE Tumbleweed:bluez-obexd-5.65-4.1.x86_64",
"openSUSE Tumbleweed:bluez-test-5.65-4.1.aarch64",
"openSUSE Tumbleweed:bluez-test-5.65-4.1.ppc64le",
"openSUSE Tumbleweed:bluez-test-5.65-4.1.s390x",
"openSUSE Tumbleweed:bluez-test-5.65-4.1.x86_64",
"openSUSE Tumbleweed:bluez-zsh-completion-5.65-4.1.aarch64",
"openSUSE Tumbleweed:bluez-zsh-completion-5.65-4.1.ppc64le",
"openSUSE Tumbleweed:bluez-zsh-completion-5.65-4.1.s390x",
"openSUSE Tumbleweed:bluez-zsh-completion-5.65-4.1.x86_64",
"openSUSE Tumbleweed:libbluetooth3-32bit-5.65-4.1.aarch64",
"openSUSE Tumbleweed:libbluetooth3-32bit-5.65-4.1.ppc64le",
"openSUSE Tumbleweed:libbluetooth3-32bit-5.65-4.1.s390x",
"openSUSE Tumbleweed:libbluetooth3-32bit-5.65-4.1.x86_64",
"openSUSE Tumbleweed:libbluetooth3-5.65-4.1.aarch64",
"openSUSE Tumbleweed:libbluetooth3-5.65-4.1.ppc64le",
"openSUSE Tumbleweed:libbluetooth3-5.65-4.1.s390x",
"openSUSE Tumbleweed:libbluetooth3-5.65-4.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:bluez-5.65-4.1.aarch64",
"openSUSE Tumbleweed:bluez-5.65-4.1.ppc64le",
"openSUSE Tumbleweed:bluez-5.65-4.1.s390x",
"openSUSE Tumbleweed:bluez-5.65-4.1.x86_64",
"openSUSE Tumbleweed:bluez-auto-enable-devices-5.65-4.1.aarch64",
"openSUSE Tumbleweed:bluez-auto-enable-devices-5.65-4.1.ppc64le",
"openSUSE Tumbleweed:bluez-auto-enable-devices-5.65-4.1.s390x",
"openSUSE Tumbleweed:bluez-auto-enable-devices-5.65-4.1.x86_64",
"openSUSE Tumbleweed:bluez-cups-5.65-4.1.aarch64",
"openSUSE Tumbleweed:bluez-cups-5.65-4.1.ppc64le",
"openSUSE Tumbleweed:bluez-cups-5.65-4.1.s390x",
"openSUSE Tumbleweed:bluez-cups-5.65-4.1.x86_64",
"openSUSE Tumbleweed:bluez-deprecated-5.65-4.1.aarch64",
"openSUSE Tumbleweed:bluez-deprecated-5.65-4.1.ppc64le",
"openSUSE Tumbleweed:bluez-deprecated-5.65-4.1.s390x",
"openSUSE Tumbleweed:bluez-deprecated-5.65-4.1.x86_64",
"openSUSE Tumbleweed:bluez-devel-32bit-5.65-4.1.aarch64",
"openSUSE Tumbleweed:bluez-devel-32bit-5.65-4.1.ppc64le",
"openSUSE Tumbleweed:bluez-devel-32bit-5.65-4.1.s390x",
"openSUSE Tumbleweed:bluez-devel-32bit-5.65-4.1.x86_64",
"openSUSE Tumbleweed:bluez-devel-5.65-4.1.aarch64",
"openSUSE Tumbleweed:bluez-devel-5.65-4.1.ppc64le",
"openSUSE Tumbleweed:bluez-devel-5.65-4.1.s390x",
"openSUSE Tumbleweed:bluez-devel-5.65-4.1.x86_64",
"openSUSE Tumbleweed:bluez-obexd-5.65-4.1.aarch64",
"openSUSE Tumbleweed:bluez-obexd-5.65-4.1.ppc64le",
"openSUSE Tumbleweed:bluez-obexd-5.65-4.1.s390x",
"openSUSE Tumbleweed:bluez-obexd-5.65-4.1.x86_64",
"openSUSE Tumbleweed:bluez-test-5.65-4.1.aarch64",
"openSUSE Tumbleweed:bluez-test-5.65-4.1.ppc64le",
"openSUSE Tumbleweed:bluez-test-5.65-4.1.s390x",
"openSUSE Tumbleweed:bluez-test-5.65-4.1.x86_64",
"openSUSE Tumbleweed:bluez-zsh-completion-5.65-4.1.aarch64",
"openSUSE Tumbleweed:bluez-zsh-completion-5.65-4.1.ppc64le",
"openSUSE Tumbleweed:bluez-zsh-completion-5.65-4.1.s390x",
"openSUSE Tumbleweed:bluez-zsh-completion-5.65-4.1.x86_64",
"openSUSE Tumbleweed:libbluetooth3-32bit-5.65-4.1.aarch64",
"openSUSE Tumbleweed:libbluetooth3-32bit-5.65-4.1.ppc64le",
"openSUSE Tumbleweed:libbluetooth3-32bit-5.65-4.1.s390x",
"openSUSE Tumbleweed:libbluetooth3-32bit-5.65-4.1.x86_64",
"openSUSE Tumbleweed:libbluetooth3-5.65-4.1.aarch64",
"openSUSE Tumbleweed:libbluetooth3-5.65-4.1.ppc64le",
"openSUSE Tumbleweed:libbluetooth3-5.65-4.1.s390x",
"openSUSE Tumbleweed:libbluetooth3-5.65-4.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2021-0129"
},
{
"cve": "CVE-2021-3588",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3588"
}
],
"notes": [
{
"category": "general",
"text": "The cli_feat_read_cb() function in src/gatt-database.c does not perform bounds checks on the \u0027offset\u0027 variable before using it as an index into an array for reading.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:bluez-5.65-4.1.aarch64",
"openSUSE Tumbleweed:bluez-5.65-4.1.ppc64le",
"openSUSE Tumbleweed:bluez-5.65-4.1.s390x",
"openSUSE Tumbleweed:bluez-5.65-4.1.x86_64",
"openSUSE Tumbleweed:bluez-auto-enable-devices-5.65-4.1.aarch64",
"openSUSE Tumbleweed:bluez-auto-enable-devices-5.65-4.1.ppc64le",
"openSUSE Tumbleweed:bluez-auto-enable-devices-5.65-4.1.s390x",
"openSUSE Tumbleweed:bluez-auto-enable-devices-5.65-4.1.x86_64",
"openSUSE Tumbleweed:bluez-cups-5.65-4.1.aarch64",
"openSUSE Tumbleweed:bluez-cups-5.65-4.1.ppc64le",
"openSUSE Tumbleweed:bluez-cups-5.65-4.1.s390x",
"openSUSE Tumbleweed:bluez-cups-5.65-4.1.x86_64",
"openSUSE Tumbleweed:bluez-deprecated-5.65-4.1.aarch64",
"openSUSE Tumbleweed:bluez-deprecated-5.65-4.1.ppc64le",
"openSUSE Tumbleweed:bluez-deprecated-5.65-4.1.s390x",
"openSUSE Tumbleweed:bluez-deprecated-5.65-4.1.x86_64",
"openSUSE Tumbleweed:bluez-devel-32bit-5.65-4.1.aarch64",
"openSUSE Tumbleweed:bluez-devel-32bit-5.65-4.1.ppc64le",
"openSUSE Tumbleweed:bluez-devel-32bit-5.65-4.1.s390x",
"openSUSE Tumbleweed:bluez-devel-32bit-5.65-4.1.x86_64",
"openSUSE Tumbleweed:bluez-devel-5.65-4.1.aarch64",
"openSUSE Tumbleweed:bluez-devel-5.65-4.1.ppc64le",
"openSUSE Tumbleweed:bluez-devel-5.65-4.1.s390x",
"openSUSE Tumbleweed:bluez-devel-5.65-4.1.x86_64",
"openSUSE Tumbleweed:bluez-obexd-5.65-4.1.aarch64",
"openSUSE Tumbleweed:bluez-obexd-5.65-4.1.ppc64le",
"openSUSE Tumbleweed:bluez-obexd-5.65-4.1.s390x",
"openSUSE Tumbleweed:bluez-obexd-5.65-4.1.x86_64",
"openSUSE Tumbleweed:bluez-test-5.65-4.1.aarch64",
"openSUSE Tumbleweed:bluez-test-5.65-4.1.ppc64le",
"openSUSE Tumbleweed:bluez-test-5.65-4.1.s390x",
"openSUSE Tumbleweed:bluez-test-5.65-4.1.x86_64",
"openSUSE Tumbleweed:bluez-zsh-completion-5.65-4.1.aarch64",
"openSUSE Tumbleweed:bluez-zsh-completion-5.65-4.1.ppc64le",
"openSUSE Tumbleweed:bluez-zsh-completion-5.65-4.1.s390x",
"openSUSE Tumbleweed:bluez-zsh-completion-5.65-4.1.x86_64",
"openSUSE Tumbleweed:libbluetooth3-32bit-5.65-4.1.aarch64",
"openSUSE Tumbleweed:libbluetooth3-32bit-5.65-4.1.ppc64le",
"openSUSE Tumbleweed:libbluetooth3-32bit-5.65-4.1.s390x",
"openSUSE Tumbleweed:libbluetooth3-32bit-5.65-4.1.x86_64",
"openSUSE Tumbleweed:libbluetooth3-5.65-4.1.aarch64",
"openSUSE Tumbleweed:libbluetooth3-5.65-4.1.ppc64le",
"openSUSE Tumbleweed:libbluetooth3-5.65-4.1.s390x",
"openSUSE Tumbleweed:libbluetooth3-5.65-4.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3588",
"url": "https://www.suse.com/security/cve/CVE-2021-3588"
},
{
"category": "external",
"summary": "SUSE Bug 1187165 for CVE-2021-3588",
"url": "https://bugzilla.suse.com/1187165"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:bluez-5.65-4.1.aarch64",
"openSUSE Tumbleweed:bluez-5.65-4.1.ppc64le",
"openSUSE Tumbleweed:bluez-5.65-4.1.s390x",
"openSUSE Tumbleweed:bluez-5.65-4.1.x86_64",
"openSUSE Tumbleweed:bluez-auto-enable-devices-5.65-4.1.aarch64",
"openSUSE Tumbleweed:bluez-auto-enable-devices-5.65-4.1.ppc64le",
"openSUSE Tumbleweed:bluez-auto-enable-devices-5.65-4.1.s390x",
"openSUSE Tumbleweed:bluez-auto-enable-devices-5.65-4.1.x86_64",
"openSUSE Tumbleweed:bluez-cups-5.65-4.1.aarch64",
"openSUSE Tumbleweed:bluez-cups-5.65-4.1.ppc64le",
"openSUSE Tumbleweed:bluez-cups-5.65-4.1.s390x",
"openSUSE Tumbleweed:bluez-cups-5.65-4.1.x86_64",
"openSUSE Tumbleweed:bluez-deprecated-5.65-4.1.aarch64",
"openSUSE Tumbleweed:bluez-deprecated-5.65-4.1.ppc64le",
"openSUSE Tumbleweed:bluez-deprecated-5.65-4.1.s390x",
"openSUSE Tumbleweed:bluez-deprecated-5.65-4.1.x86_64",
"openSUSE Tumbleweed:bluez-devel-32bit-5.65-4.1.aarch64",
"openSUSE Tumbleweed:bluez-devel-32bit-5.65-4.1.ppc64le",
"openSUSE Tumbleweed:bluez-devel-32bit-5.65-4.1.s390x",
"openSUSE Tumbleweed:bluez-devel-32bit-5.65-4.1.x86_64",
"openSUSE Tumbleweed:bluez-devel-5.65-4.1.aarch64",
"openSUSE Tumbleweed:bluez-devel-5.65-4.1.ppc64le",
"openSUSE Tumbleweed:bluez-devel-5.65-4.1.s390x",
"openSUSE Tumbleweed:bluez-devel-5.65-4.1.x86_64",
"openSUSE Tumbleweed:bluez-obexd-5.65-4.1.aarch64",
"openSUSE Tumbleweed:bluez-obexd-5.65-4.1.ppc64le",
"openSUSE Tumbleweed:bluez-obexd-5.65-4.1.s390x",
"openSUSE Tumbleweed:bluez-obexd-5.65-4.1.x86_64",
"openSUSE Tumbleweed:bluez-test-5.65-4.1.aarch64",
"openSUSE Tumbleweed:bluez-test-5.65-4.1.ppc64le",
"openSUSE Tumbleweed:bluez-test-5.65-4.1.s390x",
"openSUSE Tumbleweed:bluez-test-5.65-4.1.x86_64",
"openSUSE Tumbleweed:bluez-zsh-completion-5.65-4.1.aarch64",
"openSUSE Tumbleweed:bluez-zsh-completion-5.65-4.1.ppc64le",
"openSUSE Tumbleweed:bluez-zsh-completion-5.65-4.1.s390x",
"openSUSE Tumbleweed:bluez-zsh-completion-5.65-4.1.x86_64",
"openSUSE Tumbleweed:libbluetooth3-32bit-5.65-4.1.aarch64",
"openSUSE Tumbleweed:libbluetooth3-32bit-5.65-4.1.ppc64le",
"openSUSE Tumbleweed:libbluetooth3-32bit-5.65-4.1.s390x",
"openSUSE Tumbleweed:libbluetooth3-32bit-5.65-4.1.x86_64",
"openSUSE Tumbleweed:libbluetooth3-5.65-4.1.aarch64",
"openSUSE Tumbleweed:libbluetooth3-5.65-4.1.ppc64le",
"openSUSE Tumbleweed:libbluetooth3-5.65-4.1.s390x",
"openSUSE Tumbleweed:libbluetooth3-5.65-4.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:bluez-5.65-4.1.aarch64",
"openSUSE Tumbleweed:bluez-5.65-4.1.ppc64le",
"openSUSE Tumbleweed:bluez-5.65-4.1.s390x",
"openSUSE Tumbleweed:bluez-5.65-4.1.x86_64",
"openSUSE Tumbleweed:bluez-auto-enable-devices-5.65-4.1.aarch64",
"openSUSE Tumbleweed:bluez-auto-enable-devices-5.65-4.1.ppc64le",
"openSUSE Tumbleweed:bluez-auto-enable-devices-5.65-4.1.s390x",
"openSUSE Tumbleweed:bluez-auto-enable-devices-5.65-4.1.x86_64",
"openSUSE Tumbleweed:bluez-cups-5.65-4.1.aarch64",
"openSUSE Tumbleweed:bluez-cups-5.65-4.1.ppc64le",
"openSUSE Tumbleweed:bluez-cups-5.65-4.1.s390x",
"openSUSE Tumbleweed:bluez-cups-5.65-4.1.x86_64",
"openSUSE Tumbleweed:bluez-deprecated-5.65-4.1.aarch64",
"openSUSE Tumbleweed:bluez-deprecated-5.65-4.1.ppc64le",
"openSUSE Tumbleweed:bluez-deprecated-5.65-4.1.s390x",
"openSUSE Tumbleweed:bluez-deprecated-5.65-4.1.x86_64",
"openSUSE Tumbleweed:bluez-devel-32bit-5.65-4.1.aarch64",
"openSUSE Tumbleweed:bluez-devel-32bit-5.65-4.1.ppc64le",
"openSUSE Tumbleweed:bluez-devel-32bit-5.65-4.1.s390x",
"openSUSE Tumbleweed:bluez-devel-32bit-5.65-4.1.x86_64",
"openSUSE Tumbleweed:bluez-devel-5.65-4.1.aarch64",
"openSUSE Tumbleweed:bluez-devel-5.65-4.1.ppc64le",
"openSUSE Tumbleweed:bluez-devel-5.65-4.1.s390x",
"openSUSE Tumbleweed:bluez-devel-5.65-4.1.x86_64",
"openSUSE Tumbleweed:bluez-obexd-5.65-4.1.aarch64",
"openSUSE Tumbleweed:bluez-obexd-5.65-4.1.ppc64le",
"openSUSE Tumbleweed:bluez-obexd-5.65-4.1.s390x",
"openSUSE Tumbleweed:bluez-obexd-5.65-4.1.x86_64",
"openSUSE Tumbleweed:bluez-test-5.65-4.1.aarch64",
"openSUSE Tumbleweed:bluez-test-5.65-4.1.ppc64le",
"openSUSE Tumbleweed:bluez-test-5.65-4.1.s390x",
"openSUSE Tumbleweed:bluez-test-5.65-4.1.x86_64",
"openSUSE Tumbleweed:bluez-zsh-completion-5.65-4.1.aarch64",
"openSUSE Tumbleweed:bluez-zsh-completion-5.65-4.1.ppc64le",
"openSUSE Tumbleweed:bluez-zsh-completion-5.65-4.1.s390x",
"openSUSE Tumbleweed:bluez-zsh-completion-5.65-4.1.x86_64",
"openSUSE Tumbleweed:libbluetooth3-32bit-5.65-4.1.aarch64",
"openSUSE Tumbleweed:libbluetooth3-32bit-5.65-4.1.ppc64le",
"openSUSE Tumbleweed:libbluetooth3-32bit-5.65-4.1.s390x",
"openSUSE Tumbleweed:libbluetooth3-32bit-5.65-4.1.x86_64",
"openSUSE Tumbleweed:libbluetooth3-5.65-4.1.aarch64",
"openSUSE Tumbleweed:libbluetooth3-5.65-4.1.ppc64le",
"openSUSE Tumbleweed:libbluetooth3-5.65-4.1.s390x",
"openSUSE Tumbleweed:libbluetooth3-5.65-4.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2021-3588"
}
]
}
opensuse-su-2021:2184-1
Vulnerability from csaf_opensuse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel",
"title": "Title of the patch"
},
{
"category": "description",
"text": "The SUSE Linux Enterprise 15 SP3 kernel was updated to receive various security and bugfixes.\n\n\nThe following security bugs were fixed:\n\n- CVE-2020-26558: Bluetooth LE and BR/EDR secure pairing in Bluetooth Core Specification 2.1 may permit a nearby man-in-the-middle attacker to identify the Passkey used during pairing by reflection of the public key and the authentication evidence of the initiating device, potentially permitting this attacker to complete authenticated pairing with the responding device using the correct Passkey for the pairing session. (bnc#1179610 bnc#1186463)\n- CVE-2021-0129: Improper access control in BlueZ may have allowed an authenticated user to potentially enable information disclosure via adjacent access (bnc#1186463).\n- CVE-2020-36385: Fixed a use-after-free in drivers/infiniband/core/ucma.c which could be triggered if the ctx is reached via the ctx_list in some ucma_migrate_id situations where ucma_close is called (bnc#1187050).\n- CVE-2020-36386: Fixed a slab out-of-bounds read in hci_extended_inquiry_result_evt (bnc#1187038).\n\nThe following non-security bugs were fixed:\n\n- ACPICA: Clean up context mutex during object deletion (git-fixes).\n- ALSA: hda/cirrus: Set Initial DMIC volume to -26 dB (git-fixes).\n- ALSA: hda: Fix for mute key LED for HP Pavilion 15-CK0xx (git-fixes).\n- ALSA: hda: Fix for mute key LED for HP Pavilion 15-CK0xx (git-fixes).\n- ALSA: hda/realtek: fix mute/micmute LEDs and speaker for HP EliteBook x360 1040 G8 (git-fixes).\n- ALSA: hda/realtek: fix mute/micmute LEDs and speaker for HP Elite Dragonfly G2 (git-fixes).\n- ALSA: hda/realtek: fix mute/micmute LEDs for HP EliteBook 840 Aero G8 (git-fixes).\n- ALSA: hda/realtek: fix mute/micmute LEDs for HP ZBook Power G8 (git-fixes).\n- ALSA: hda/realtek: headphone and mic do not work on an Acer laptop (git-fixes).\n- ALSA: hda: update the power_state during the direct-complete (git-fixes).\n- ALSA: seq: Fix race of snd_seq_timer_open() (git-fixes).\n- ALSA: timer: Fix master timer notification (git-fixes).\n- arm64: Add missing ISB after invalidating TLB in __primary_switch (git-fixes).\n- arm64: avoid -Woverride-init warning (git-fixes).\n- arm64: kasan: fix page_alloc tagging with DEBUG_VIRTUAL (git-fixes).\n- arm64: kdump: update ppos when reading elfcorehdr (git-fixes).\n- arm64: kexec_file: fix memory leakage in create_dtb() when fdt_open_into() fails (git-fixes).\n- arm64: link with -z norelro for LLD or aarch64-elf (git-fixes).\n- arm64: link with -z norelro regardless of CONFIG_RELOCATABLE (git-fixes).\n- arm64/mm: Fix pfn_valid() for ZONE_DEVICE based memory (git-fixes).\n- arm64: ptrace: Fix seccomp of traced syscall -1 (NO_SYSCALL) (git-fixes).\n- arm64: ptrace: Use NO_SYSCALL instead of -1 in syscall_trace_enter() (git-fixes).\n- ARM64: vdso32: Install vdso32 from vdso_install (git-fixes).\n- arm64: vdso32: make vdso32 install conditional (git-fixes).\n- arm: mm: use __pfn_to_section() to get mem_section (git-fixes).\n- ASoC: amd: fix for pcm_read() error (git-fixes).\n- ASoC: cs43130: handle errors in cs43130_probe() properly (git-fixes).\n- ASoC: Intel: soc-acpi: remove TGL RVP mixed SoundWire/TDM config (git-fixes).\n- ASoC: max98088: fix ni clock divider calculation (git-fixes).\n- ath6kl: return error code in ath6kl_wmi_set_roam_lrssi_cmd() (git-fixes).\n- bcache: avoid oversized read request in cache missing code path (bsc#1187357, bsc#1185570, bsc#1184631).\n- bcache: Convert to DEFINE_SHOW_ATTRIBUTE (bsc#1187357).\n- bcache: do not pass BIOSET_NEED_BVECS for the \u0027bio_set\u0027 embedded in \u0027cache_set\u0027 (bsc#1187357).\n- bcache: fix a regression of code compiling failure in debug.c (bsc#1187357).\n- bcache: inherit the optimal I/O size (bsc#1187357).\n- bcache: reduce redundant code in bch_cached_dev_run() (bsc#1187357).\n- bcache: remove bcache device self-defined readahead (bsc#1187357, bsc#1185570, bsc#1184631).\n- bcache: remove PTR_CACHE (bsc#1187357).\n- bcache: Use 64-bit arithmetic instead of 32-bit (bsc#1187357).\n- bcache: use NULL instead of using plain integer as pointer (bsc#1187357).\n- blk-mq: Swap two calls in blk_mq_exit_queue() (git-fixes).\n- blk-settings: align max_sectors on \u0027logical_block_size\u0027 boundary (bsc#1185195).\n- block/genhd: use atomic_t for disk_event-\u003eblock (bsc#1185497).\n- block: return the correct bvec when checking for gaps (bsc#1187143).\n- block: return the correct bvec when checking for gaps (bsc#1187144).\n- Bluetooth: fix the erroneous flush_work() order (git-fixes).\n- brcmfmac: Add clm_blob firmware files to modinfo (bsc#1186677).\n- brcmfmac: properly check for bus register errors (git-fixes).\n- btrfs: open device without device_list_mutex (bsc#1176771).\n- bus: ti-sysc: Fix flakey idling of uarts and stop using swsup_sidle_act (git-fixes).\n- cdrom: gdrom: deallocate struct gdrom_unit fields in remove_gdrom (git-fixes).\n- cdrom: gdrom: initialize global variable at init time (git-fixes).\n- ceph: do not clobber i_snap_caps on non-I_NEW inode (bsc#1186501).\n- ceph: fix inode leak on getattr error in __fh_to_dentry (bsc#1186501).\n- ceph: fix up error handling with snapdirs (bsc#1186501).\n- ceph: only check pool permissions for regular files (bsc#1186501).\n- char: hpet: add checks after calling ioremap (git-fixes).\n- chelsio/chtls: unlock on error in chtls_pt_recvmsg() (jsc#SLE-15129).\n- cxgb4: avoid accessing registers when clearing filters (git-fixes).\n- cxgb4: avoid link re-train during TC-MQPRIO configuration (jsc#SLE-8389).\n- cxgb4/ch_ktls: Clear resources when pf4 device is removed (jsc#SLE-15129).\n- cxgb4: fix regression with HASH tc prio value update (jsc#SLE-15131).\n- devlink: Correct VIRTUAL port to not have phys_port attributes (jsc#SLE-15172).\n- dmaengine: idxd: add missing dsa driver unregister (git-fixes).\n- dmaengine: idxd: Use cpu_feature_enabled() (git-fixes).\n- dmaengine: qcom_hidma: comment platform_driver_register call (git-fixes).\n- drm/amd/amdgpu: fix a potential deadlock in gpu reset (git-fixes).\n- drm/amd/amdgpu: fix refcount leak (git-fixes).\n- drm/amd/display: Disconnect non-DP with no EDID (git-fixes).\n- drm/amdgpu: Do not query CE and UE errors (git-fixes).\n- drm/amdgpu: Fix a use-after-free (git-fixes).\n- drm/amdgpu/jpeg2.0: add cancel_delayed_work_sync before power gate (git-fixes).\n- drm/amdgpu/jpeg2.5: add cancel_delayed_work_sync before power gate (git-fixes).\n- drm/amdgpu/jpeg3: add cancel_delayed_work_sync before power gate (git-fixes).\n- drm/amdgpu: make sure we unpin the UVD BO (git-fixes).\n- drm/amdgpu: stop touching sched.ready in the backend (git-fixes).\n- drm/amdgpu/vcn1: add cancel_delayed_work_sync before power gate (git-fixes).\n- drm/amdgpu/vcn2.0: add cancel_delayed_work_sync before power gate (git-fixes).\n- drm/amdgpu/vcn2.5: add cancel_delayed_work_sync before power gate (git-fixes).\n- drm/amdgpu/vcn3: add cancel_delayed_work_sync before power gate (git-fixes).\n- drm/amdkfd: correct sienna_cichlid SDMA RLC register offset error (git-fixes).\n- drm/i915/selftests: Fix return value check in live_breadcrumbs_smoketest() (git-fixes).\n- drm/mcde: Fix off by 10^3 in calculation (git-fixes).\n- drm/meson: fix shutdown crash when component not probed (git-fixes).\n- drm/msm/a6xx: fix incorrectly set uavflagprd_inv field for A650 (git-fixes).\n- drm/msm/a6xx: update/fix CP_PROTECT initialization (git-fixes).\n- efi: Allow EFI_MEMORY_XP and EFI_MEMORY_RO both to be cleared (git-fixes).\n- efi: cper: fix snprintf() use in cper_dimm_err_location() (git-fixes).\n- efi/libstub: prevent read overflow in find_file_option() (git-fixes).\n- Enable CONFIG_PCI_PF_STUB for Nvidia Ampere vGPU support (jsc#SLE-17882 jsc#ECO-3691) \n- fs/nfs: Use fatal_signal_pending instead of signal_pending (git-fixes).\n- gpio: cadence: Add missing MODULE_DEVICE_TABLE (git-fixes).\n- gpio: wcd934x: Fix shift-out-of-bounds error (git-fixes).\n- gve: Add NULL pointer checks when freeing irqs (git-fixes).\n- gve: Correct SKB queue index validation (git-fixes).\n- gve: Update mgmt_msix_idx if num_ntfy changes (git-fixes).\n- gve: Upgrade memory barrier in poll routine (git-fixes).\n- HID: i2c-hid: fix format string mismatch (git-fixes).\n- HID: i2c-hid: Skip ELAN power-on command after reset (git-fixes).\n- HID: magicmouse: fix NULL-deref on disconnect (git-fixes).\n- HID: multitouch: require Finger field to mark Win8 reports as MT (git-fixes).\n- HID: pidff: fix error return code in hid_pidff_init() (git-fixes).\n- hwmon: (dell-smm-hwmon) Fix index values (git-fixes).\n- i2c: i801: Do not generate an interrupt on bus reset (git-fixes).\n- i2c: imx: fix reference leak when pm_runtime_get_sync fails (git-fixes).\n- i2c: qcom-geni: Suspend and resume the bus during SYSTEM_SLEEP_PM ops (git-fixes).\n- i2c: s3c2410: fix possible NULL pointer deref on read message after write (git-fixes).\n- i2c: sh_mobile: Use new clock calculation formulas for RZ/G2E (git-fixes).\n- ice: Allow all LLDP packets from PF to Tx (jsc#SLE-7926).\n- ice: Fix allowing VF to request more/less queues via virtchnl (jsc#SLE-12878).\n- ice: Fix VFR issues for AVF drivers that expect ATQLEN cleared (git-fixes).\n- ice: handle the VF VSI rebuild failure (jsc#SLE-12878).\n- iio: adc: ad7124: Fix missbalanced regulator enable / disable on error (git-fixes).\n- iio: adc: ad7124: Fix potential overflow due to non sequential channel numbers (git-fixes).\n- iio: adc: ad7768-1: Fix too small buffer passed to iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: adc: ad7793: Add missing error code in ad7793_setup() (git-fixes).\n- iio: gyro: fxas21002c: balance runtime power in error path (git-fixes).\n- iommu/amd: Keep track of amd_iommu_irq_remap state (https://bugzilla.kernel.org/show_bug.cgi?id=212133).\n- iommu: Fix a boundary issue to avoid performance drop (bsc#1187344).\n- iommu/virtio: Add missing MODULE_DEVICE_TABLE (bsc#1187345).\n- iommu/vt-d: Remove WO permissions on second-level paging entries (bsc#1187346).\n- iommu/vt-d: Report right snoop capability when using FL for IOVA (bsc#1187347).\n- iommu/vt-d: Use user privilege for RID2PASID translation (bsc#1187348).\n- isdn: mISDN: correctly handle ph_info allocation failure in hfcsusb_ph_info (git-fixes).\n- isdn: mISDNinfineon: check/cleanup ioremap failure correctly in setup_io (git-fixes).\n- ixgbe: fix large MTU request from VF (git-fixes).\n- kABI workaround for rtw88 (git-fixes).\n- kABI workaround for struct lis3lv02d change (git-fixes).\n- lib: crc64: fix kernel-doc warning (bsc#1187357).\n- libertas: register sysfs groups properly (git-fixes).\n- locking/mutex: clear MUTEX_FLAGS if wait_list is empty due to signal (git-fixes).\n- md: bcache: avoid -Wempty-body warnings (bsc#1187357).\n- md: bcache: Trivial typo fixes in the file journal.c (bsc#1187357).\n- md: Fix missing unused status line of /proc/mdstat (git-fixes).\n- media: dvb: Add check on sp8870_readreg return (git-fixes).\n- media: dvb: Add check on sp8870_readreg return (git-fixes).\n- media: gspca: mt9m111: Check write_bridge for timeout (git-fixes).\n- media: gspca: mt9m111: Check write_bridge for timeout (git-fixes).\n- media: gspca: properly check for errors in po1030_probe() (git-fixes).\n- media: gspca: properly check for errors in po1030_probe() (git-fixes).\n- mei: request autosuspend after sending rx flow control (git-fixes).\n- misc/uss720: fix memory leak in uss720_probe (git-fixes).\n- mmc: sdhci: Clear unused bounce buffer at DMA mmap error path (bsc#1187039).\n- net: bnx2: Fix error return code in bnx2_init_board() (git-fixes).\n- netfilter: nf_tables: missing error reporting for not selected expressions (bsc#1176447).\n- netfilter: nft_set_pipapo_avx2: Add irq_fpu_usable() check, fallback to non-AVX2 version (bsc#1176447).\n- net: fix iteration for sctp transport seq_files (git-fixes).\n- net: hns3: fix incorrect resp_msg issue (jsc#SLE-14777).\n- net: hns3: Limiting the scope of vector_ring_chain variable (git-fixes).\n- net: hns3: put off calling register_netdev() until client initialize complete (bsc#1154353).\n- net/mlx4: Fix EEPROM dump support (git-fixes).\n- net/mlx5: DR, Create multi-destination flow table with level less than 64 (jsc#SLE-8464).\n- net/mlx5e: Fix error path of updating netdev queues (jsc#SLE-15172).\n- net/mlx5e: Fix incompatible casting (jsc#SLE-15172).\n- net/mlx5e: Fix multipath lag activation (git-fixes).\n- net/mlx5e: Fix null deref accessing lag dev (jsc#SLE-15172).\n- net/mlx5e: Fix nullptr in add_vlan_push_action() (git-fixes).\n- net/mlx5e: reset XPS on error flow if netdev isn\u0027t registered yet (jsc#SLE-15172).\n- net/mlx5: Set reformat action when needed for termination rules (jsc#SLE-15172).\n- net/mlx5: Set term table as an unmanaged flow table (jsc#SLE-15172).\n- net/sched: act_ct: Offload connections with commit action (jsc#SLE-15172).\n- net/sched: fq_pie: fix OOB access in the traffic path (jsc#SLE-15172).\n- net/sched: fq_pie: re-factor fix for fq_pie endless loop (jsc#SLE-15172).\n- net: usb: fix memory leak in smsc75xx_bind (git-fixes).\n- net: zero-initialize tc skb extension on allocation (bsc#1176447).\n- nfc: fix NULL ptr dereference in llcp_sock_getname() after failed connect (git-fixes).\n- NFC: SUSE specific brutal fix for runtime PM (bsc#1185589).\n- NFS: Deal correctly with attribute generation counter overflow (git-fixes).\n- NFS: Do not corrupt the value of pg_bytes_written in nfs_do_recoalesce() (git-fixes).\n- NFS: Do not discard pNFS layout segments that are marked for return (git-fixes).\n- NFS: Do not gratuitously clear the inode cache when lookup failed (git-fixes).\n- NFS: Do not revalidate the directory permissions on a lookup failure (git-fixes).\n- nfsd: register pernet ops last, unregister first (git-fixes).\n- NFSD: Repair misuse of sv_lock in 5.10.16-rt30 (git-fixes).\n- NFS: fix an incorrect limit in filelayout_decode_layout() (git-fixes).\n- NFS: Fix an Oopsable condition in __nfs_pageio_add_request() (git-fixes).\n- NFSv4.2: Always flush out writes in nfs42_proc_fallocate() (git-fixes).\n- NFSv42: Copy offload should update the file size when appropriate (git-fixes).\n- NFSv4.2 fix handling of sr_eof in SEEK\u0027s reply (git-fixes).\n- NFSv4.2: fix return value of _nfs4_get_security_label() (git-fixes).\n- NFSv4: Do not discard segments marked for return in _pnfs_return_layout() (git-fixes).\n- NFSv4: Fix a NULL pointer dereference in pnfs_mark_matching_lsegs_return() (git-fixes).\n- NFSv4: Fix v4.0/v4.1 SEEK_DATA return -ENOTSUPP when set NFS_V4_2 config (git-fixes).\n- nvme: add new line after variable declatation (bsc#1184259, bsc#1178612, bsc#1186155).\n- nvme: document nvme controller states (git-fixes).\n- nvme: do not check nvme_req flags for new req (bsc#1184259, bsc#1178612, bsc#1186155).\n- nvme: fix deadlock in disconnect during scan_work and/or ana_work (git-fixes).\n- nvme: mark nvme_setup_passsthru() inline (bsc#1184259, bsc#1178612, bsc#1186155).\n- nvme-multipath: fix double initialization of ANA state (bsc#1178612, bsc#1184259, bsc#1186155).\n- nvme-pci: align io queue count with allocted nvme_queue in (git-fixes).\n- nvme-pci: avoid race between nvme_reap_pending_cqes() and nvme_poll() (git-fixes).\n- nvme-pci: dma read memory barrier for completions (git-fixes).\n- nvme-pci: fix \u0027slimmer CQ head update\u0027 (git-fixes).\n- nvme-pci: make sure write/poll_queues less or equal then cpu (git-fixes).\n- nvme-pci: remove last_sq_tail (git-fixes).\n- nvme-pci: Remove tag from process cq (git-fixes).\n- nvme-pci: Remove two-pass completions (git-fixes).\n- nvme-pci: remove volatile cqes (git-fixes).\n- nvme-pci: Simplify nvme_poll_irqdisable (git-fixes).\n- nvme-pci: slimmer CQ head update (git-fixes).\n- nvme-pci: use simple suspend when a HMB is enabled (git-fixes).\n- nvme: reduce checks for zero command effects (bsc#1184259, bsc#1178612, bsc#1186155).\n- nvme: rename nvme_init_identify() (bsc#1184259, bsc#1178612, bsc#1186155).\n- nvme: split init identify into helper (bsc#1184259, bsc#1178612, bsc#1186155).\n- nvmet: use new ana_log_size instead the old one (bsc#1178612, bsc#1184259, bsc#1186155).\n- nvme: use NVME_CTRL_CMIC_ANA macro (bsc#1184259, bsc#1178612, bsc#1186155).\n- nxp-i2c: restore includes for kABI (bsc#1185589).\n- nxp-nci: add NXP1002 id (bsc#1185589).\n- PCI/LINK: Remove bandwidth notification (bsc#1183712).\n- pid: take a reference when initializing `cad_pid` (bsc#1152489).\n- platform/x86: hp_accel: Avoid invoking _INI to speed up resume (git-fixes).\n- platform/x86: hp-wireless: add AMD\u0027s hardware id to the supported list (git-fixes).\n- platform/x86: intel_punit_ipc: Append MODULE_DEVICE_TABLE for ACPI (git-fixes).\n- platform/x86: touchscreen_dmi: Add info for the Mediacom Winpad 7.0 W700 tablet (git-fixes).\n- PM: sleep: Add pm_debug_messages kernel command line option (bsc#1186752).\n- pNFS/flexfiles: fix incorrect size check in decode_nfs_fh() (git-fixes).\n- pNFS/NFSv4: Fix a layout segment leak in pnfs_layout_process() (git-fixes).\n- powerpc/32: Fix boot failure with CONFIG_STACKPROTECTOR (jsc#SLE-13847 git-fixes).\n- powerpc/kprobes: Fix validation of prefixed instructions across page boundary (jsc#SLE-13847 git-fixes).\n- regulator: core: resolve supply for boot-on/always-on regulators (git-fixes).\n- regulator: max77620: Use device_set_of_node_from_dev() (git-fixes).\n- rtw88: 8822c: add LC calibration for RTL8822C (git-fixes).\n- scsi: aacraid: Fix an oops in error handling (bsc#1187072).\n- scsi: aacraid: Remove erroneous fallthrough annotation (bsc#1186950).\n- scsi: aacraid: Use memdup_user() as a cleanup (bsc#1186951).\n- scsi: acornscsi: Fix an error handling path in acornscsi_probe() (bsc#1186952).\n- scsi: be2iscsi: Fix a theoretical leak in beiscsi_create_eqs() (bsc#1186953).\n- scsi: be2iscsi: Revert \u0027Fix a theoretical leak in beiscsi_create_eqs()\u0027 (bsc#1187067).\n- scsi: bfa: Fix error return in bfad_pci_init() (bsc#1186954).\n- scsi: bnx2fc: Fix Kconfig warning \u0026 CNIC build errors (bsc#1186955).\n- scsi: bnx2i: Requires MMU (bsc#1186956).\n- scsi: csiostor: Fix wrong return value in csio_hw_prep_fw() (bsc#1186957).\n- scsi: cumana_2: Fix different dev_id between request_irq() and free_irq() (bsc#1186958).\n- scsi: cxgb3i: Fix some leaks in init_act_open() (bsc#1186959).\n- scsi: cxgb4i: Fix TLS dependency (bsc#1186960).\n- scsi: eesox: Fix different dev_id between request_irq() and free_irq() (bsc#1186961).\n- scsi: fnic: Fix error return code in fnic_probe() (bsc#1186962).\n- scsi: hisi_sas: Fix IRQ checks (bsc#1186963).\n- scsi: hisi_sas: Remove preemptible() (bsc#1186964).\n- scsi: jazz_esp: Add IRQ check (bsc#1186965).\n- scsi: libfc: Fix enum-conversion warning (bsc#1186966).\n- scsi: libsas: Fix error path in sas_notify_lldd_dev_found() (bsc#1186967).\n- scsi: libsas: Reset num_scatter if libata marks qc as NODATA (bsc#1187068).\n- scsi: libsas: Set data_dir as DMA_NONE if libata marks qc as NODATA (bsc#1186968).\n- scsi: lpfc: Fix ancient double free (bsc#1186969).\n- scsi: lpfc: Fix failure to transmit ABTS on FC link (git-fixes).\n- scsi: megaraid_sas: Check user-provided offsets (bsc#1186970).\n- scsi: megaraid_sas: Clear affinity hint (bsc#1186971).\n- scsi: megaraid_sas: Do not call disable_irq from process IRQ poll (bsc#1186972).\n- scsi: megaraid_sas: Fix MEGASAS_IOC_FIRMWARE regression (bsc#1186973).\n- scsi: megaraid_sas: Remove undefined ENABLE_IRQ_POLL macro (bsc#1186974).\n- scsi: mesh: Fix panic after host or bus reset (bsc#1186976).\n- scsi: mpt3sas: Do not use GFP_KERNEL in atomic context (bsc#1186977).\n- scsi: mpt3sas: Fix error return code of mpt3sas_base_attach() (bsc#1186978).\n- scsi: mpt3sas: Fix ioctl timeout (bsc#1186979).\n- scsi: myrs: Fix a double free in myrs_cleanup() (bsc#1186980).\n- scsi: pm80xx: Fix error return in pm8001_pci_probe() (bsc#1186981).\n- scsi: powertec: Fix different dev_id between request_irq() and free_irq() (bsc#1186982).\n- scsi: qedi: Check for buffer overflow in qedi_set_path() (bsc#1186983).\n- scsi: qedi: Fix error return code of qedi_alloc_global_queues() (bsc#1186984).\n- scsi: qedi: Fix missing destroy_workqueue() on error in __qedi_probe (bsc#1186985).\n- scsi: qla2xxx: Prevent PRLI in target mode (git-fixes).\n- scsi: qla4xxx: Fix an error handling path in \u0027qla4xxx_get_host_stats()\u0027 (bsc#1186986).\n- scsi: qla4xxx: Remove in_interrupt() (bsc#1186987).\n- scsi: scsi_debug: Add check for sdebug_max_queue during module init (bsc#1186988).\n- scsi: scsi_dh_alua: Retry RTPG on a different path after failure (bsc#1174978 bsc#1185701).\n- scsi: sd: Fix Opal support (bsc#1186989).\n- scsi: smartpqi: Add additional logging for LUN resets (bsc#1186472).\n- scsi: smartpqi: Add host level stream detection enable (bsc#1186472).\n- scsi: smartpqi: Add new PCI IDs (bsc#1186472).\n- scsi: smartpqi: Add phy ID support for the physical drives (bsc#1186472).\n- scsi: smartpqi: Add stream detection (bsc#1186472).\n- scsi: smartpqi: Add support for BMIC sense feature cmd and feature bits (bsc#1186472).\n- scsi: smartpqi: Add support for long firmware version (bsc#1186472).\n- scsi: smartpqi: Add support for new product ids (bsc#1186472).\n- scsi: smartpqi: Add support for RAID1 writes (bsc#1186472).\n- scsi: smartpqi: Add support for RAID5 and RAID6 writes (bsc#1186472).\n- scsi: smartpqi: Add support for wwid (bsc#1186472).\n- scsi: smartpqi: Align code with oob driver (bsc#1186472).\n- scsi: smartpqi: Convert snprintf() to scnprintf() (bsc#1186472).\n- scsi: smartpqi: Correct request leakage during reset operations (bsc#1186472).\n- scsi: smartpqi: Correct system hangs when resuming from hibernation (bsc#1186472).\n- scsi: smartpqi: Disable WRITE SAME for HBA NVMe disks (bsc#1186472).\n- scsi: smartpqi: Fix blocks_per_row static checker issue (bsc#1186472).\n- scsi: smartpqi: Fix device pointer variable reference static checker issue (bsc#1186472).\n- scsi: smartpqi: Fix driver synchronization issues (bsc#1186472).\n- scsi: smartpqi: Refactor aio submission code (bsc#1186472).\n- scsi: smartpqi: Refactor scatterlist code (bsc#1186472).\n- scsi: smartpqi: Remove timeouts from internal cmds (bsc#1186472).\n- scsi: smartpqi: Remove unused functions (bsc#1186472).\n- scsi: smartpqi: Synchronize device resets with mutex (bsc#1186472).\n- scsi: smartpqi: Update device scan operations (bsc#1186472).\n- scsi: smartpqi: Update enclosure identifier in sysfs (bsc#1186472).\n- scsi: smartpqi: Update event handler (bsc#1186472).\n- scsi: smartpqi: Update OFA management (bsc#1186472).\n- scsi: smartpqi: Update RAID bypass handling (bsc#1186472).\n- scsi: smartpqi: Update SAS initiator_port_protocols and target_port_protocols (bsc#1186472).\n- scsi: smartpqi: Update soft reset management for OFA (bsc#1186472).\n- scsi: smartpqi: Update suspend/resume and shutdown (bsc#1186472).\n- scsi: smartpqi: Update version to 2.1.8-045 (bsc#1186472).\n- scsi: smartpqi: Use host-wide tag space (bsc#1186472).\n- scsi: sni_53c710: Add IRQ check (bsc#1186990).\n- scsi: sun3x_esp: Add IRQ check (bsc#1186991).\n- scsi: ufs: Add quirk to disallow reset of interrupt aggregation (bsc#1186992).\n- scsi: ufs: Add quirk to enable host controller without hce (bsc#1186993).\n- scsi: ufs: Add quirk to fix abnormal ocs fatal error (bsc#1186994).\n- scsi: ufs: Add quirk to fix mishandling utrlclr/utmrlclr (bsc#1186995).\n- scsi: ufs: core: Narrow down fast path in system suspend path (bsc#1186996).\n- scsi: ufs: Do not update urgent bkops level when toggling auto bkops (bsc#1186997).\n- scsi: ufs: Fix race between shutdown and runtime resume flow (bsc#1186998).\n- scsi: ufshcd: use an enum for quirks (bsc#1186999).\n- scsi: ufs: Introduce UFSHCD_QUIRK_PRDT_BYTE_GRAN quirk (bsc#1187000).\n- scsi: ufs: Make ufshcd_print_trs() consider UFSHCD_QUIRK_PRDT_BYTE_GRAN (bsc#1187069).\n- scsi: ufs: Properly release resources if a task is aborted successfully (bsc#1187001).\n- scsi: ufs-qcom: Fix scheduling while atomic issue (bsc#1187002).\n- scsi: ufs: ufshcd-pltfrm: Fix deferred probing (bsc#1187003).\n- serial: 8250_pci: handle FL_NOIRQ board flag (git-fixes).\n- serial: core: fix suspicious security_locked_down() call (git-fixes).\n- serial: max310x: unregister uart driver in case of failure and abort (git-fixes).\n- serial: rp2: use \u0027request_firmware\u0027 instead of \u0027request_firmware_nowait\u0027 (git-fixes).\n- serial: sh-sci: Fix off-by-one error in FIFO threshold register setting (git-fixes).\n- serial: tegra: Fix a mask operation that is always true (git-fixes).\n- staging: emxx_udc: fix loop in _nbu2ss_nuke() (git-fixes).\n- staging: iio: cdc: ad7746: avoid overwrite of num_channels (git-fixes).\n- staging: rtl8723bs: Fix uninitialized variables (git-fixes).\n- sunrpc: fix refcount leak for rpc auth modules (git-fixes).\n- SUNRPC: More fixes for backlog congestion (bsc#1185428).\n- SUNRPC: Move fault injection call sites (git-fixes).\n- SUNRPC: Set memalloc_nofs_save() for sync tasks (git-fixes).\n- svcrdma: disable timeouts on rdma backchannel (git-fixes).\n- thermal/drivers/intel: Initialize RW trip to THERMAL_TEMP_INVALID (git-fixes).\n- thunderbolt: dma_port: Fix NVM read buffer bounds and offset issue (git-fixes).\n- thunderbolt: usb4: Fix NVM read buffer bounds and offset issue (git-fixes).\n- tpm: fix error return code in tpm2_get_cc_attrs_tbl() (git-fixes).\n- ttyprintk: Add TTY hangup callback (git-fixes).\n- UCSI fixup of array of PDOs (git-fixes).\n- usb: chipidea: imx: Fix Battery Charger 1.2 CDP detection (git-fixes).\n- usb: core: reduce power-on-good delay time of root hub (git-fixes).\n- usb: dwc3: gadget: Enable suspend events (git-fixes).\n- usb: fix various gadgets null ptr deref on 10gbps cabling (git-fixes).\n- USB: f_ncm: ncm_bitrate (speed) is unsigned (git-fixes).\n- usb: gadget: udc: renesas_usb3: Fix a race in usb3_start_pipen() (git-fixes).\n- usb: musb: fix MUSB_QUIRK_B_DISCONNECT_99 handling (git-fixes).\n- usb: pd: Set PD_T_SINK_WAIT_CAP to 310ms (git-fixes).\n- USB: serial: cp210x: fix alternate function for CP2102N QFN20 (git-fixes).\n- USB: serial: ftdi_sio: add IDs for IDS GmbH Products (git-fixes).\n- USB: serial: option: add Telit LE910-S1 compositions 0x7010, 0x7011 (git-fixes).\n- USB: serial: pl2303: add device id for ADLINK ND-6530 GC (git-fixes).\n- USB: serial: quatech2: fix control-request directions (git-fixes).\n- USB: serial: ti_usb_3410_5052: add startech.com device id (git-fixes).\n- USB: trancevibrator: fix control-request direction (git-fixes).\n- usb: typec: intel_pmc_mux: Put fwnode in error case during -\u003eprobe() (git-fixes).\n- usb: typec: mux: Fix copy-paste mistake in typec_mux_match (git-fixes).\n- usb: typec: mux: Fix matching with typec_altmode_desc (git-fixes).\n- usb: typec: tcpm: Use LE to CPU conversion when accessing msg-\u003eheader (git-fixes).\n- usb: typec: ucsi: Clear PPM capability data in ucsi_init() error path (git-fixes).\n- usb: typec: ucsi: Retrieve all the PDOs instead of just the first 4 (git-fixes).\n- usb: typec: wcove: Use LE to CPU conversion when accessing msg-\u003eheader (git-fixes).\n- USB: usbfs: Do not WARN about excessively large memory allocations (git-fixes).\n- vfio/pci: Fix error return code in vfio_ecap_init() (git-fixes).\n- vfio/pci: zap_vma_ptes() needs MMU (git-fixes).\n- vfio/platform: fix module_put call in error flow (git-fixes).\n- vmlinux.lds.h: Avoid orphan section with !SMP (git-fixes).\n- vsock/vmci: log once the failed queue pair allocation (git-fixes).\n- wireguard: allowedips: initialize list head in selftest (git-fixes).\n- wireguard: do not use -O3 (git-fixes).\n- wireguard: peer: allocate in kmem_cache (git-fixes).\n- wireguard: peer: put frequently used members above cache lines (git-fixes).\n- wireguard: queueing: get rid of per-peer ring buffers (git-fixes).\n- wireguard: selftests: make sure rp_filter is disabled on vethc (git-fixes).\n- wireguard: selftests: remove old conntrack kconfig value (git-fixes).\n- wireguard: use synchronize_net rather than synchronize_rcu (git-fixes).\n- x86/apic: Mark _all_ legacy interrupts when IO/APIC is missing (bsc#1152489).\n- x86/boot/64: Explicitly map boot_params and command line (jsc#SLE-14337).\n- x86/boot/compressed/64: Add 32-bit boot #VC handler (jsc#SLE-14337).\n- x86/boot/compressed/64: Add CPUID sanity check to 32-bit boot-path (jsc#SLE-14337).\n- x86/boot/compressed/64: Check SEV encryption in 64-bit boot-path (jsc#SLE-14337).\n- x86/boot/compressed/64: Check SEV encryption in the 32-bit boot-path (jsc#SLE-14337).\n- x86/boot/compressed/64: Cleanup exception handling before booting kernel (jsc#SLE-14337).\n- x86/boot/compressed/64: Introduce sev_status (jsc#SLE-14337).\n- x86/boot/compressed/64: Reload CS in startup_32 (jsc#SLE-14337).\n- x86/boot/compressed/64: Sanity-check CPUID results in the early #VC handler (jsc#SLE-14337).\n- x86/boot/compressed/64: Setup IDT in startup_32 boot path (jsc#SLE-14337).\n- x86/cpufeatures: Force disable X86_FEATURE_ENQCMD and remove update_pasid() (bsc#1178134).\n- x86/cpu: Initialize MSR_TSC_AUX if RDTSCP *or* RDPID is supported (bsc#1152489).\n- x86/fault: Do not send SIGSEGV twice on SEGV_PKUERR (bsc#1152489).\n- x86: fix seq_file iteration for pat.c (git-fixes).\n- x86/fpu: Prevent state corruption in __fpu__restore_sig() (bsc#1178134).\n- x86/head/64: Check SEV encryption before switching to kernel page-table (jsc#SLE-14337).\n- x86/head/64: Disable stack protection for head$(BITS).o (jsc#SLE-14337).\n- x86/ioremap: Map efi_mem_reserve() memory as encrypted for SEV (bsc#1186885).\n- x86/sev: Check SME/SEV support in CPUID first (jsc#SLE-14337).\n- x86/sev: Do not require Hypervisor CPUID bit for SEV guests (jsc#SLE-14337).\n- x86/sev-es: Do not return NULL from sev_es_get_ghcb() (bsc#1187349).\n- x86/sev-es: Do not support MMIO to/from encrypted memory (jsc#SLE-14337).\n- x86/sev-es: Forward page-faults which happen during emulation (bsc#1187350).\n- x86/sev-es: Replace open-coded hlt-loops with sev_es_terminate() (jsc#SLE-14337).\n- x86/sev-es: Use __put_user()/__get_user() for data accesses (bsc#1187351).\n- xfrm: policy: Read seqcount outside of rcu-read side in xfrm_policy_lookup_bytype (bsc#1185675).\n- xprtrdma: Avoid Receive Queue wrapping (git-fixes).\n- xprtrdma: rpcrdma_mr_pop() already does list_del_init() (git-fixes).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-SLE-15.3-2021-2184",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2021_2184-1.json"
},
{
"category": "self",
"summary": "URL for openSUSE-SU-2021:2184-1",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GJZ4RMNGAPDHTNV6KJGNPSEJH2RUZFKU/"
},
{
"category": "self",
"summary": "E-Mail link for openSUSE-SU-2021:2184-1",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GJZ4RMNGAPDHTNV6KJGNPSEJH2RUZFKU/"
},
{
"category": "self",
"summary": "SUSE Bug 1087082",
"url": "https://bugzilla.suse.com/1087082"
},
{
"category": "self",
"summary": "SUSE Bug 1152489",
"url": "https://bugzilla.suse.com/1152489"
},
{
"category": "self",
"summary": "SUSE Bug 1154353",
"url": "https://bugzilla.suse.com/1154353"
},
{
"category": "self",
"summary": "SUSE Bug 1174978",
"url": "https://bugzilla.suse.com/1174978"
},
{
"category": "self",
"summary": "SUSE Bug 1176447",
"url": "https://bugzilla.suse.com/1176447"
},
{
"category": "self",
"summary": "SUSE Bug 1176771",
"url": "https://bugzilla.suse.com/1176771"
},
{
"category": "self",
"summary": "SUSE Bug 1177666",
"url": "https://bugzilla.suse.com/1177666"
},
{
"category": "self",
"summary": "SUSE Bug 1178134",
"url": "https://bugzilla.suse.com/1178134"
},
{
"category": "self",
"summary": "SUSE Bug 1178378",
"url": "https://bugzilla.suse.com/1178378"
},
{
"category": "self",
"summary": "SUSE Bug 1178612",
"url": "https://bugzilla.suse.com/1178612"
},
{
"category": "self",
"summary": "SUSE Bug 1179610",
"url": "https://bugzilla.suse.com/1179610"
},
{
"category": "self",
"summary": "SUSE Bug 1182999",
"url": "https://bugzilla.suse.com/1182999"
},
{
"category": "self",
"summary": "SUSE Bug 1183712",
"url": "https://bugzilla.suse.com/1183712"
},
{
"category": "self",
"summary": "SUSE Bug 1184259",
"url": "https://bugzilla.suse.com/1184259"
},
{
"category": "self",
"summary": "SUSE Bug 1184436",
"url": "https://bugzilla.suse.com/1184436"
},
{
"category": "self",
"summary": "SUSE Bug 1184631",
"url": "https://bugzilla.suse.com/1184631"
},
{
"category": "self",
"summary": "SUSE Bug 1185195",
"url": "https://bugzilla.suse.com/1185195"
},
{
"category": "self",
"summary": "SUSE Bug 1185428",
"url": "https://bugzilla.suse.com/1185428"
},
{
"category": "self",
"summary": "SUSE Bug 1185497",
"url": "https://bugzilla.suse.com/1185497"
},
{
"category": "self",
"summary": "SUSE Bug 1185570",
"url": "https://bugzilla.suse.com/1185570"
},
{
"category": "self",
"summary": "SUSE Bug 1185589",
"url": "https://bugzilla.suse.com/1185589"
},
{
"category": "self",
"summary": "SUSE Bug 1185675",
"url": "https://bugzilla.suse.com/1185675"
},
{
"category": "self",
"summary": "SUSE Bug 1185701",
"url": "https://bugzilla.suse.com/1185701"
},
{
"category": "self",
"summary": "SUSE Bug 1186155",
"url": "https://bugzilla.suse.com/1186155"
},
{
"category": "self",
"summary": "SUSE Bug 1186286",
"url": "https://bugzilla.suse.com/1186286"
},
{
"category": "self",
"summary": "SUSE Bug 1186460",
"url": "https://bugzilla.suse.com/1186460"
},
{
"category": "self",
"summary": "SUSE Bug 1186463",
"url": "https://bugzilla.suse.com/1186463"
},
{
"category": "self",
"summary": "SUSE Bug 1186472",
"url": "https://bugzilla.suse.com/1186472"
},
{
"category": "self",
"summary": "SUSE Bug 1186501",
"url": "https://bugzilla.suse.com/1186501"
},
{
"category": "self",
"summary": "SUSE Bug 1186672",
"url": "https://bugzilla.suse.com/1186672"
},
{
"category": "self",
"summary": "SUSE Bug 1186677",
"url": "https://bugzilla.suse.com/1186677"
},
{
"category": "self",
"summary": "SUSE Bug 1186681",
"url": "https://bugzilla.suse.com/1186681"
},
{
"category": "self",
"summary": "SUSE Bug 1186752",
"url": "https://bugzilla.suse.com/1186752"
},
{
"category": "self",
"summary": "SUSE Bug 1186885",
"url": "https://bugzilla.suse.com/1186885"
},
{
"category": "self",
"summary": "SUSE Bug 1186928",
"url": "https://bugzilla.suse.com/1186928"
},
{
"category": "self",
"summary": "SUSE Bug 1186949",
"url": "https://bugzilla.suse.com/1186949"
},
{
"category": "self",
"summary": "SUSE Bug 1186950",
"url": "https://bugzilla.suse.com/1186950"
},
{
"category": "self",
"summary": "SUSE Bug 1186951",
"url": "https://bugzilla.suse.com/1186951"
},
{
"category": "self",
"summary": "SUSE Bug 1186952",
"url": "https://bugzilla.suse.com/1186952"
},
{
"category": "self",
"summary": "SUSE Bug 1186953",
"url": "https://bugzilla.suse.com/1186953"
},
{
"category": "self",
"summary": "SUSE Bug 1186954",
"url": "https://bugzilla.suse.com/1186954"
},
{
"category": "self",
"summary": "SUSE Bug 1186955",
"url": "https://bugzilla.suse.com/1186955"
},
{
"category": "self",
"summary": "SUSE Bug 1186956",
"url": "https://bugzilla.suse.com/1186956"
},
{
"category": "self",
"summary": "SUSE Bug 1186957",
"url": "https://bugzilla.suse.com/1186957"
},
{
"category": "self",
"summary": "SUSE Bug 1186958",
"url": "https://bugzilla.suse.com/1186958"
},
{
"category": "self",
"summary": "SUSE Bug 1186959",
"url": "https://bugzilla.suse.com/1186959"
},
{
"category": "self",
"summary": "SUSE Bug 1186960",
"url": "https://bugzilla.suse.com/1186960"
},
{
"category": "self",
"summary": "SUSE Bug 1186961",
"url": "https://bugzilla.suse.com/1186961"
},
{
"category": "self",
"summary": "SUSE Bug 1186962",
"url": "https://bugzilla.suse.com/1186962"
},
{
"category": "self",
"summary": "SUSE Bug 1186963",
"url": "https://bugzilla.suse.com/1186963"
},
{
"category": "self",
"summary": "SUSE Bug 1186964",
"url": "https://bugzilla.suse.com/1186964"
},
{
"category": "self",
"summary": "SUSE Bug 1186965",
"url": "https://bugzilla.suse.com/1186965"
},
{
"category": "self",
"summary": "SUSE Bug 1186966",
"url": "https://bugzilla.suse.com/1186966"
},
{
"category": "self",
"summary": "SUSE Bug 1186967",
"url": "https://bugzilla.suse.com/1186967"
},
{
"category": "self",
"summary": "SUSE Bug 1186968",
"url": "https://bugzilla.suse.com/1186968"
},
{
"category": "self",
"summary": "SUSE Bug 1186969",
"url": "https://bugzilla.suse.com/1186969"
},
{
"category": "self",
"summary": "SUSE Bug 1186970",
"url": "https://bugzilla.suse.com/1186970"
},
{
"category": "self",
"summary": "SUSE Bug 1186971",
"url": "https://bugzilla.suse.com/1186971"
},
{
"category": "self",
"summary": "SUSE Bug 1186972",
"url": "https://bugzilla.suse.com/1186972"
},
{
"category": "self",
"summary": "SUSE Bug 1186973",
"url": "https://bugzilla.suse.com/1186973"
},
{
"category": "self",
"summary": "SUSE Bug 1186974",
"url": "https://bugzilla.suse.com/1186974"
},
{
"category": "self",
"summary": "SUSE Bug 1186976",
"url": "https://bugzilla.suse.com/1186976"
},
{
"category": "self",
"summary": "SUSE Bug 1186977",
"url": "https://bugzilla.suse.com/1186977"
},
{
"category": "self",
"summary": "SUSE Bug 1186978",
"url": "https://bugzilla.suse.com/1186978"
},
{
"category": "self",
"summary": "SUSE Bug 1186979",
"url": "https://bugzilla.suse.com/1186979"
},
{
"category": "self",
"summary": "SUSE Bug 1186980",
"url": "https://bugzilla.suse.com/1186980"
},
{
"category": "self",
"summary": "SUSE Bug 1186981",
"url": "https://bugzilla.suse.com/1186981"
},
{
"category": "self",
"summary": "SUSE Bug 1186982",
"url": "https://bugzilla.suse.com/1186982"
},
{
"category": "self",
"summary": "SUSE Bug 1186983",
"url": "https://bugzilla.suse.com/1186983"
},
{
"category": "self",
"summary": "SUSE Bug 1186984",
"url": "https://bugzilla.suse.com/1186984"
},
{
"category": "self",
"summary": "SUSE Bug 1186985",
"url": "https://bugzilla.suse.com/1186985"
},
{
"category": "self",
"summary": "SUSE Bug 1186986",
"url": "https://bugzilla.suse.com/1186986"
},
{
"category": "self",
"summary": "SUSE Bug 1186987",
"url": "https://bugzilla.suse.com/1186987"
},
{
"category": "self",
"summary": "SUSE Bug 1186988",
"url": "https://bugzilla.suse.com/1186988"
},
{
"category": "self",
"summary": "SUSE Bug 1186989",
"url": "https://bugzilla.suse.com/1186989"
},
{
"category": "self",
"summary": "SUSE Bug 1186990",
"url": "https://bugzilla.suse.com/1186990"
},
{
"category": "self",
"summary": "SUSE Bug 1186991",
"url": "https://bugzilla.suse.com/1186991"
},
{
"category": "self",
"summary": "SUSE Bug 1186992",
"url": "https://bugzilla.suse.com/1186992"
},
{
"category": "self",
"summary": "SUSE Bug 1186993",
"url": "https://bugzilla.suse.com/1186993"
},
{
"category": "self",
"summary": "SUSE Bug 1186994",
"url": "https://bugzilla.suse.com/1186994"
},
{
"category": "self",
"summary": "SUSE Bug 1186995",
"url": "https://bugzilla.suse.com/1186995"
},
{
"category": "self",
"summary": "SUSE Bug 1186996",
"url": "https://bugzilla.suse.com/1186996"
},
{
"category": "self",
"summary": "SUSE Bug 1186997",
"url": "https://bugzilla.suse.com/1186997"
},
{
"category": "self",
"summary": "SUSE Bug 1186998",
"url": "https://bugzilla.suse.com/1186998"
},
{
"category": "self",
"summary": "SUSE Bug 1186999",
"url": "https://bugzilla.suse.com/1186999"
},
{
"category": "self",
"summary": "SUSE Bug 1187000",
"url": "https://bugzilla.suse.com/1187000"
},
{
"category": "self",
"summary": "SUSE Bug 1187001",
"url": "https://bugzilla.suse.com/1187001"
},
{
"category": "self",
"summary": "SUSE Bug 1187002",
"url": "https://bugzilla.suse.com/1187002"
},
{
"category": "self",
"summary": "SUSE Bug 1187003",
"url": "https://bugzilla.suse.com/1187003"
},
{
"category": "self",
"summary": "SUSE Bug 1187038",
"url": "https://bugzilla.suse.com/1187038"
},
{
"category": "self",
"summary": "SUSE Bug 1187039",
"url": "https://bugzilla.suse.com/1187039"
},
{
"category": "self",
"summary": "SUSE Bug 1187050",
"url": "https://bugzilla.suse.com/1187050"
},
{
"category": "self",
"summary": "SUSE Bug 1187052",
"url": "https://bugzilla.suse.com/1187052"
},
{
"category": "self",
"summary": "SUSE Bug 1187067",
"url": "https://bugzilla.suse.com/1187067"
},
{
"category": "self",
"summary": "SUSE Bug 1187068",
"url": "https://bugzilla.suse.com/1187068"
},
{
"category": "self",
"summary": "SUSE Bug 1187069",
"url": "https://bugzilla.suse.com/1187069"
},
{
"category": "self",
"summary": "SUSE Bug 1187072",
"url": "https://bugzilla.suse.com/1187072"
},
{
"category": "self",
"summary": "SUSE Bug 1187143",
"url": "https://bugzilla.suse.com/1187143"
},
{
"category": "self",
"summary": "SUSE Bug 1187144",
"url": "https://bugzilla.suse.com/1187144"
},
{
"category": "self",
"summary": "SUSE Bug 1187167",
"url": "https://bugzilla.suse.com/1187167"
},
{
"category": "self",
"summary": "SUSE Bug 1187334",
"url": "https://bugzilla.suse.com/1187334"
},
{
"category": "self",
"summary": "SUSE Bug 1187344",
"url": "https://bugzilla.suse.com/1187344"
},
{
"category": "self",
"summary": "SUSE Bug 1187345",
"url": "https://bugzilla.suse.com/1187345"
},
{
"category": "self",
"summary": "SUSE Bug 1187346",
"url": "https://bugzilla.suse.com/1187346"
},
{
"category": "self",
"summary": "SUSE Bug 1187347",
"url": "https://bugzilla.suse.com/1187347"
},
{
"category": "self",
"summary": "SUSE Bug 1187348",
"url": "https://bugzilla.suse.com/1187348"
},
{
"category": "self",
"summary": "SUSE Bug 1187349",
"url": "https://bugzilla.suse.com/1187349"
},
{
"category": "self",
"summary": "SUSE Bug 1187350",
"url": "https://bugzilla.suse.com/1187350"
},
{
"category": "self",
"summary": "SUSE Bug 1187351",
"url": "https://bugzilla.suse.com/1187351"
},
{
"category": "self",
"summary": "SUSE Bug 1187357",
"url": "https://bugzilla.suse.com/1187357"
},
{
"category": "self",
"summary": "SUSE Bug 1187711",
"url": "https://bugzilla.suse.com/1187711"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-26558 page",
"url": "https://www.suse.com/security/cve/CVE-2020-26558/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-36385 page",
"url": "https://www.suse.com/security/cve/CVE-2020-36385/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-36386 page",
"url": "https://www.suse.com/security/cve/CVE-2020-36386/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-0129 page",
"url": "https://www.suse.com/security/cve/CVE-2021-0129/"
}
],
"title": "Security update for the Linux Kernel",
"tracking": {
"current_release_date": "2021-06-28T16:23:04Z",
"generator": {
"date": "2021-06-28T16:23:04Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2021:2184-1",
"initial_release_date": "2021-06-28T16:23:04Z",
"revision_history": [
{
"date": "2021-06-28T16:23:04Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-64kb-5.3.18-59.10.1.aarch64",
"product": {
"name": "cluster-md-kmp-64kb-5.3.18-59.10.1.aarch64",
"product_id": "cluster-md-kmp-64kb-5.3.18-59.10.1.aarch64"
}
},
{
"category": "product_version",
"name": "cluster-md-kmp-default-5.3.18-59.10.1.aarch64",
"product": {
"name": "cluster-md-kmp-default-5.3.18-59.10.1.aarch64",
"product_id": "cluster-md-kmp-default-5.3.18-59.10.1.aarch64"
}
},
{
"category": "product_version",
"name": "cluster-md-kmp-preempt-5.3.18-59.10.1.aarch64",
"product": {
"name": "cluster-md-kmp-preempt-5.3.18-59.10.1.aarch64",
"product_id": "cluster-md-kmp-preempt-5.3.18-59.10.1.aarch64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-64kb-5.3.18-59.10.1.aarch64",
"product": {
"name": "dlm-kmp-64kb-5.3.18-59.10.1.aarch64",
"product_id": "dlm-kmp-64kb-5.3.18-59.10.1.aarch64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-5.3.18-59.10.1.aarch64",
"product": {
"name": "dlm-kmp-default-5.3.18-59.10.1.aarch64",
"product_id": "dlm-kmp-default-5.3.18-59.10.1.aarch64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-preempt-5.3.18-59.10.1.aarch64",
"product": {
"name": "dlm-kmp-preempt-5.3.18-59.10.1.aarch64",
"product_id": "dlm-kmp-preempt-5.3.18-59.10.1.aarch64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-64kb-5.3.18-59.10.1.aarch64",
"product": {
"name": "gfs2-kmp-64kb-5.3.18-59.10.1.aarch64",
"product_id": "gfs2-kmp-64kb-5.3.18-59.10.1.aarch64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-5.3.18-59.10.1.aarch64",
"product": {
"name": "gfs2-kmp-default-5.3.18-59.10.1.aarch64",
"product_id": "gfs2-kmp-default-5.3.18-59.10.1.aarch64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-preempt-5.3.18-59.10.1.aarch64",
"product": {
"name": "gfs2-kmp-preempt-5.3.18-59.10.1.aarch64",
"product_id": "gfs2-kmp-preempt-5.3.18-59.10.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-64kb-5.3.18-59.10.1.aarch64",
"product": {
"name": "kernel-64kb-5.3.18-59.10.1.aarch64",
"product_id": "kernel-64kb-5.3.18-59.10.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-64kb-devel-5.3.18-59.10.1.aarch64",
"product": {
"name": "kernel-64kb-devel-5.3.18-59.10.1.aarch64",
"product_id": "kernel-64kb-devel-5.3.18-59.10.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-64kb-extra-5.3.18-59.10.1.aarch64",
"product": {
"name": "kernel-64kb-extra-5.3.18-59.10.1.aarch64",
"product_id": "kernel-64kb-extra-5.3.18-59.10.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-64kb-livepatch-devel-5.3.18-59.10.1.aarch64",
"product": {
"name": "kernel-64kb-livepatch-devel-5.3.18-59.10.1.aarch64",
"product_id": "kernel-64kb-livepatch-devel-5.3.18-59.10.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-64kb-optional-5.3.18-59.10.1.aarch64",
"product": {
"name": "kernel-64kb-optional-5.3.18-59.10.1.aarch64",
"product_id": "kernel-64kb-optional-5.3.18-59.10.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-5.3.18-59.10.1.aarch64",
"product": {
"name": "kernel-default-5.3.18-59.10.1.aarch64",
"product_id": "kernel-default-5.3.18-59.10.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-5.3.18-59.10.1.18.4.2.aarch64",
"product": {
"name": "kernel-default-base-5.3.18-59.10.1.18.4.2.aarch64",
"product_id": "kernel-default-base-5.3.18-59.10.1.18.4.2.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-rebuild-5.3.18-59.10.1.18.4.2.aarch64",
"product": {
"name": "kernel-default-base-rebuild-5.3.18-59.10.1.18.4.2.aarch64",
"product_id": "kernel-default-base-rebuild-5.3.18-59.10.1.18.4.2.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-5.3.18-59.10.1.aarch64",
"product": {
"name": "kernel-default-devel-5.3.18-59.10.1.aarch64",
"product_id": "kernel-default-devel-5.3.18-59.10.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-5.3.18-59.10.1.aarch64",
"product": {
"name": "kernel-default-extra-5.3.18-59.10.1.aarch64",
"product_id": "kernel-default-extra-5.3.18-59.10.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-5.3.18-59.10.1.aarch64",
"product": {
"name": "kernel-default-livepatch-5.3.18-59.10.1.aarch64",
"product_id": "kernel-default-livepatch-5.3.18-59.10.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-devel-5.3.18-59.10.1.aarch64",
"product": {
"name": "kernel-default-livepatch-devel-5.3.18-59.10.1.aarch64",
"product_id": "kernel-default-livepatch-devel-5.3.18-59.10.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-optional-5.3.18-59.10.1.aarch64",
"product": {
"name": "kernel-default-optional-5.3.18-59.10.1.aarch64",
"product_id": "kernel-default-optional-5.3.18-59.10.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-5.3.18-59.10.1.aarch64",
"product": {
"name": "kernel-obs-build-5.3.18-59.10.1.aarch64",
"product_id": "kernel-obs-build-5.3.18-59.10.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-5.3.18-59.10.1.aarch64",
"product": {
"name": "kernel-obs-qa-5.3.18-59.10.1.aarch64",
"product_id": "kernel-obs-qa-5.3.18-59.10.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-preempt-5.3.18-59.10.1.aarch64",
"product": {
"name": "kernel-preempt-5.3.18-59.10.1.aarch64",
"product_id": "kernel-preempt-5.3.18-59.10.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-preempt-devel-5.3.18-59.10.1.aarch64",
"product": {
"name": "kernel-preempt-devel-5.3.18-59.10.1.aarch64",
"product_id": "kernel-preempt-devel-5.3.18-59.10.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-preempt-extra-5.3.18-59.10.1.aarch64",
"product": {
"name": "kernel-preempt-extra-5.3.18-59.10.1.aarch64",
"product_id": "kernel-preempt-extra-5.3.18-59.10.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-preempt-livepatch-devel-5.3.18-59.10.1.aarch64",
"product": {
"name": "kernel-preempt-livepatch-devel-5.3.18-59.10.1.aarch64",
"product_id": "kernel-preempt-livepatch-devel-5.3.18-59.10.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-preempt-optional-5.3.18-59.10.1.aarch64",
"product": {
"name": "kernel-preempt-optional-5.3.18-59.10.1.aarch64",
"product_id": "kernel-preempt-optional-5.3.18-59.10.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-syms-5.3.18-59.10.1.aarch64",
"product": {
"name": "kernel-syms-5.3.18-59.10.1.aarch64",
"product_id": "kernel-syms-5.3.18-59.10.1.aarch64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-64kb-5.3.18-59.10.1.aarch64",
"product": {
"name": "kselftests-kmp-64kb-5.3.18-59.10.1.aarch64",
"product_id": "kselftests-kmp-64kb-5.3.18-59.10.1.aarch64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-5.3.18-59.10.1.aarch64",
"product": {
"name": "kselftests-kmp-default-5.3.18-59.10.1.aarch64",
"product_id": "kselftests-kmp-default-5.3.18-59.10.1.aarch64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-preempt-5.3.18-59.10.1.aarch64",
"product": {
"name": "kselftests-kmp-preempt-5.3.18-59.10.1.aarch64",
"product_id": "kselftests-kmp-preempt-5.3.18-59.10.1.aarch64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-64kb-5.3.18-59.10.1.aarch64",
"product": {
"name": "ocfs2-kmp-64kb-5.3.18-59.10.1.aarch64",
"product_id": "ocfs2-kmp-64kb-5.3.18-59.10.1.aarch64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-5.3.18-59.10.1.aarch64",
"product": {
"name": "ocfs2-kmp-default-5.3.18-59.10.1.aarch64",
"product_id": "ocfs2-kmp-default-5.3.18-59.10.1.aarch64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-preempt-5.3.18-59.10.1.aarch64",
"product": {
"name": "ocfs2-kmp-preempt-5.3.18-59.10.1.aarch64",
"product_id": "ocfs2-kmp-preempt-5.3.18-59.10.1.aarch64"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-64kb-5.3.18-59.10.1.aarch64",
"product": {
"name": "reiserfs-kmp-64kb-5.3.18-59.10.1.aarch64",
"product_id": "reiserfs-kmp-64kb-5.3.18-59.10.1.aarch64"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-default-5.3.18-59.10.1.aarch64",
"product": {
"name": "reiserfs-kmp-default-5.3.18-59.10.1.aarch64",
"product_id": "reiserfs-kmp-default-5.3.18-59.10.1.aarch64"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-preempt-5.3.18-59.10.1.aarch64",
"product": {
"name": "reiserfs-kmp-preempt-5.3.18-59.10.1.aarch64",
"product_id": "reiserfs-kmp-preempt-5.3.18-59.10.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-devel-5.3.18-59.10.1.noarch",
"product": {
"name": "kernel-devel-5.3.18-59.10.1.noarch",
"product_id": "kernel-devel-5.3.18-59.10.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-docs-5.3.18-59.10.1.noarch",
"product": {
"name": "kernel-docs-5.3.18-59.10.1.noarch",
"product_id": "kernel-docs-5.3.18-59.10.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-docs-html-5.3.18-59.10.1.noarch",
"product": {
"name": "kernel-docs-html-5.3.18-59.10.1.noarch",
"product_id": "kernel-docs-html-5.3.18-59.10.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-macros-5.3.18-59.10.1.noarch",
"product": {
"name": "kernel-macros-5.3.18-59.10.1.noarch",
"product_id": "kernel-macros-5.3.18-59.10.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-5.3.18-59.10.1.noarch",
"product": {
"name": "kernel-source-5.3.18-59.10.1.noarch",
"product_id": "kernel-source-5.3.18-59.10.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-vanilla-5.3.18-59.10.1.noarch",
"product": {
"name": "kernel-source-vanilla-5.3.18-59.10.1.noarch",
"product_id": "kernel-source-vanilla-5.3.18-59.10.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-5.3.18-59.10.1.ppc64le",
"product": {
"name": "cluster-md-kmp-default-5.3.18-59.10.1.ppc64le",
"product_id": "cluster-md-kmp-default-5.3.18-59.10.1.ppc64le"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-5.3.18-59.10.1.ppc64le",
"product": {
"name": "dlm-kmp-default-5.3.18-59.10.1.ppc64le",
"product_id": "dlm-kmp-default-5.3.18-59.10.1.ppc64le"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-5.3.18-59.10.1.ppc64le",
"product": {
"name": "gfs2-kmp-default-5.3.18-59.10.1.ppc64le",
"product_id": "gfs2-kmp-default-5.3.18-59.10.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-5.3.18-59.10.1.ppc64le",
"product": {
"name": "kernel-debug-5.3.18-59.10.1.ppc64le",
"product_id": "kernel-debug-5.3.18-59.10.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-5.3.18-59.10.1.ppc64le",
"product": {
"name": "kernel-debug-devel-5.3.18-59.10.1.ppc64le",
"product_id": "kernel-debug-devel-5.3.18-59.10.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-livepatch-devel-5.3.18-59.10.1.ppc64le",
"product": {
"name": "kernel-debug-livepatch-devel-5.3.18-59.10.1.ppc64le",
"product_id": "kernel-debug-livepatch-devel-5.3.18-59.10.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-5.3.18-59.10.1.ppc64le",
"product": {
"name": "kernel-default-5.3.18-59.10.1.ppc64le",
"product_id": "kernel-default-5.3.18-59.10.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-base-5.3.18-59.10.1.18.4.2.ppc64le",
"product": {
"name": "kernel-default-base-5.3.18-59.10.1.18.4.2.ppc64le",
"product_id": "kernel-default-base-5.3.18-59.10.1.18.4.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-base-rebuild-5.3.18-59.10.1.18.4.2.ppc64le",
"product": {
"name": "kernel-default-base-rebuild-5.3.18-59.10.1.18.4.2.ppc64le",
"product_id": "kernel-default-base-rebuild-5.3.18-59.10.1.18.4.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-5.3.18-59.10.1.ppc64le",
"product": {
"name": "kernel-default-devel-5.3.18-59.10.1.ppc64le",
"product_id": "kernel-default-devel-5.3.18-59.10.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-5.3.18-59.10.1.ppc64le",
"product": {
"name": "kernel-default-extra-5.3.18-59.10.1.ppc64le",
"product_id": "kernel-default-extra-5.3.18-59.10.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-5.3.18-59.10.1.ppc64le",
"product": {
"name": "kernel-default-livepatch-5.3.18-59.10.1.ppc64le",
"product_id": "kernel-default-livepatch-5.3.18-59.10.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-devel-5.3.18-59.10.1.ppc64le",
"product": {
"name": "kernel-default-livepatch-devel-5.3.18-59.10.1.ppc64le",
"product_id": "kernel-default-livepatch-devel-5.3.18-59.10.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-optional-5.3.18-59.10.1.ppc64le",
"product": {
"name": "kernel-default-optional-5.3.18-59.10.1.ppc64le",
"product_id": "kernel-default-optional-5.3.18-59.10.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-5.3.18-59.10.1.ppc64le",
"product": {
"name": "kernel-kvmsmall-5.3.18-59.10.1.ppc64le",
"product_id": "kernel-kvmsmall-5.3.18-59.10.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-devel-5.3.18-59.10.1.ppc64le",
"product": {
"name": "kernel-kvmsmall-devel-5.3.18-59.10.1.ppc64le",
"product_id": "kernel-kvmsmall-devel-5.3.18-59.10.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-livepatch-devel-5.3.18-59.10.1.ppc64le",
"product": {
"name": "kernel-kvmsmall-livepatch-devel-5.3.18-59.10.1.ppc64le",
"product_id": "kernel-kvmsmall-livepatch-devel-5.3.18-59.10.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-5.3.18-59.10.1.ppc64le",
"product": {
"name": "kernel-obs-build-5.3.18-59.10.1.ppc64le",
"product_id": "kernel-obs-build-5.3.18-59.10.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-5.3.18-59.10.1.ppc64le",
"product": {
"name": "kernel-obs-qa-5.3.18-59.10.1.ppc64le",
"product_id": "kernel-obs-qa-5.3.18-59.10.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-syms-5.3.18-59.10.1.ppc64le",
"product": {
"name": "kernel-syms-5.3.18-59.10.1.ppc64le",
"product_id": "kernel-syms-5.3.18-59.10.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-5.3.18-59.10.1.ppc64le",
"product": {
"name": "kselftests-kmp-default-5.3.18-59.10.1.ppc64le",
"product_id": "kselftests-kmp-default-5.3.18-59.10.1.ppc64le"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-5.3.18-59.10.1.ppc64le",
"product": {
"name": "ocfs2-kmp-default-5.3.18-59.10.1.ppc64le",
"product_id": "ocfs2-kmp-default-5.3.18-59.10.1.ppc64le"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-default-5.3.18-59.10.1.ppc64le",
"product": {
"name": "reiserfs-kmp-default-5.3.18-59.10.1.ppc64le",
"product_id": "reiserfs-kmp-default-5.3.18-59.10.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-5.3.18-59.10.1.s390x",
"product": {
"name": "cluster-md-kmp-default-5.3.18-59.10.1.s390x",
"product_id": "cluster-md-kmp-default-5.3.18-59.10.1.s390x"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-5.3.18-59.10.1.s390x",
"product": {
"name": "dlm-kmp-default-5.3.18-59.10.1.s390x",
"product_id": "dlm-kmp-default-5.3.18-59.10.1.s390x"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-5.3.18-59.10.1.s390x",
"product": {
"name": "gfs2-kmp-default-5.3.18-59.10.1.s390x",
"product_id": "gfs2-kmp-default-5.3.18-59.10.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-5.3.18-59.10.1.s390x",
"product": {
"name": "kernel-default-5.3.18-59.10.1.s390x",
"product_id": "kernel-default-5.3.18-59.10.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-base-5.3.18-59.10.1.18.4.2.s390x",
"product": {
"name": "kernel-default-base-5.3.18-59.10.1.18.4.2.s390x",
"product_id": "kernel-default-base-5.3.18-59.10.1.18.4.2.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-base-rebuild-5.3.18-59.10.1.18.4.2.s390x",
"product": {
"name": "kernel-default-base-rebuild-5.3.18-59.10.1.18.4.2.s390x",
"product_id": "kernel-default-base-rebuild-5.3.18-59.10.1.18.4.2.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-5.3.18-59.10.1.s390x",
"product": {
"name": "kernel-default-devel-5.3.18-59.10.1.s390x",
"product_id": "kernel-default-devel-5.3.18-59.10.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-5.3.18-59.10.1.s390x",
"product": {
"name": "kernel-default-extra-5.3.18-59.10.1.s390x",
"product_id": "kernel-default-extra-5.3.18-59.10.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-5.3.18-59.10.1.s390x",
"product": {
"name": "kernel-default-livepatch-5.3.18-59.10.1.s390x",
"product_id": "kernel-default-livepatch-5.3.18-59.10.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-devel-5.3.18-59.10.1.s390x",
"product": {
"name": "kernel-default-livepatch-devel-5.3.18-59.10.1.s390x",
"product_id": "kernel-default-livepatch-devel-5.3.18-59.10.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-optional-5.3.18-59.10.1.s390x",
"product": {
"name": "kernel-default-optional-5.3.18-59.10.1.s390x",
"product_id": "kernel-default-optional-5.3.18-59.10.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-5.3.18-59.10.1.s390x",
"product": {
"name": "kernel-obs-build-5.3.18-59.10.1.s390x",
"product_id": "kernel-obs-build-5.3.18-59.10.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-5.3.18-59.10.1.s390x",
"product": {
"name": "kernel-obs-qa-5.3.18-59.10.1.s390x",
"product_id": "kernel-obs-qa-5.3.18-59.10.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-syms-5.3.18-59.10.1.s390x",
"product": {
"name": "kernel-syms-5.3.18-59.10.1.s390x",
"product_id": "kernel-syms-5.3.18-59.10.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-5.3.18-59.10.1.s390x",
"product": {
"name": "kernel-zfcpdump-5.3.18-59.10.1.s390x",
"product_id": "kernel-zfcpdump-5.3.18-59.10.1.s390x"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-5.3.18-59.10.1.s390x",
"product": {
"name": "kselftests-kmp-default-5.3.18-59.10.1.s390x",
"product_id": "kselftests-kmp-default-5.3.18-59.10.1.s390x"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-5.3.18-59.10.1.s390x",
"product": {
"name": "ocfs2-kmp-default-5.3.18-59.10.1.s390x",
"product_id": "ocfs2-kmp-default-5.3.18-59.10.1.s390x"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-default-5.3.18-59.10.1.s390x",
"product": {
"name": "reiserfs-kmp-default-5.3.18-59.10.1.s390x",
"product_id": "reiserfs-kmp-default-5.3.18-59.10.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-5.3.18-59.10.1.x86_64",
"product": {
"name": "cluster-md-kmp-default-5.3.18-59.10.1.x86_64",
"product_id": "cluster-md-kmp-default-5.3.18-59.10.1.x86_64"
}
},
{
"category": "product_version",
"name": "cluster-md-kmp-preempt-5.3.18-59.10.1.x86_64",
"product": {
"name": "cluster-md-kmp-preempt-5.3.18-59.10.1.x86_64",
"product_id": "cluster-md-kmp-preempt-5.3.18-59.10.1.x86_64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-5.3.18-59.10.1.x86_64",
"product": {
"name": "dlm-kmp-default-5.3.18-59.10.1.x86_64",
"product_id": "dlm-kmp-default-5.3.18-59.10.1.x86_64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-preempt-5.3.18-59.10.1.x86_64",
"product": {
"name": "dlm-kmp-preempt-5.3.18-59.10.1.x86_64",
"product_id": "dlm-kmp-preempt-5.3.18-59.10.1.x86_64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-5.3.18-59.10.1.x86_64",
"product": {
"name": "gfs2-kmp-default-5.3.18-59.10.1.x86_64",
"product_id": "gfs2-kmp-default-5.3.18-59.10.1.x86_64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-preempt-5.3.18-59.10.1.x86_64",
"product": {
"name": "gfs2-kmp-preempt-5.3.18-59.10.1.x86_64",
"product_id": "gfs2-kmp-preempt-5.3.18-59.10.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-5.3.18-59.10.1.x86_64",
"product": {
"name": "kernel-debug-5.3.18-59.10.1.x86_64",
"product_id": "kernel-debug-5.3.18-59.10.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-5.3.18-59.10.1.x86_64",
"product": {
"name": "kernel-debug-devel-5.3.18-59.10.1.x86_64",
"product_id": "kernel-debug-devel-5.3.18-59.10.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-livepatch-devel-5.3.18-59.10.1.x86_64",
"product": {
"name": "kernel-debug-livepatch-devel-5.3.18-59.10.1.x86_64",
"product_id": "kernel-debug-livepatch-devel-5.3.18-59.10.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-5.3.18-59.10.1.x86_64",
"product": {
"name": "kernel-default-5.3.18-59.10.1.x86_64",
"product_id": "kernel-default-5.3.18-59.10.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-5.3.18-59.10.1.18.4.2.x86_64",
"product": {
"name": "kernel-default-base-5.3.18-59.10.1.18.4.2.x86_64",
"product_id": "kernel-default-base-5.3.18-59.10.1.18.4.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-rebuild-5.3.18-59.10.1.18.4.2.x86_64",
"product": {
"name": "kernel-default-base-rebuild-5.3.18-59.10.1.18.4.2.x86_64",
"product_id": "kernel-default-base-rebuild-5.3.18-59.10.1.18.4.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-5.3.18-59.10.1.x86_64",
"product": {
"name": "kernel-default-devel-5.3.18-59.10.1.x86_64",
"product_id": "kernel-default-devel-5.3.18-59.10.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-5.3.18-59.10.1.x86_64",
"product": {
"name": "kernel-default-extra-5.3.18-59.10.1.x86_64",
"product_id": "kernel-default-extra-5.3.18-59.10.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-5.3.18-59.10.1.x86_64",
"product": {
"name": "kernel-default-livepatch-5.3.18-59.10.1.x86_64",
"product_id": "kernel-default-livepatch-5.3.18-59.10.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-devel-5.3.18-59.10.1.x86_64",
"product": {
"name": "kernel-default-livepatch-devel-5.3.18-59.10.1.x86_64",
"product_id": "kernel-default-livepatch-devel-5.3.18-59.10.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-optional-5.3.18-59.10.1.x86_64",
"product": {
"name": "kernel-default-optional-5.3.18-59.10.1.x86_64",
"product_id": "kernel-default-optional-5.3.18-59.10.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-5.3.18-59.10.1.x86_64",
"product": {
"name": "kernel-kvmsmall-5.3.18-59.10.1.x86_64",
"product_id": "kernel-kvmsmall-5.3.18-59.10.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-devel-5.3.18-59.10.1.x86_64",
"product": {
"name": "kernel-kvmsmall-devel-5.3.18-59.10.1.x86_64",
"product_id": "kernel-kvmsmall-devel-5.3.18-59.10.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-livepatch-devel-5.3.18-59.10.1.x86_64",
"product": {
"name": "kernel-kvmsmall-livepatch-devel-5.3.18-59.10.1.x86_64",
"product_id": "kernel-kvmsmall-livepatch-devel-5.3.18-59.10.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-5.3.18-59.10.1.x86_64",
"product": {
"name": "kernel-obs-build-5.3.18-59.10.1.x86_64",
"product_id": "kernel-obs-build-5.3.18-59.10.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-5.3.18-59.10.1.x86_64",
"product": {
"name": "kernel-obs-qa-5.3.18-59.10.1.x86_64",
"product_id": "kernel-obs-qa-5.3.18-59.10.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-preempt-5.3.18-59.10.1.x86_64",
"product": {
"name": "kernel-preempt-5.3.18-59.10.1.x86_64",
"product_id": "kernel-preempt-5.3.18-59.10.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-preempt-devel-5.3.18-59.10.1.x86_64",
"product": {
"name": "kernel-preempt-devel-5.3.18-59.10.1.x86_64",
"product_id": "kernel-preempt-devel-5.3.18-59.10.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-preempt-extra-5.3.18-59.10.1.x86_64",
"product": {
"name": "kernel-preempt-extra-5.3.18-59.10.1.x86_64",
"product_id": "kernel-preempt-extra-5.3.18-59.10.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-preempt-livepatch-devel-5.3.18-59.10.1.x86_64",
"product": {
"name": "kernel-preempt-livepatch-devel-5.3.18-59.10.1.x86_64",
"product_id": "kernel-preempt-livepatch-devel-5.3.18-59.10.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-preempt-optional-5.3.18-59.10.1.x86_64",
"product": {
"name": "kernel-preempt-optional-5.3.18-59.10.1.x86_64",
"product_id": "kernel-preempt-optional-5.3.18-59.10.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-syms-5.3.18-59.10.1.x86_64",
"product": {
"name": "kernel-syms-5.3.18-59.10.1.x86_64",
"product_id": "kernel-syms-5.3.18-59.10.1.x86_64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-5.3.18-59.10.1.x86_64",
"product": {
"name": "kselftests-kmp-default-5.3.18-59.10.1.x86_64",
"product_id": "kselftests-kmp-default-5.3.18-59.10.1.x86_64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-preempt-5.3.18-59.10.1.x86_64",
"product": {
"name": "kselftests-kmp-preempt-5.3.18-59.10.1.x86_64",
"product_id": "kselftests-kmp-preempt-5.3.18-59.10.1.x86_64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-5.3.18-59.10.1.x86_64",
"product": {
"name": "ocfs2-kmp-default-5.3.18-59.10.1.x86_64",
"product_id": "ocfs2-kmp-default-5.3.18-59.10.1.x86_64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-preempt-5.3.18-59.10.1.x86_64",
"product": {
"name": "ocfs2-kmp-preempt-5.3.18-59.10.1.x86_64",
"product_id": "ocfs2-kmp-preempt-5.3.18-59.10.1.x86_64"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-default-5.3.18-59.10.1.x86_64",
"product": {
"name": "reiserfs-kmp-default-5.3.18-59.10.1.x86_64",
"product_id": "reiserfs-kmp-default-5.3.18-59.10.1.x86_64"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-preempt-5.3.18-59.10.1.x86_64",
"product": {
"name": "reiserfs-kmp-preempt-5.3.18-59.10.1.x86_64",
"product_id": "reiserfs-kmp-preempt-5.3.18-59.10.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Leap 15.3",
"product": {
"name": "openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:leap:15.3"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-64kb-5.3.18-59.10.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.10.1.aarch64"
},
"product_reference": "cluster-md-kmp-64kb-5.3.18-59.10.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-5.3.18-59.10.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.10.1.aarch64"
},
"product_reference": "cluster-md-kmp-default-5.3.18-59.10.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-5.3.18-59.10.1.ppc64le as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.10.1.ppc64le"
},
"product_reference": "cluster-md-kmp-default-5.3.18-59.10.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-5.3.18-59.10.1.s390x as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.10.1.s390x"
},
"product_reference": "cluster-md-kmp-default-5.3.18-59.10.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-5.3.18-59.10.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.10.1.x86_64"
},
"product_reference": "cluster-md-kmp-default-5.3.18-59.10.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-preempt-5.3.18-59.10.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.10.1.aarch64"
},
"product_reference": "cluster-md-kmp-preempt-5.3.18-59.10.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-preempt-5.3.18-59.10.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.10.1.x86_64"
},
"product_reference": "cluster-md-kmp-preempt-5.3.18-59.10.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-64kb-5.3.18-59.10.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.10.1.aarch64"
},
"product_reference": "dlm-kmp-64kb-5.3.18-59.10.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-5.3.18-59.10.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.10.1.aarch64"
},
"product_reference": "dlm-kmp-default-5.3.18-59.10.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-5.3.18-59.10.1.ppc64le as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.10.1.ppc64le"
},
"product_reference": "dlm-kmp-default-5.3.18-59.10.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-5.3.18-59.10.1.s390x as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.10.1.s390x"
},
"product_reference": "dlm-kmp-default-5.3.18-59.10.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-5.3.18-59.10.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.10.1.x86_64"
},
"product_reference": "dlm-kmp-default-5.3.18-59.10.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-preempt-5.3.18-59.10.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.10.1.aarch64"
},
"product_reference": "dlm-kmp-preempt-5.3.18-59.10.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-preempt-5.3.18-59.10.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.10.1.x86_64"
},
"product_reference": "dlm-kmp-preempt-5.3.18-59.10.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-64kb-5.3.18-59.10.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.10.1.aarch64"
},
"product_reference": "gfs2-kmp-64kb-5.3.18-59.10.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-5.3.18-59.10.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.10.1.aarch64"
},
"product_reference": "gfs2-kmp-default-5.3.18-59.10.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-5.3.18-59.10.1.ppc64le as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.10.1.ppc64le"
},
"product_reference": "gfs2-kmp-default-5.3.18-59.10.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-5.3.18-59.10.1.s390x as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.10.1.s390x"
},
"product_reference": "gfs2-kmp-default-5.3.18-59.10.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-5.3.18-59.10.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.10.1.x86_64"
},
"product_reference": "gfs2-kmp-default-5.3.18-59.10.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-preempt-5.3.18-59.10.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.10.1.aarch64"
},
"product_reference": "gfs2-kmp-preempt-5.3.18-59.10.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-preempt-5.3.18-59.10.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.10.1.x86_64"
},
"product_reference": "gfs2-kmp-preempt-5.3.18-59.10.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64kb-5.3.18-59.10.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-64kb-5.3.18-59.10.1.aarch64"
},
"product_reference": "kernel-64kb-5.3.18-59.10.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64kb-devel-5.3.18-59.10.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.10.1.aarch64"
},
"product_reference": "kernel-64kb-devel-5.3.18-59.10.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64kb-extra-5.3.18-59.10.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.10.1.aarch64"
},
"product_reference": "kernel-64kb-extra-5.3.18-59.10.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64kb-livepatch-devel-5.3.18-59.10.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.10.1.aarch64"
},
"product_reference": "kernel-64kb-livepatch-devel-5.3.18-59.10.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64kb-optional-5.3.18-59.10.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.10.1.aarch64"
},
"product_reference": "kernel-64kb-optional-5.3.18-59.10.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-5.3.18-59.10.1.ppc64le as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-debug-5.3.18-59.10.1.ppc64le"
},
"product_reference": "kernel-debug-5.3.18-59.10.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-5.3.18-59.10.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-debug-5.3.18-59.10.1.x86_64"
},
"product_reference": "kernel-debug-5.3.18-59.10.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-5.3.18-59.10.1.ppc64le as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.10.1.ppc64le"
},
"product_reference": "kernel-debug-devel-5.3.18-59.10.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-5.3.18-59.10.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.10.1.x86_64"
},
"product_reference": "kernel-debug-devel-5.3.18-59.10.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-livepatch-devel-5.3.18-59.10.1.ppc64le as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.10.1.ppc64le"
},
"product_reference": "kernel-debug-livepatch-devel-5.3.18-59.10.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-livepatch-devel-5.3.18-59.10.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.10.1.x86_64"
},
"product_reference": "kernel-debug-livepatch-devel-5.3.18-59.10.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.3.18-59.10.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-default-5.3.18-59.10.1.aarch64"
},
"product_reference": "kernel-default-5.3.18-59.10.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.3.18-59.10.1.ppc64le as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-default-5.3.18-59.10.1.ppc64le"
},
"product_reference": "kernel-default-5.3.18-59.10.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.3.18-59.10.1.s390x as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-default-5.3.18-59.10.1.s390x"
},
"product_reference": "kernel-default-5.3.18-59.10.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.3.18-59.10.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-default-5.3.18-59.10.1.x86_64"
},
"product_reference": "kernel-default-5.3.18-59.10.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-5.3.18-59.10.1.18.4.2.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-default-base-5.3.18-59.10.1.18.4.2.aarch64"
},
"product_reference": "kernel-default-base-5.3.18-59.10.1.18.4.2.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-5.3.18-59.10.1.18.4.2.ppc64le as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-default-base-5.3.18-59.10.1.18.4.2.ppc64le"
},
"product_reference": "kernel-default-base-5.3.18-59.10.1.18.4.2.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-5.3.18-59.10.1.18.4.2.s390x as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-default-base-5.3.18-59.10.1.18.4.2.s390x"
},
"product_reference": "kernel-default-base-5.3.18-59.10.1.18.4.2.s390x",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-5.3.18-59.10.1.18.4.2.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-default-base-5.3.18-59.10.1.18.4.2.x86_64"
},
"product_reference": "kernel-default-base-5.3.18-59.10.1.18.4.2.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-rebuild-5.3.18-59.10.1.18.4.2.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.10.1.18.4.2.aarch64"
},
"product_reference": "kernel-default-base-rebuild-5.3.18-59.10.1.18.4.2.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-rebuild-5.3.18-59.10.1.18.4.2.ppc64le as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.10.1.18.4.2.ppc64le"
},
"product_reference": "kernel-default-base-rebuild-5.3.18-59.10.1.18.4.2.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-rebuild-5.3.18-59.10.1.18.4.2.s390x as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.10.1.18.4.2.s390x"
},
"product_reference": "kernel-default-base-rebuild-5.3.18-59.10.1.18.4.2.s390x",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-rebuild-5.3.18-59.10.1.18.4.2.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.10.1.18.4.2.x86_64"
},
"product_reference": "kernel-default-base-rebuild-5.3.18-59.10.1.18.4.2.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-5.3.18-59.10.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.10.1.aarch64"
},
"product_reference": "kernel-default-devel-5.3.18-59.10.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-5.3.18-59.10.1.ppc64le as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.10.1.ppc64le"
},
"product_reference": "kernel-default-devel-5.3.18-59.10.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-5.3.18-59.10.1.s390x as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.10.1.s390x"
},
"product_reference": "kernel-default-devel-5.3.18-59.10.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-5.3.18-59.10.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.10.1.x86_64"
},
"product_reference": "kernel-default-devel-5.3.18-59.10.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-extra-5.3.18-59.10.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.10.1.aarch64"
},
"product_reference": "kernel-default-extra-5.3.18-59.10.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-extra-5.3.18-59.10.1.ppc64le as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.10.1.ppc64le"
},
"product_reference": "kernel-default-extra-5.3.18-59.10.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-extra-5.3.18-59.10.1.s390x as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.10.1.s390x"
},
"product_reference": "kernel-default-extra-5.3.18-59.10.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-extra-5.3.18-59.10.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.10.1.x86_64"
},
"product_reference": "kernel-default-extra-5.3.18-59.10.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-5.3.18-59.10.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.10.1.aarch64"
},
"product_reference": "kernel-default-livepatch-5.3.18-59.10.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-5.3.18-59.10.1.ppc64le as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.10.1.ppc64le"
},
"product_reference": "kernel-default-livepatch-5.3.18-59.10.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-5.3.18-59.10.1.s390x as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.10.1.s390x"
},
"product_reference": "kernel-default-livepatch-5.3.18-59.10.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-5.3.18-59.10.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.10.1.x86_64"
},
"product_reference": "kernel-default-livepatch-5.3.18-59.10.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-devel-5.3.18-59.10.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.10.1.aarch64"
},
"product_reference": "kernel-default-livepatch-devel-5.3.18-59.10.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-devel-5.3.18-59.10.1.ppc64le as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.10.1.ppc64le"
},
"product_reference": "kernel-default-livepatch-devel-5.3.18-59.10.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-devel-5.3.18-59.10.1.s390x as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.10.1.s390x"
},
"product_reference": "kernel-default-livepatch-devel-5.3.18-59.10.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-devel-5.3.18-59.10.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.10.1.x86_64"
},
"product_reference": "kernel-default-livepatch-devel-5.3.18-59.10.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-optional-5.3.18-59.10.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.10.1.aarch64"
},
"product_reference": "kernel-default-optional-5.3.18-59.10.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-optional-5.3.18-59.10.1.ppc64le as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.10.1.ppc64le"
},
"product_reference": "kernel-default-optional-5.3.18-59.10.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-optional-5.3.18-59.10.1.s390x as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.10.1.s390x"
},
"product_reference": "kernel-default-optional-5.3.18-59.10.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-optional-5.3.18-59.10.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.10.1.x86_64"
},
"product_reference": "kernel-default-optional-5.3.18-59.10.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-5.3.18-59.10.1.noarch as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-devel-5.3.18-59.10.1.noarch"
},
"product_reference": "kernel-devel-5.3.18-59.10.1.noarch",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-docs-5.3.18-59.10.1.noarch as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-docs-5.3.18-59.10.1.noarch"
},
"product_reference": "kernel-docs-5.3.18-59.10.1.noarch",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-docs-html-5.3.18-59.10.1.noarch as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.10.1.noarch"
},
"product_reference": "kernel-docs-html-5.3.18-59.10.1.noarch",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kvmsmall-5.3.18-59.10.1.ppc64le as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.10.1.ppc64le"
},
"product_reference": "kernel-kvmsmall-5.3.18-59.10.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kvmsmall-5.3.18-59.10.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.10.1.x86_64"
},
"product_reference": "kernel-kvmsmall-5.3.18-59.10.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kvmsmall-devel-5.3.18-59.10.1.ppc64le as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.10.1.ppc64le"
},
"product_reference": "kernel-kvmsmall-devel-5.3.18-59.10.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kvmsmall-devel-5.3.18-59.10.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.10.1.x86_64"
},
"product_reference": "kernel-kvmsmall-devel-5.3.18-59.10.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kvmsmall-livepatch-devel-5.3.18-59.10.1.ppc64le as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.10.1.ppc64le"
},
"product_reference": "kernel-kvmsmall-livepatch-devel-5.3.18-59.10.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kvmsmall-livepatch-devel-5.3.18-59.10.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.10.1.x86_64"
},
"product_reference": "kernel-kvmsmall-livepatch-devel-5.3.18-59.10.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-5.3.18-59.10.1.noarch as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-macros-5.3.18-59.10.1.noarch"
},
"product_reference": "kernel-macros-5.3.18-59.10.1.noarch",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-5.3.18-59.10.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.10.1.aarch64"
},
"product_reference": "kernel-obs-build-5.3.18-59.10.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-5.3.18-59.10.1.ppc64le as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.10.1.ppc64le"
},
"product_reference": "kernel-obs-build-5.3.18-59.10.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-5.3.18-59.10.1.s390x as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.10.1.s390x"
},
"product_reference": "kernel-obs-build-5.3.18-59.10.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-5.3.18-59.10.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.10.1.x86_64"
},
"product_reference": "kernel-obs-build-5.3.18-59.10.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-qa-5.3.18-59.10.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.10.1.aarch64"
},
"product_reference": "kernel-obs-qa-5.3.18-59.10.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-qa-5.3.18-59.10.1.ppc64le as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.10.1.ppc64le"
},
"product_reference": "kernel-obs-qa-5.3.18-59.10.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-qa-5.3.18-59.10.1.s390x as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.10.1.s390x"
},
"product_reference": "kernel-obs-qa-5.3.18-59.10.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-qa-5.3.18-59.10.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.10.1.x86_64"
},
"product_reference": "kernel-obs-qa-5.3.18-59.10.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-preempt-5.3.18-59.10.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-preempt-5.3.18-59.10.1.aarch64"
},
"product_reference": "kernel-preempt-5.3.18-59.10.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-preempt-5.3.18-59.10.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-preempt-5.3.18-59.10.1.x86_64"
},
"product_reference": "kernel-preempt-5.3.18-59.10.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-preempt-devel-5.3.18-59.10.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.10.1.aarch64"
},
"product_reference": "kernel-preempt-devel-5.3.18-59.10.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-preempt-devel-5.3.18-59.10.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.10.1.x86_64"
},
"product_reference": "kernel-preempt-devel-5.3.18-59.10.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-preempt-extra-5.3.18-59.10.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.10.1.aarch64"
},
"product_reference": "kernel-preempt-extra-5.3.18-59.10.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-preempt-extra-5.3.18-59.10.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.10.1.x86_64"
},
"product_reference": "kernel-preempt-extra-5.3.18-59.10.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-preempt-livepatch-devel-5.3.18-59.10.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.10.1.aarch64"
},
"product_reference": "kernel-preempt-livepatch-devel-5.3.18-59.10.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-preempt-livepatch-devel-5.3.18-59.10.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.10.1.x86_64"
},
"product_reference": "kernel-preempt-livepatch-devel-5.3.18-59.10.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-preempt-optional-5.3.18-59.10.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.10.1.aarch64"
},
"product_reference": "kernel-preempt-optional-5.3.18-59.10.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-preempt-optional-5.3.18-59.10.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.10.1.x86_64"
},
"product_reference": "kernel-preempt-optional-5.3.18-59.10.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-5.3.18-59.10.1.noarch as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-source-5.3.18-59.10.1.noarch"
},
"product_reference": "kernel-source-5.3.18-59.10.1.noarch",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-vanilla-5.3.18-59.10.1.noarch as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.10.1.noarch"
},
"product_reference": "kernel-source-vanilla-5.3.18-59.10.1.noarch",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-5.3.18-59.10.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-syms-5.3.18-59.10.1.aarch64"
},
"product_reference": "kernel-syms-5.3.18-59.10.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-5.3.18-59.10.1.ppc64le as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-syms-5.3.18-59.10.1.ppc64le"
},
"product_reference": "kernel-syms-5.3.18-59.10.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-5.3.18-59.10.1.s390x as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-syms-5.3.18-59.10.1.s390x"
},
"product_reference": "kernel-syms-5.3.18-59.10.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-5.3.18-59.10.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-syms-5.3.18-59.10.1.x86_64"
},
"product_reference": "kernel-syms-5.3.18-59.10.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-5.3.18-59.10.1.s390x as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.10.1.s390x"
},
"product_reference": "kernel-zfcpdump-5.3.18-59.10.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kselftests-kmp-64kb-5.3.18-59.10.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.10.1.aarch64"
},
"product_reference": "kselftests-kmp-64kb-5.3.18-59.10.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kselftests-kmp-default-5.3.18-59.10.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.10.1.aarch64"
},
"product_reference": "kselftests-kmp-default-5.3.18-59.10.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kselftests-kmp-default-5.3.18-59.10.1.ppc64le as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.10.1.ppc64le"
},
"product_reference": "kselftests-kmp-default-5.3.18-59.10.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kselftests-kmp-default-5.3.18-59.10.1.s390x as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.10.1.s390x"
},
"product_reference": "kselftests-kmp-default-5.3.18-59.10.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kselftests-kmp-default-5.3.18-59.10.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.10.1.x86_64"
},
"product_reference": "kselftests-kmp-default-5.3.18-59.10.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kselftests-kmp-preempt-5.3.18-59.10.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.10.1.aarch64"
},
"product_reference": "kselftests-kmp-preempt-5.3.18-59.10.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kselftests-kmp-preempt-5.3.18-59.10.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.10.1.x86_64"
},
"product_reference": "kselftests-kmp-preempt-5.3.18-59.10.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-64kb-5.3.18-59.10.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.10.1.aarch64"
},
"product_reference": "ocfs2-kmp-64kb-5.3.18-59.10.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-5.3.18-59.10.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.10.1.aarch64"
},
"product_reference": "ocfs2-kmp-default-5.3.18-59.10.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-5.3.18-59.10.1.ppc64le as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.10.1.ppc64le"
},
"product_reference": "ocfs2-kmp-default-5.3.18-59.10.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-5.3.18-59.10.1.s390x as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.10.1.s390x"
},
"product_reference": "ocfs2-kmp-default-5.3.18-59.10.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-5.3.18-59.10.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.10.1.x86_64"
},
"product_reference": "ocfs2-kmp-default-5.3.18-59.10.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-preempt-5.3.18-59.10.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.10.1.aarch64"
},
"product_reference": "ocfs2-kmp-preempt-5.3.18-59.10.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-preempt-5.3.18-59.10.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.10.1.x86_64"
},
"product_reference": "ocfs2-kmp-preempt-5.3.18-59.10.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-64kb-5.3.18-59.10.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.10.1.aarch64"
},
"product_reference": "reiserfs-kmp-64kb-5.3.18-59.10.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-5.3.18-59.10.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.10.1.aarch64"
},
"product_reference": "reiserfs-kmp-default-5.3.18-59.10.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-5.3.18-59.10.1.ppc64le as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.10.1.ppc64le"
},
"product_reference": "reiserfs-kmp-default-5.3.18-59.10.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-5.3.18-59.10.1.s390x as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.10.1.s390x"
},
"product_reference": "reiserfs-kmp-default-5.3.18-59.10.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-5.3.18-59.10.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.10.1.x86_64"
},
"product_reference": "reiserfs-kmp-default-5.3.18-59.10.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-preempt-5.3.18-59.10.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.10.1.aarch64"
},
"product_reference": "reiserfs-kmp-preempt-5.3.18-59.10.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-preempt-5.3.18-59.10.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.10.1.x86_64"
},
"product_reference": "reiserfs-kmp-preempt-5.3.18-59.10.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2020-26558",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-26558"
}
],
"notes": [
{
"category": "general",
"text": "Bluetooth LE and BR/EDR secure pairing in Bluetooth Core Specification 2.1 through 5.2 may permit a nearby man-in-the-middle attacker to identify the Passkey used during pairing (in the Passkey authentication procedure) by reflection of the public key and the authentication evidence of the initiating device, potentially permitting this attacker to complete authenticated pairing with the responding device using the correct Passkey for the pairing session. The attack methodology determines the Passkey value one bit at a time.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.10.1.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.10.1.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.10.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.10.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.10.1.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.10.1.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.10.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.10.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.10.1.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.10.1.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.10.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.10.1.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.10.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.10.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.10.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.10.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.10.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.10.1.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.10.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.10.1.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.10.1.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.10.1.18.4.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.10.1.18.4.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.10.1.18.4.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.10.1.18.4.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.10.1.18.4.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.10.1.18.4.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.10.1.18.4.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.10.1.18.4.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.10.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.10.1.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.10.1.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.10.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.10.1.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.10.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.10.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.10.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.10.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.10.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.10.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.10.1.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.10.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.10.1.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.10.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.10.1.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.10.1.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.10.1.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.10.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.10.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.10.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.10.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.10.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.10.1.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.10.1.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.10.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.10.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.10.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.10.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.10.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.10.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.10.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.10.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.10.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.10.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.10.1.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.10.1.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.10.1.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.10.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.10.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.10.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.10.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.10.1.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.10.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.10.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.10.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.10.1.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.10.1.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.10.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.10.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.10.1.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.10.1.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.10.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.10.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-26558",
"url": "https://www.suse.com/security/cve/CVE-2020-26558"
},
{
"category": "external",
"summary": "SUSE Bug 1179610 for CVE-2020-26558",
"url": "https://bugzilla.suse.com/1179610"
},
{
"category": "external",
"summary": "SUSE Bug 1186463 for CVE-2020-26558",
"url": "https://bugzilla.suse.com/1186463"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.10.1.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.10.1.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.10.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.10.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.10.1.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.10.1.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.10.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.10.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.10.1.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.10.1.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.10.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.10.1.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.10.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.10.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.10.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.10.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.10.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.10.1.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.10.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.10.1.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.10.1.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.10.1.18.4.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.10.1.18.4.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.10.1.18.4.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.10.1.18.4.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.10.1.18.4.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.10.1.18.4.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.10.1.18.4.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.10.1.18.4.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.10.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.10.1.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.10.1.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.10.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.10.1.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.10.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.10.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.10.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.10.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.10.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.10.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.10.1.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.10.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.10.1.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.10.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.10.1.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.10.1.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.10.1.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.10.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.10.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.10.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.10.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.10.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.10.1.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.10.1.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.10.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.10.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.10.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.10.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.10.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.10.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.10.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.10.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.10.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.10.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.10.1.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.10.1.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.10.1.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.10.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.10.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.10.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.10.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.10.1.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.10.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.10.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.10.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.10.1.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.10.1.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.10.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.10.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.10.1.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.10.1.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.10.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.10.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.10.1.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.10.1.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.10.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.10.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.10.1.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.10.1.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.10.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.10.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.10.1.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.10.1.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.10.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.10.1.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.10.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.10.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.10.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.10.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.10.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.10.1.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.10.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.10.1.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.10.1.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.10.1.18.4.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.10.1.18.4.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.10.1.18.4.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.10.1.18.4.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.10.1.18.4.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.10.1.18.4.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.10.1.18.4.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.10.1.18.4.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.10.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.10.1.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.10.1.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.10.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.10.1.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.10.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.10.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.10.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.10.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.10.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.10.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.10.1.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.10.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.10.1.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.10.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.10.1.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.10.1.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.10.1.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.10.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.10.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.10.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.10.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.10.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.10.1.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.10.1.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.10.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.10.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.10.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.10.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.10.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.10.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.10.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.10.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.10.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.10.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.10.1.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.10.1.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.10.1.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.10.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.10.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.10.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.10.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.10.1.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.10.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.10.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.10.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.10.1.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.10.1.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.10.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.10.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.10.1.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.10.1.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.10.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.10.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-28T16:23:04Z",
"details": "moderate"
}
],
"title": "CVE-2020-26558"
},
{
"cve": "CVE-2020-36385",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-36385"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel before 5.10. drivers/infiniband/core/ucma.c has a use-after-free because the ctx is reached via the ctx_list in some ucma_migrate_id situations where ucma_close is called, aka CID-f5449e74802c.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.10.1.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.10.1.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.10.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.10.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.10.1.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.10.1.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.10.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.10.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.10.1.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.10.1.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.10.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.10.1.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.10.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.10.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.10.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.10.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.10.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.10.1.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.10.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.10.1.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.10.1.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.10.1.18.4.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.10.1.18.4.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.10.1.18.4.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.10.1.18.4.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.10.1.18.4.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.10.1.18.4.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.10.1.18.4.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.10.1.18.4.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.10.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.10.1.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.10.1.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.10.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.10.1.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.10.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.10.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.10.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.10.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.10.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.10.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.10.1.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.10.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.10.1.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.10.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.10.1.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.10.1.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.10.1.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.10.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.10.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.10.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.10.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.10.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.10.1.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.10.1.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.10.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.10.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.10.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.10.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.10.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.10.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.10.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.10.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.10.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.10.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.10.1.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.10.1.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.10.1.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.10.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.10.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.10.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.10.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.10.1.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.10.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.10.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.10.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.10.1.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.10.1.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.10.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.10.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.10.1.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.10.1.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.10.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.10.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-36385",
"url": "https://www.suse.com/security/cve/CVE-2020-36385"
},
{
"category": "external",
"summary": "SUSE Bug 1187050 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1187050"
},
{
"category": "external",
"summary": "SUSE Bug 1187052 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1187052"
},
{
"category": "external",
"summary": "SUSE Bug 1189302 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1189302"
},
{
"category": "external",
"summary": "SUSE Bug 1196174 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1196174"
},
{
"category": "external",
"summary": "SUSE Bug 1196810 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1196810"
},
{
"category": "external",
"summary": "SUSE Bug 1196914 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1196914"
},
{
"category": "external",
"summary": "SUSE Bug 1200084 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1200084"
},
{
"category": "external",
"summary": "SUSE Bug 1201734 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1201734"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.10.1.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.10.1.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.10.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.10.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.10.1.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.10.1.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.10.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.10.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.10.1.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.10.1.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.10.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.10.1.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.10.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.10.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.10.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.10.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.10.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.10.1.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.10.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.10.1.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.10.1.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.10.1.18.4.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.10.1.18.4.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.10.1.18.4.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.10.1.18.4.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.10.1.18.4.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.10.1.18.4.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.10.1.18.4.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.10.1.18.4.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.10.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.10.1.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.10.1.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.10.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.10.1.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.10.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.10.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.10.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.10.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.10.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.10.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.10.1.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.10.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.10.1.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.10.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.10.1.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.10.1.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.10.1.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.10.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.10.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.10.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.10.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.10.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.10.1.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.10.1.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.10.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.10.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.10.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.10.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.10.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.10.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.10.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.10.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.10.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.10.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.10.1.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.10.1.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.10.1.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.10.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.10.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.10.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.10.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.10.1.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.10.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.10.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.10.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.10.1.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.10.1.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.10.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.10.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.10.1.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.10.1.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.10.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.10.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.10.1.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.10.1.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.10.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.10.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.10.1.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.10.1.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.10.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.10.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.10.1.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.10.1.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.10.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.10.1.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.10.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.10.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.10.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.10.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.10.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.10.1.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.10.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.10.1.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.10.1.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.10.1.18.4.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.10.1.18.4.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.10.1.18.4.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.10.1.18.4.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.10.1.18.4.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.10.1.18.4.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.10.1.18.4.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.10.1.18.4.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.10.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.10.1.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.10.1.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.10.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.10.1.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.10.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.10.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.10.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.10.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.10.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.10.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.10.1.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.10.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.10.1.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.10.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.10.1.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.10.1.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.10.1.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.10.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.10.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.10.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.10.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.10.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.10.1.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.10.1.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.10.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.10.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.10.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.10.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.10.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.10.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.10.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.10.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.10.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.10.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.10.1.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.10.1.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.10.1.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.10.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.10.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.10.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.10.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.10.1.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.10.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.10.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.10.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.10.1.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.10.1.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.10.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.10.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.10.1.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.10.1.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.10.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.10.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-28T16:23:04Z",
"details": "important"
}
],
"title": "CVE-2020-36385"
},
{
"cve": "CVE-2020-36386",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-36386"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel before 5.8.1. net/bluetooth/hci_event.c has a slab out-of-bounds read in hci_extended_inquiry_result_evt, aka CID-51c19bf3d5cf.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.10.1.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.10.1.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.10.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.10.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.10.1.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.10.1.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.10.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.10.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.10.1.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.10.1.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.10.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.10.1.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.10.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.10.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.10.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.10.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.10.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.10.1.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.10.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.10.1.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.10.1.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.10.1.18.4.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.10.1.18.4.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.10.1.18.4.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.10.1.18.4.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.10.1.18.4.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.10.1.18.4.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.10.1.18.4.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.10.1.18.4.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.10.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.10.1.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.10.1.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.10.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.10.1.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.10.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.10.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.10.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.10.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.10.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.10.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.10.1.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.10.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.10.1.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.10.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.10.1.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.10.1.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.10.1.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.10.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.10.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.10.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.10.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.10.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.10.1.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.10.1.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.10.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.10.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.10.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.10.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.10.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.10.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.10.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.10.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.10.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.10.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.10.1.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.10.1.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.10.1.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.10.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.10.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.10.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.10.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.10.1.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.10.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.10.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.10.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.10.1.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.10.1.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.10.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.10.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.10.1.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.10.1.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.10.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.10.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-36386",
"url": "https://www.suse.com/security/cve/CVE-2020-36386"
},
{
"category": "external",
"summary": "SUSE Bug 1187038 for CVE-2020-36386",
"url": "https://bugzilla.suse.com/1187038"
},
{
"category": "external",
"summary": "SUSE Bug 1192868 for CVE-2020-36386",
"url": "https://bugzilla.suse.com/1192868"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.10.1.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.10.1.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.10.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.10.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.10.1.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.10.1.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.10.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.10.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.10.1.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.10.1.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.10.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.10.1.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.10.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.10.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.10.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.10.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.10.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.10.1.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.10.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.10.1.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.10.1.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.10.1.18.4.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.10.1.18.4.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.10.1.18.4.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.10.1.18.4.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.10.1.18.4.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.10.1.18.4.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.10.1.18.4.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.10.1.18.4.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.10.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.10.1.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.10.1.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.10.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.10.1.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.10.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.10.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.10.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.10.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.10.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.10.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.10.1.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.10.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.10.1.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.10.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.10.1.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.10.1.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.10.1.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.10.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.10.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.10.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.10.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.10.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.10.1.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.10.1.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.10.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.10.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.10.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.10.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.10.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.10.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.10.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.10.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.10.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.10.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.10.1.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.10.1.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.10.1.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.10.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.10.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.10.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.10.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.10.1.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.10.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.10.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.10.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.10.1.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.10.1.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.10.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.10.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.10.1.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.10.1.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.10.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.10.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.10.1.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.10.1.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.10.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.10.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.10.1.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.10.1.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.10.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.10.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.10.1.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.10.1.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.10.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.10.1.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.10.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.10.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.10.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.10.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.10.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.10.1.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.10.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.10.1.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.10.1.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.10.1.18.4.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.10.1.18.4.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.10.1.18.4.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.10.1.18.4.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.10.1.18.4.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.10.1.18.4.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.10.1.18.4.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.10.1.18.4.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.10.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.10.1.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.10.1.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.10.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.10.1.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.10.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.10.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.10.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.10.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.10.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.10.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.10.1.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.10.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.10.1.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.10.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.10.1.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.10.1.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.10.1.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.10.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.10.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.10.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.10.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.10.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.10.1.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.10.1.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.10.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.10.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.10.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.10.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.10.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.10.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.10.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.10.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.10.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.10.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.10.1.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.10.1.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.10.1.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.10.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.10.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.10.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.10.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.10.1.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.10.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.10.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.10.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.10.1.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.10.1.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.10.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.10.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.10.1.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.10.1.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.10.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.10.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-28T16:23:04Z",
"details": "moderate"
}
],
"title": "CVE-2020-36386"
},
{
"cve": "CVE-2021-0129",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-0129"
}
],
"notes": [
{
"category": "general",
"text": "Improper access control in BlueZ may allow an authenticated user to potentially enable information disclosure via adjacent access.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.10.1.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.10.1.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.10.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.10.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.10.1.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.10.1.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.10.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.10.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.10.1.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.10.1.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.10.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.10.1.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.10.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.10.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.10.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.10.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.10.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.10.1.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.10.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.10.1.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.10.1.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.10.1.18.4.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.10.1.18.4.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.10.1.18.4.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.10.1.18.4.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.10.1.18.4.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.10.1.18.4.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.10.1.18.4.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.10.1.18.4.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.10.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.10.1.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.10.1.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.10.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.10.1.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.10.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.10.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.10.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.10.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.10.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.10.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.10.1.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.10.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.10.1.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.10.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.10.1.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.10.1.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.10.1.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.10.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.10.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.10.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.10.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.10.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.10.1.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.10.1.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.10.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.10.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.10.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.10.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.10.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.10.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.10.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.10.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.10.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.10.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.10.1.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.10.1.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.10.1.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.10.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.10.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.10.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.10.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.10.1.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.10.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.10.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.10.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.10.1.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.10.1.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.10.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.10.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.10.1.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.10.1.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.10.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.10.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-0129",
"url": "https://www.suse.com/security/cve/CVE-2021-0129"
},
{
"category": "external",
"summary": "SUSE Bug 1186463 for CVE-2021-0129",
"url": "https://bugzilla.suse.com/1186463"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.10.1.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.10.1.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.10.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.10.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.10.1.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.10.1.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.10.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.10.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.10.1.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.10.1.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.10.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.10.1.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.10.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.10.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.10.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.10.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.10.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.10.1.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.10.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.10.1.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.10.1.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.10.1.18.4.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.10.1.18.4.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.10.1.18.4.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.10.1.18.4.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.10.1.18.4.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.10.1.18.4.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.10.1.18.4.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.10.1.18.4.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.10.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.10.1.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.10.1.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.10.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.10.1.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.10.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.10.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.10.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.10.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.10.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.10.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.10.1.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.10.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.10.1.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.10.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.10.1.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.10.1.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.10.1.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.10.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.10.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.10.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.10.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.10.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.10.1.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.10.1.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.10.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.10.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.10.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.10.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.10.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.10.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.10.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.10.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.10.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.10.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.10.1.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.10.1.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.10.1.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.10.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.10.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.10.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.10.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.10.1.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.10.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.10.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.10.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.10.1.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.10.1.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.10.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.10.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.10.1.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.10.1.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.10.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.10.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.10.1.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.10.1.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.10.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.10.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.10.1.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.10.1.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.10.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.10.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.10.1.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.10.1.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.10.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.10.1.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.10.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.10.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.10.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.10.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.10.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.10.1.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.10.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.10.1.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.10.1.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.10.1.18.4.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.10.1.18.4.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.10.1.18.4.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.10.1.18.4.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.10.1.18.4.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.10.1.18.4.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.10.1.18.4.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.10.1.18.4.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.10.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.10.1.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.10.1.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.10.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.10.1.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.10.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.10.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.10.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.10.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.10.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.10.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.10.1.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.10.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.10.1.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.10.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.10.1.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.10.1.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.10.1.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.10.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.10.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.10.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.10.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.10.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.10.1.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.10.1.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.10.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.10.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.10.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.10.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.10.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.10.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.10.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.10.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.10.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.10.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.10.1.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.10.1.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.10.1.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.10.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.10.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.10.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.10.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.10.1.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.10.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.10.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.10.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.10.1.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.10.1.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.10.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.10.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.10.1.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.10.1.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.10.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.10.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.10.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-28T16:23:04Z",
"details": "moderate"
}
],
"title": "CVE-2021-0129"
}
]
}
opensuse-su-2021:2427-1
Vulnerability from csaf_opensuse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel",
"title": "Title of the patch"
},
{
"category": "description",
"text": "The SUSE Linux Enterprise 15 SP3 kernel was updated to receive various security and bugfixes.\n\nThe following security bugs were fixed:\n\n- CVE-2021-22555: Fixed an heap out-of-bounds write in net/netfilter/x_tables.c that could allow local provilege escalation. (bsc#1188116)\n- CVE-2021-33624: Fixed a bug which allows unprivileged BPF program to leak the contents of arbitrary kernel memory (and therefore, of all physical memory) via a side-channel. (bsc#1187554)\n- CVE-2021-0605: Fixed an out-of-bounds read which could lead to local information disclosure in the kernel with System execution privileges needed. (bsc#1187601)\n- CVE-2021-0512: Fixed a possible out-of-bounds write which could lead to local escalation of privilege with no additional execution privileges needed. (bsc#1187595)\n- CVE-2020-26558: Fixed a flaw in the Bluetooth LE and BR/EDR secure pairing that could permit a nearby man-in-the-middle attacker to identify the Passkey used during pairing. (bnc#1179610)\n- CVE-2021-34693: Fixed a bug in net/can/bcm.c which could allow local users to obtain sensitive information from kernel stack memory because parts of a data structure are uninitialized. (bsc#1187452)\n- CVE-2021-0129: Fixed an improper access control in BlueZ that may have allowed an authenticated user to potentially enable information disclosure via adjacent access. (bnc#1186463)\n- CVE-2020-36386: Fixed an out-of-bounds read in hci_extended_inquiry_result_evt. (bsc#1187038)\n- CVE-2020-24588: Fixed a bug that could allow an adversary to abuse devices that support receiving non-SSP A-MSDU frames to inject arbitrary network packets. (bsc#1185861 bsc#1185863)\n- CVE-2021-33909: Fixed an out-of-bounds write in the filesystem layer that allows to andobtain full root privileges. (bsc#1188062)\n- CVE-2021-3609: Fixed a race condition in the CAN BCM networking protocol which allows for local privilege escalation. (bsc#1187215)\n- CVE-2020-36385: Fixed a use-after-free flaw in ucma.c which allows for local privilege escalation. (bsc#1187050)\n- CVE-2021-33200: Fix leakage of uninitialized bpf stack under speculation. (bsc#1186484)\n\nThe following non-security bugs were fixed:\n\n- af_packet: fix the tx skb protocol in raw sockets with ETH_P_ALL (bsc#1176081).\n- kabi: preserve struct header_ops after bsc#1176081 fix (bsc#1176081).\n- net: Do not set transport offset to invalid value (bsc#1176081).\n- net: Introduce parse_protocol header_ops callback (bsc#1176081).\n- net/ethernet: Add parse_protocol header_ops support (bsc#1176081).\n- net/mlx5e: Remove the wrong assumption about transport offset (bsc#1176081).\n- net/mlx5e: Trust kernel regarding transport offset (bsc#1176081).\n- net/packet: Ask driver for protocol if not provided by user (bsc#1176081).\n- net/packet: Remove redundant skb-\u003eprotocol set (bsc#1176081).\n- resource: Fix find_next_iomem_res() iteration issue (bsc#1181193).\n- scsi: scsi_dh_alua: Retry RTPG on a different path after failure (bsc#1174978 bsc#1185701).\n- SUNRPC in case of backlog, hand free slots directly to waiting task (bsc#1185428).\n- SUNRPC: More fixes for backlog congestion (bsc#1185428).\n- x86/crash: Add e820 reserved ranges to kdump kernel\u0027s e820 table (bsc#1181193).\n- x86/debug: Extend the lower bound of crash kernel low reservations (bsc#1153720).\n- x86/e820, ioport: Add a new I/O resource descriptor IORES_DESC_RESERVED (bsc#1181193).\n- x86/mm: Rework ioremap resource mapping determination (bsc#1181193).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-SLE-15.3-2021-2427",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2021_2427-1.json"
},
{
"category": "self",
"summary": "URL for openSUSE-SU-2021:2427-1",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HJIMD6XIKYMKE35TUYXKKYPX4737LEVU/"
},
{
"category": "self",
"summary": "E-Mail link for openSUSE-SU-2021:2427-1",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HJIMD6XIKYMKE35TUYXKKYPX4737LEVU/"
},
{
"category": "self",
"summary": "SUSE Bug 1153720",
"url": "https://bugzilla.suse.com/1153720"
},
{
"category": "self",
"summary": "SUSE Bug 1174978",
"url": "https://bugzilla.suse.com/1174978"
},
{
"category": "self",
"summary": "SUSE Bug 1179610",
"url": "https://bugzilla.suse.com/1179610"
},
{
"category": "self",
"summary": "SUSE Bug 1181193",
"url": "https://bugzilla.suse.com/1181193"
},
{
"category": "self",
"summary": "SUSE Bug 1185428",
"url": "https://bugzilla.suse.com/1185428"
},
{
"category": "self",
"summary": "SUSE Bug 1185701",
"url": "https://bugzilla.suse.com/1185701"
},
{
"category": "self",
"summary": "SUSE Bug 1185861",
"url": "https://bugzilla.suse.com/1185861"
},
{
"category": "self",
"summary": "SUSE Bug 1186463",
"url": "https://bugzilla.suse.com/1186463"
},
{
"category": "self",
"summary": "SUSE Bug 1186484",
"url": "https://bugzilla.suse.com/1186484"
},
{
"category": "self",
"summary": "SUSE Bug 1187038",
"url": "https://bugzilla.suse.com/1187038"
},
{
"category": "self",
"summary": "SUSE Bug 1187050",
"url": "https://bugzilla.suse.com/1187050"
},
{
"category": "self",
"summary": "SUSE Bug 1187215",
"url": "https://bugzilla.suse.com/1187215"
},
{
"category": "self",
"summary": "SUSE Bug 1187452",
"url": "https://bugzilla.suse.com/1187452"
},
{
"category": "self",
"summary": "SUSE Bug 1187554",
"url": "https://bugzilla.suse.com/1187554"
},
{
"category": "self",
"summary": "SUSE Bug 1187595",
"url": "https://bugzilla.suse.com/1187595"
},
{
"category": "self",
"summary": "SUSE Bug 1187601",
"url": "https://bugzilla.suse.com/1187601"
},
{
"category": "self",
"summary": "SUSE Bug 1188062",
"url": "https://bugzilla.suse.com/1188062"
},
{
"category": "self",
"summary": "SUSE Bug 1188116",
"url": "https://bugzilla.suse.com/1188116"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-24588 page",
"url": "https://www.suse.com/security/cve/CVE-2020-24588/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-26558 page",
"url": "https://www.suse.com/security/cve/CVE-2020-26558/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-36385 page",
"url": "https://www.suse.com/security/cve/CVE-2020-36385/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-36386 page",
"url": "https://www.suse.com/security/cve/CVE-2020-36386/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-0129 page",
"url": "https://www.suse.com/security/cve/CVE-2021-0129/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-0512 page",
"url": "https://www.suse.com/security/cve/CVE-2021-0512/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-0605 page",
"url": "https://www.suse.com/security/cve/CVE-2021-0605/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-22555 page",
"url": "https://www.suse.com/security/cve/CVE-2021-22555/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-33200 page",
"url": "https://www.suse.com/security/cve/CVE-2021-33200/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-33624 page",
"url": "https://www.suse.com/security/cve/CVE-2021-33624/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-33909 page",
"url": "https://www.suse.com/security/cve/CVE-2021-33909/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-34693 page",
"url": "https://www.suse.com/security/cve/CVE-2021-34693/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3609 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3609/"
}
],
"title": "Security update for the Linux Kernel",
"tracking": {
"current_release_date": "2021-07-21T09:28:39Z",
"generator": {
"date": "2021-07-21T09:28:39Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2021:2427-1",
"initial_release_date": "2021-07-21T09:28:39Z",
"revision_history": [
{
"date": "2021-07-21T09:28:39Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "kernel-vanilla-4.12.14-197.99.1.aarch64",
"product": {
"name": "kernel-vanilla-4.12.14-197.99.1.aarch64",
"product_id": "kernel-vanilla-4.12.14-197.99.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-base-4.12.14-197.99.1.aarch64",
"product": {
"name": "kernel-vanilla-base-4.12.14-197.99.1.aarch64",
"product_id": "kernel-vanilla-base-4.12.14-197.99.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-devel-4.12.14-197.99.1.aarch64",
"product": {
"name": "kernel-vanilla-devel-4.12.14-197.99.1.aarch64",
"product_id": "kernel-vanilla-devel-4.12.14-197.99.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-livepatch-devel-4.12.14-197.99.1.aarch64",
"product": {
"name": "kernel-vanilla-livepatch-devel-4.12.14-197.99.1.aarch64",
"product_id": "kernel-vanilla-livepatch-devel-4.12.14-197.99.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-debug-base-4.12.14-197.99.1.ppc64le",
"product": {
"name": "kernel-debug-base-4.12.14-197.99.1.ppc64le",
"product_id": "kernel-debug-base-4.12.14-197.99.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-4.12.14-197.99.1.ppc64le",
"product": {
"name": "kernel-vanilla-4.12.14-197.99.1.ppc64le",
"product_id": "kernel-vanilla-4.12.14-197.99.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-base-4.12.14-197.99.1.ppc64le",
"product": {
"name": "kernel-vanilla-base-4.12.14-197.99.1.ppc64le",
"product_id": "kernel-vanilla-base-4.12.14-197.99.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-devel-4.12.14-197.99.1.ppc64le",
"product": {
"name": "kernel-vanilla-devel-4.12.14-197.99.1.ppc64le",
"product_id": "kernel-vanilla-devel-4.12.14-197.99.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-livepatch-devel-4.12.14-197.99.1.ppc64le",
"product": {
"name": "kernel-vanilla-livepatch-devel-4.12.14-197.99.1.ppc64le",
"product_id": "kernel-vanilla-livepatch-devel-4.12.14-197.99.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-default-man-4.12.14-197.99.1.s390x",
"product": {
"name": "kernel-default-man-4.12.14-197.99.1.s390x",
"product_id": "kernel-default-man-4.12.14-197.99.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-4.12.14-197.99.1.s390x",
"product": {
"name": "kernel-vanilla-4.12.14-197.99.1.s390x",
"product_id": "kernel-vanilla-4.12.14-197.99.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-base-4.12.14-197.99.1.s390x",
"product": {
"name": "kernel-vanilla-base-4.12.14-197.99.1.s390x",
"product_id": "kernel-vanilla-base-4.12.14-197.99.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-devel-4.12.14-197.99.1.s390x",
"product": {
"name": "kernel-vanilla-devel-4.12.14-197.99.1.s390x",
"product_id": "kernel-vanilla-devel-4.12.14-197.99.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-livepatch-devel-4.12.14-197.99.1.s390x",
"product": {
"name": "kernel-vanilla-livepatch-devel-4.12.14-197.99.1.s390x",
"product_id": "kernel-vanilla-livepatch-devel-4.12.14-197.99.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-man-4.12.14-197.99.1.s390x",
"product": {
"name": "kernel-zfcpdump-man-4.12.14-197.99.1.s390x",
"product_id": "kernel-zfcpdump-man-4.12.14-197.99.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-debug-base-4.12.14-197.99.1.x86_64",
"product": {
"name": "kernel-debug-base-4.12.14-197.99.1.x86_64",
"product_id": "kernel-debug-base-4.12.14-197.99.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-base-4.12.14-197.99.1.x86_64",
"product": {
"name": "kernel-kvmsmall-base-4.12.14-197.99.1.x86_64",
"product_id": "kernel-kvmsmall-base-4.12.14-197.99.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-4.12.14-197.99.1.x86_64",
"product": {
"name": "kernel-vanilla-4.12.14-197.99.1.x86_64",
"product_id": "kernel-vanilla-4.12.14-197.99.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-base-4.12.14-197.99.1.x86_64",
"product": {
"name": "kernel-vanilla-base-4.12.14-197.99.1.x86_64",
"product_id": "kernel-vanilla-base-4.12.14-197.99.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-devel-4.12.14-197.99.1.x86_64",
"product": {
"name": "kernel-vanilla-devel-4.12.14-197.99.1.x86_64",
"product_id": "kernel-vanilla-devel-4.12.14-197.99.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-livepatch-devel-4.12.14-197.99.1.x86_64",
"product": {
"name": "kernel-vanilla-livepatch-devel-4.12.14-197.99.1.x86_64",
"product_id": "kernel-vanilla-livepatch-devel-4.12.14-197.99.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Leap 15.3",
"product": {
"name": "openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:leap:15.3"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-base-4.12.14-197.99.1.ppc64le as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.99.1.ppc64le"
},
"product_reference": "kernel-debug-base-4.12.14-197.99.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-base-4.12.14-197.99.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.99.1.x86_64"
},
"product_reference": "kernel-debug-base-4.12.14-197.99.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-man-4.12.14-197.99.1.s390x as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-default-man-4.12.14-197.99.1.s390x"
},
"product_reference": "kernel-default-man-4.12.14-197.99.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kvmsmall-base-4.12.14-197.99.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.99.1.x86_64"
},
"product_reference": "kernel-kvmsmall-base-4.12.14-197.99.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-vanilla-4.12.14-197.99.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.aarch64"
},
"product_reference": "kernel-vanilla-4.12.14-197.99.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-vanilla-4.12.14-197.99.1.ppc64le as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.ppc64le"
},
"product_reference": "kernel-vanilla-4.12.14-197.99.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-vanilla-4.12.14-197.99.1.s390x as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.s390x"
},
"product_reference": "kernel-vanilla-4.12.14-197.99.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-vanilla-4.12.14-197.99.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.x86_64"
},
"product_reference": "kernel-vanilla-4.12.14-197.99.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-vanilla-base-4.12.14-197.99.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.aarch64"
},
"product_reference": "kernel-vanilla-base-4.12.14-197.99.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-vanilla-base-4.12.14-197.99.1.ppc64le as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.ppc64le"
},
"product_reference": "kernel-vanilla-base-4.12.14-197.99.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-vanilla-base-4.12.14-197.99.1.s390x as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.s390x"
},
"product_reference": "kernel-vanilla-base-4.12.14-197.99.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-vanilla-base-4.12.14-197.99.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.x86_64"
},
"product_reference": "kernel-vanilla-base-4.12.14-197.99.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-vanilla-devel-4.12.14-197.99.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.aarch64"
},
"product_reference": "kernel-vanilla-devel-4.12.14-197.99.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-vanilla-devel-4.12.14-197.99.1.ppc64le as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.ppc64le"
},
"product_reference": "kernel-vanilla-devel-4.12.14-197.99.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-vanilla-devel-4.12.14-197.99.1.s390x as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.s390x"
},
"product_reference": "kernel-vanilla-devel-4.12.14-197.99.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-vanilla-devel-4.12.14-197.99.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.x86_64"
},
"product_reference": "kernel-vanilla-devel-4.12.14-197.99.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-vanilla-livepatch-devel-4.12.14-197.99.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.aarch64"
},
"product_reference": "kernel-vanilla-livepatch-devel-4.12.14-197.99.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-vanilla-livepatch-devel-4.12.14-197.99.1.ppc64le as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.ppc64le"
},
"product_reference": "kernel-vanilla-livepatch-devel-4.12.14-197.99.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-vanilla-livepatch-devel-4.12.14-197.99.1.s390x as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.s390x"
},
"product_reference": "kernel-vanilla-livepatch-devel-4.12.14-197.99.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-vanilla-livepatch-devel-4.12.14-197.99.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.x86_64"
},
"product_reference": "kernel-vanilla-livepatch-devel-4.12.14-197.99.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-man-4.12.14-197.99.1.s390x as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.99.1.s390x"
},
"product_reference": "kernel-zfcpdump-man-4.12.14-197.99.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.3"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2020-24588",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-24588"
}
],
"notes": [
{
"category": "general",
"text": "The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn\u0027t require that the A-MSDU flag in the plaintext QoS header field is authenticated. Against devices that support receiving non-SSP A-MSDU frames (which is mandatory as part of 802.11n), an adversary can abuse this to inject arbitrary network packets.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.99.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-24588",
"url": "https://www.suse.com/security/cve/CVE-2020-24588"
},
{
"category": "external",
"summary": "SUSE Bug 1185861 for CVE-2020-24588",
"url": "https://bugzilla.suse.com/1185861"
},
{
"category": "external",
"summary": "SUSE Bug 1192868 for CVE-2020-24588",
"url": "https://bugzilla.suse.com/1192868"
},
{
"category": "external",
"summary": "SUSE Bug 1199701 for CVE-2020-24588",
"url": "https://bugzilla.suse.com/1199701"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.99.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.99.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-21T09:28:39Z",
"details": "moderate"
}
],
"title": "CVE-2020-24588"
},
{
"cve": "CVE-2020-26558",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-26558"
}
],
"notes": [
{
"category": "general",
"text": "Bluetooth LE and BR/EDR secure pairing in Bluetooth Core Specification 2.1 through 5.2 may permit a nearby man-in-the-middle attacker to identify the Passkey used during pairing (in the Passkey authentication procedure) by reflection of the public key and the authentication evidence of the initiating device, potentially permitting this attacker to complete authenticated pairing with the responding device using the correct Passkey for the pairing session. The attack methodology determines the Passkey value one bit at a time.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.99.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-26558",
"url": "https://www.suse.com/security/cve/CVE-2020-26558"
},
{
"category": "external",
"summary": "SUSE Bug 1179610 for CVE-2020-26558",
"url": "https://bugzilla.suse.com/1179610"
},
{
"category": "external",
"summary": "SUSE Bug 1186463 for CVE-2020-26558",
"url": "https://bugzilla.suse.com/1186463"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.99.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.99.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-21T09:28:39Z",
"details": "moderate"
}
],
"title": "CVE-2020-26558"
},
{
"cve": "CVE-2020-36385",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-36385"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel before 5.10. drivers/infiniband/core/ucma.c has a use-after-free because the ctx is reached via the ctx_list in some ucma_migrate_id situations where ucma_close is called, aka CID-f5449e74802c.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.99.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-36385",
"url": "https://www.suse.com/security/cve/CVE-2020-36385"
},
{
"category": "external",
"summary": "SUSE Bug 1187050 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1187050"
},
{
"category": "external",
"summary": "SUSE Bug 1187052 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1187052"
},
{
"category": "external",
"summary": "SUSE Bug 1189302 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1189302"
},
{
"category": "external",
"summary": "SUSE Bug 1196174 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1196174"
},
{
"category": "external",
"summary": "SUSE Bug 1196810 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1196810"
},
{
"category": "external",
"summary": "SUSE Bug 1196914 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1196914"
},
{
"category": "external",
"summary": "SUSE Bug 1200084 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1200084"
},
{
"category": "external",
"summary": "SUSE Bug 1201734 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1201734"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.99.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.99.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-21T09:28:39Z",
"details": "important"
}
],
"title": "CVE-2020-36385"
},
{
"cve": "CVE-2020-36386",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-36386"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel before 5.8.1. net/bluetooth/hci_event.c has a slab out-of-bounds read in hci_extended_inquiry_result_evt, aka CID-51c19bf3d5cf.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.99.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-36386",
"url": "https://www.suse.com/security/cve/CVE-2020-36386"
},
{
"category": "external",
"summary": "SUSE Bug 1187038 for CVE-2020-36386",
"url": "https://bugzilla.suse.com/1187038"
},
{
"category": "external",
"summary": "SUSE Bug 1192868 for CVE-2020-36386",
"url": "https://bugzilla.suse.com/1192868"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.99.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.99.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-21T09:28:39Z",
"details": "moderate"
}
],
"title": "CVE-2020-36386"
},
{
"cve": "CVE-2021-0129",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-0129"
}
],
"notes": [
{
"category": "general",
"text": "Improper access control in BlueZ may allow an authenticated user to potentially enable information disclosure via adjacent access.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.99.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-0129",
"url": "https://www.suse.com/security/cve/CVE-2021-0129"
},
{
"category": "external",
"summary": "SUSE Bug 1186463 for CVE-2021-0129",
"url": "https://bugzilla.suse.com/1186463"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.99.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.99.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-21T09:28:39Z",
"details": "moderate"
}
],
"title": "CVE-2021-0129"
},
{
"cve": "CVE-2021-0512",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-0512"
}
],
"notes": [
{
"category": "general",
"text": "In __hidinput_change_resolution_multipliers of hid-input.c, there is a possible out of bounds write due to a heap buffer overflow. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-173843328References: Upstream kernel",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.99.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-0512",
"url": "https://www.suse.com/security/cve/CVE-2021-0512"
},
{
"category": "external",
"summary": "SUSE Bug 1187595 for CVE-2021-0512",
"url": "https://bugzilla.suse.com/1187595"
},
{
"category": "external",
"summary": "SUSE Bug 1187597 for CVE-2021-0512",
"url": "https://bugzilla.suse.com/1187597"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.99.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.99.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-21T09:28:39Z",
"details": "important"
}
],
"title": "CVE-2021-0512"
},
{
"cve": "CVE-2021-0605",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-0605"
}
],
"notes": [
{
"category": "general",
"text": "In pfkey_dump of af_key.c, there is a possible out-of-bounds read due to a missing bounds check. This could lead to local information disclosure in the kernel with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-110373476",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.99.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-0605",
"url": "https://www.suse.com/security/cve/CVE-2021-0605"
},
{
"category": "external",
"summary": "SUSE Bug 1187601 for CVE-2021-0605",
"url": "https://bugzilla.suse.com/1187601"
},
{
"category": "external",
"summary": "SUSE Bug 1187687 for CVE-2021-0605",
"url": "https://bugzilla.suse.com/1187687"
},
{
"category": "external",
"summary": "SUSE Bug 1188381 for CVE-2021-0605",
"url": "https://bugzilla.suse.com/1188381"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.99.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.99.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-21T09:28:39Z",
"details": "important"
}
],
"title": "CVE-2021-0605"
},
{
"cve": "CVE-2021-22555",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-22555"
}
],
"notes": [
{
"category": "general",
"text": "A heap out-of-bounds write affecting Linux since v2.6.19-rc1 was discovered in net/netfilter/x_tables.c. This allows an attacker to gain privileges or cause a DoS (via heap memory corruption) through user name space",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.99.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-22555",
"url": "https://www.suse.com/security/cve/CVE-2021-22555"
},
{
"category": "external",
"summary": "SUSE Bug 1188116 for CVE-2021-22555",
"url": "https://bugzilla.suse.com/1188116"
},
{
"category": "external",
"summary": "SUSE Bug 1188117 for CVE-2021-22555",
"url": "https://bugzilla.suse.com/1188117"
},
{
"category": "external",
"summary": "SUSE Bug 1188411 for CVE-2021-22555",
"url": "https://bugzilla.suse.com/1188411"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.99.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.99.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-21T09:28:39Z",
"details": "important"
}
],
"title": "CVE-2021-22555"
},
{
"cve": "CVE-2021-33200",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-33200"
}
],
"notes": [
{
"category": "general",
"text": "kernel/bpf/verifier.c in the Linux kernel through 5.12.7 enforces incorrect limits for pointer arithmetic operations, aka CID-bb01a1bba579. This can be abused to perform out-of-bounds reads and writes in kernel memory, leading to local privilege escalation to root. In particular, there is a corner case where the off reg causes a masking direction change, which then results in an incorrect final aux-\u003ealu_limit.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.99.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-33200",
"url": "https://www.suse.com/security/cve/CVE-2021-33200"
},
{
"category": "external",
"summary": "SUSE Bug 1186484 for CVE-2021-33200",
"url": "https://bugzilla.suse.com/1186484"
},
{
"category": "external",
"summary": "SUSE Bug 1186498 for CVE-2021-33200",
"url": "https://bugzilla.suse.com/1186498"
},
{
"category": "external",
"summary": "SUSE Bug 1224878 for CVE-2021-33200",
"url": "https://bugzilla.suse.com/1224878"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.99.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.99.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-21T09:28:39Z",
"details": "important"
}
],
"title": "CVE-2021-33200"
},
{
"cve": "CVE-2021-33624",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-33624"
}
],
"notes": [
{
"category": "general",
"text": "In kernel/bpf/verifier.c in the Linux kernel before 5.12.13, a branch can be mispredicted (e.g., because of type confusion) and consequently an unprivileged BPF program can read arbitrary memory locations via a side-channel attack, aka CID-9183671af6db.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.99.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-33624",
"url": "https://www.suse.com/security/cve/CVE-2021-33624"
},
{
"category": "external",
"summary": "SUSE Bug 1187554 for CVE-2021-33624",
"url": "https://bugzilla.suse.com/1187554"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.99.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.99.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-21T09:28:39Z",
"details": "moderate"
}
],
"title": "CVE-2021-33624"
},
{
"cve": "CVE-2021-33909",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-33909"
}
],
"notes": [
{
"category": "general",
"text": "fs/seq_file.c in the Linux kernel 3.16 through 5.13.x before 5.13.4 does not properly restrict seq buffer allocations, leading to an integer overflow, an Out-of-bounds Write, and escalation to root by an unprivileged user, aka CID-8cae8cd89f05.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.99.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-33909",
"url": "https://www.suse.com/security/cve/CVE-2021-33909"
},
{
"category": "external",
"summary": "SUSE Bug 1188062 for CVE-2021-33909",
"url": "https://bugzilla.suse.com/1188062"
},
{
"category": "external",
"summary": "SUSE Bug 1188063 for CVE-2021-33909",
"url": "https://bugzilla.suse.com/1188063"
},
{
"category": "external",
"summary": "SUSE Bug 1188257 for CVE-2021-33909",
"url": "https://bugzilla.suse.com/1188257"
},
{
"category": "external",
"summary": "SUSE Bug 1189302 for CVE-2021-33909",
"url": "https://bugzilla.suse.com/1189302"
},
{
"category": "external",
"summary": "SUSE Bug 1190859 for CVE-2021-33909",
"url": "https://bugzilla.suse.com/1190859"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.99.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.99.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-21T09:28:39Z",
"details": "important"
}
],
"title": "CVE-2021-33909"
},
{
"cve": "CVE-2021-34693",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-34693"
}
],
"notes": [
{
"category": "general",
"text": "net/can/bcm.c in the Linux kernel through 5.12.10 allows local users to obtain sensitive information from kernel stack memory because parts of a data structure are uninitialized.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.99.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-34693",
"url": "https://www.suse.com/security/cve/CVE-2021-34693"
},
{
"category": "external",
"summary": "SUSE Bug 1187452 for CVE-2021-34693",
"url": "https://bugzilla.suse.com/1187452"
},
{
"category": "external",
"summary": "SUSE Bug 1192868 for CVE-2021-34693",
"url": "https://bugzilla.suse.com/1192868"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.99.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.99.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-21T09:28:39Z",
"details": "moderate"
}
],
"title": "CVE-2021-34693"
},
{
"cve": "CVE-2021-3609",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3609"
}
],
"notes": [
{
"category": "general",
"text": ".A flaw was found in the CAN BCM networking protocol in the Linux kernel, where a local attacker can abuse a flaw in the CAN subsystem to corrupt memory, crash the system or escalate privileges. This race condition in net/can/bcm.c in the Linux kernel allows for local privilege escalation to root.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.99.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3609",
"url": "https://www.suse.com/security/cve/CVE-2021-3609"
},
{
"category": "external",
"summary": "SUSE Bug 1187215 for CVE-2021-3609",
"url": "https://bugzilla.suse.com/1187215"
},
{
"category": "external",
"summary": "SUSE Bug 1188323 for CVE-2021-3609",
"url": "https://bugzilla.suse.com/1188323"
},
{
"category": "external",
"summary": "SUSE Bug 1188720 for CVE-2021-3609",
"url": "https://bugzilla.suse.com/1188720"
},
{
"category": "external",
"summary": "SUSE Bug 1190276 for CVE-2021-3609",
"url": "https://bugzilla.suse.com/1190276"
},
{
"category": "external",
"summary": "SUSE Bug 1196810 for CVE-2021-3609",
"url": "https://bugzilla.suse.com/1196810"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.99.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-197.99.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-197.99.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-21T09:28:39Z",
"details": "important"
}
],
"title": "CVE-2021-3609"
}
]
}
opensuse-su-2021:2291-1
Vulnerability from csaf_opensuse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for bluez",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for bluez fixes the following issues:\n\n- CVE-2021-0129,CVE-2020-26558: Check bluetooth security flags (bsc#1186463).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-SLE-15.3-2021-2291",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2021_2291-1.json"
},
{
"category": "self",
"summary": "URL for openSUSE-SU-2021:2291-1",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FGEHNTYN7DOZBN7IPNNCVSIU2JNPC226/"
},
{
"category": "self",
"summary": "E-Mail link for openSUSE-SU-2021:2291-1",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FGEHNTYN7DOZBN7IPNNCVSIU2JNPC226/"
},
{
"category": "self",
"summary": "SUSE Bug 1186463",
"url": "https://bugzilla.suse.com/1186463"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-26558 page",
"url": "https://www.suse.com/security/cve/CVE-2020-26558/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-0129 page",
"url": "https://www.suse.com/security/cve/CVE-2021-0129/"
}
],
"title": "Security update for bluez",
"tracking": {
"current_release_date": "2021-07-12T15:20:47Z",
"generator": {
"date": "2021-07-12T15:20:47Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2021:2291-1",
"initial_release_date": "2021-07-12T15:20:47Z",
"revision_history": [
{
"date": "2021-07-12T15:20:47Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "bluez-5.55-3.3.1.aarch64",
"product": {
"name": "bluez-5.55-3.3.1.aarch64",
"product_id": "bluez-5.55-3.3.1.aarch64"
}
},
{
"category": "product_version",
"name": "bluez-cups-5.55-3.3.1.aarch64",
"product": {
"name": "bluez-cups-5.55-3.3.1.aarch64",
"product_id": "bluez-cups-5.55-3.3.1.aarch64"
}
},
{
"category": "product_version",
"name": "bluez-deprecated-5.55-3.3.1.aarch64",
"product": {
"name": "bluez-deprecated-5.55-3.3.1.aarch64",
"product_id": "bluez-deprecated-5.55-3.3.1.aarch64"
}
},
{
"category": "product_version",
"name": "bluez-devel-5.55-3.3.1.aarch64",
"product": {
"name": "bluez-devel-5.55-3.3.1.aarch64",
"product_id": "bluez-devel-5.55-3.3.1.aarch64"
}
},
{
"category": "product_version",
"name": "bluez-test-5.55-3.3.1.aarch64",
"product": {
"name": "bluez-test-5.55-3.3.1.aarch64",
"product_id": "bluez-test-5.55-3.3.1.aarch64"
}
},
{
"category": "product_version",
"name": "libbluetooth3-5.55-3.3.1.aarch64",
"product": {
"name": "libbluetooth3-5.55-3.3.1.aarch64",
"product_id": "libbluetooth3-5.55-3.3.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "bluez-auto-enable-devices-5.55-3.3.1.noarch",
"product": {
"name": "bluez-auto-enable-devices-5.55-3.3.1.noarch",
"product_id": "bluez-auto-enable-devices-5.55-3.3.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "bluez-5.55-3.3.1.ppc64le",
"product": {
"name": "bluez-5.55-3.3.1.ppc64le",
"product_id": "bluez-5.55-3.3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "bluez-cups-5.55-3.3.1.ppc64le",
"product": {
"name": "bluez-cups-5.55-3.3.1.ppc64le",
"product_id": "bluez-cups-5.55-3.3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "bluez-deprecated-5.55-3.3.1.ppc64le",
"product": {
"name": "bluez-deprecated-5.55-3.3.1.ppc64le",
"product_id": "bluez-deprecated-5.55-3.3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "bluez-devel-5.55-3.3.1.ppc64le",
"product": {
"name": "bluez-devel-5.55-3.3.1.ppc64le",
"product_id": "bluez-devel-5.55-3.3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "bluez-test-5.55-3.3.1.ppc64le",
"product": {
"name": "bluez-test-5.55-3.3.1.ppc64le",
"product_id": "bluez-test-5.55-3.3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libbluetooth3-5.55-3.3.1.ppc64le",
"product": {
"name": "libbluetooth3-5.55-3.3.1.ppc64le",
"product_id": "libbluetooth3-5.55-3.3.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "bluez-5.55-3.3.1.s390x",
"product": {
"name": "bluez-5.55-3.3.1.s390x",
"product_id": "bluez-5.55-3.3.1.s390x"
}
},
{
"category": "product_version",
"name": "bluez-cups-5.55-3.3.1.s390x",
"product": {
"name": "bluez-cups-5.55-3.3.1.s390x",
"product_id": "bluez-cups-5.55-3.3.1.s390x"
}
},
{
"category": "product_version",
"name": "bluez-deprecated-5.55-3.3.1.s390x",
"product": {
"name": "bluez-deprecated-5.55-3.3.1.s390x",
"product_id": "bluez-deprecated-5.55-3.3.1.s390x"
}
},
{
"category": "product_version",
"name": "bluez-devel-5.55-3.3.1.s390x",
"product": {
"name": "bluez-devel-5.55-3.3.1.s390x",
"product_id": "bluez-devel-5.55-3.3.1.s390x"
}
},
{
"category": "product_version",
"name": "bluez-test-5.55-3.3.1.s390x",
"product": {
"name": "bluez-test-5.55-3.3.1.s390x",
"product_id": "bluez-test-5.55-3.3.1.s390x"
}
},
{
"category": "product_version",
"name": "libbluetooth3-5.55-3.3.1.s390x",
"product": {
"name": "libbluetooth3-5.55-3.3.1.s390x",
"product_id": "libbluetooth3-5.55-3.3.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "bluez-5.55-3.3.1.x86_64",
"product": {
"name": "bluez-5.55-3.3.1.x86_64",
"product_id": "bluez-5.55-3.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "bluez-cups-5.55-3.3.1.x86_64",
"product": {
"name": "bluez-cups-5.55-3.3.1.x86_64",
"product_id": "bluez-cups-5.55-3.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "bluez-deprecated-5.55-3.3.1.x86_64",
"product": {
"name": "bluez-deprecated-5.55-3.3.1.x86_64",
"product_id": "bluez-deprecated-5.55-3.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "bluez-devel-5.55-3.3.1.x86_64",
"product": {
"name": "bluez-devel-5.55-3.3.1.x86_64",
"product_id": "bluez-devel-5.55-3.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "bluez-devel-32bit-5.55-3.3.1.x86_64",
"product": {
"name": "bluez-devel-32bit-5.55-3.3.1.x86_64",
"product_id": "bluez-devel-32bit-5.55-3.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "bluez-test-5.55-3.3.1.x86_64",
"product": {
"name": "bluez-test-5.55-3.3.1.x86_64",
"product_id": "bluez-test-5.55-3.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "libbluetooth3-5.55-3.3.1.x86_64",
"product": {
"name": "libbluetooth3-5.55-3.3.1.x86_64",
"product_id": "libbluetooth3-5.55-3.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "libbluetooth3-32bit-5.55-3.3.1.x86_64",
"product": {
"name": "libbluetooth3-32bit-5.55-3.3.1.x86_64",
"product_id": "libbluetooth3-32bit-5.55-3.3.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Leap 15.3",
"product": {
"name": "openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:leap:15.3"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "bluez-5.55-3.3.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:bluez-5.55-3.3.1.aarch64"
},
"product_reference": "bluez-5.55-3.3.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bluez-5.55-3.3.1.ppc64le as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:bluez-5.55-3.3.1.ppc64le"
},
"product_reference": "bluez-5.55-3.3.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bluez-5.55-3.3.1.s390x as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:bluez-5.55-3.3.1.s390x"
},
"product_reference": "bluez-5.55-3.3.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bluez-5.55-3.3.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:bluez-5.55-3.3.1.x86_64"
},
"product_reference": "bluez-5.55-3.3.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bluez-auto-enable-devices-5.55-3.3.1.noarch as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:bluez-auto-enable-devices-5.55-3.3.1.noarch"
},
"product_reference": "bluez-auto-enable-devices-5.55-3.3.1.noarch",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bluez-cups-5.55-3.3.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:bluez-cups-5.55-3.3.1.aarch64"
},
"product_reference": "bluez-cups-5.55-3.3.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bluez-cups-5.55-3.3.1.ppc64le as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:bluez-cups-5.55-3.3.1.ppc64le"
},
"product_reference": "bluez-cups-5.55-3.3.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bluez-cups-5.55-3.3.1.s390x as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:bluez-cups-5.55-3.3.1.s390x"
},
"product_reference": "bluez-cups-5.55-3.3.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bluez-cups-5.55-3.3.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:bluez-cups-5.55-3.3.1.x86_64"
},
"product_reference": "bluez-cups-5.55-3.3.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bluez-deprecated-5.55-3.3.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:bluez-deprecated-5.55-3.3.1.aarch64"
},
"product_reference": "bluez-deprecated-5.55-3.3.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bluez-deprecated-5.55-3.3.1.ppc64le as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:bluez-deprecated-5.55-3.3.1.ppc64le"
},
"product_reference": "bluez-deprecated-5.55-3.3.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bluez-deprecated-5.55-3.3.1.s390x as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:bluez-deprecated-5.55-3.3.1.s390x"
},
"product_reference": "bluez-deprecated-5.55-3.3.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bluez-deprecated-5.55-3.3.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:bluez-deprecated-5.55-3.3.1.x86_64"
},
"product_reference": "bluez-deprecated-5.55-3.3.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bluez-devel-5.55-3.3.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:bluez-devel-5.55-3.3.1.aarch64"
},
"product_reference": "bluez-devel-5.55-3.3.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bluez-devel-5.55-3.3.1.ppc64le as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:bluez-devel-5.55-3.3.1.ppc64le"
},
"product_reference": "bluez-devel-5.55-3.3.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bluez-devel-5.55-3.3.1.s390x as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:bluez-devel-5.55-3.3.1.s390x"
},
"product_reference": "bluez-devel-5.55-3.3.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bluez-devel-5.55-3.3.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:bluez-devel-5.55-3.3.1.x86_64"
},
"product_reference": "bluez-devel-5.55-3.3.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bluez-devel-32bit-5.55-3.3.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:bluez-devel-32bit-5.55-3.3.1.x86_64"
},
"product_reference": "bluez-devel-32bit-5.55-3.3.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bluez-test-5.55-3.3.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:bluez-test-5.55-3.3.1.aarch64"
},
"product_reference": "bluez-test-5.55-3.3.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bluez-test-5.55-3.3.1.ppc64le as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:bluez-test-5.55-3.3.1.ppc64le"
},
"product_reference": "bluez-test-5.55-3.3.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bluez-test-5.55-3.3.1.s390x as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:bluez-test-5.55-3.3.1.s390x"
},
"product_reference": "bluez-test-5.55-3.3.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bluez-test-5.55-3.3.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:bluez-test-5.55-3.3.1.x86_64"
},
"product_reference": "bluez-test-5.55-3.3.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libbluetooth3-5.55-3.3.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:libbluetooth3-5.55-3.3.1.aarch64"
},
"product_reference": "libbluetooth3-5.55-3.3.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libbluetooth3-5.55-3.3.1.ppc64le as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:libbluetooth3-5.55-3.3.1.ppc64le"
},
"product_reference": "libbluetooth3-5.55-3.3.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libbluetooth3-5.55-3.3.1.s390x as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:libbluetooth3-5.55-3.3.1.s390x"
},
"product_reference": "libbluetooth3-5.55-3.3.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libbluetooth3-5.55-3.3.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:libbluetooth3-5.55-3.3.1.x86_64"
},
"product_reference": "libbluetooth3-5.55-3.3.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libbluetooth3-32bit-5.55-3.3.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:libbluetooth3-32bit-5.55-3.3.1.x86_64"
},
"product_reference": "libbluetooth3-32bit-5.55-3.3.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2020-26558",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-26558"
}
],
"notes": [
{
"category": "general",
"text": "Bluetooth LE and BR/EDR secure pairing in Bluetooth Core Specification 2.1 through 5.2 may permit a nearby man-in-the-middle attacker to identify the Passkey used during pairing (in the Passkey authentication procedure) by reflection of the public key and the authentication evidence of the initiating device, potentially permitting this attacker to complete authenticated pairing with the responding device using the correct Passkey for the pairing session. The attack methodology determines the Passkey value one bit at a time.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:bluez-5.55-3.3.1.aarch64",
"openSUSE Leap 15.3:bluez-5.55-3.3.1.ppc64le",
"openSUSE Leap 15.3:bluez-5.55-3.3.1.s390x",
"openSUSE Leap 15.3:bluez-5.55-3.3.1.x86_64",
"openSUSE Leap 15.3:bluez-auto-enable-devices-5.55-3.3.1.noarch",
"openSUSE Leap 15.3:bluez-cups-5.55-3.3.1.aarch64",
"openSUSE Leap 15.3:bluez-cups-5.55-3.3.1.ppc64le",
"openSUSE Leap 15.3:bluez-cups-5.55-3.3.1.s390x",
"openSUSE Leap 15.3:bluez-cups-5.55-3.3.1.x86_64",
"openSUSE Leap 15.3:bluez-deprecated-5.55-3.3.1.aarch64",
"openSUSE Leap 15.3:bluez-deprecated-5.55-3.3.1.ppc64le",
"openSUSE Leap 15.3:bluez-deprecated-5.55-3.3.1.s390x",
"openSUSE Leap 15.3:bluez-deprecated-5.55-3.3.1.x86_64",
"openSUSE Leap 15.3:bluez-devel-32bit-5.55-3.3.1.x86_64",
"openSUSE Leap 15.3:bluez-devel-5.55-3.3.1.aarch64",
"openSUSE Leap 15.3:bluez-devel-5.55-3.3.1.ppc64le",
"openSUSE Leap 15.3:bluez-devel-5.55-3.3.1.s390x",
"openSUSE Leap 15.3:bluez-devel-5.55-3.3.1.x86_64",
"openSUSE Leap 15.3:bluez-test-5.55-3.3.1.aarch64",
"openSUSE Leap 15.3:bluez-test-5.55-3.3.1.ppc64le",
"openSUSE Leap 15.3:bluez-test-5.55-3.3.1.s390x",
"openSUSE Leap 15.3:bluez-test-5.55-3.3.1.x86_64",
"openSUSE Leap 15.3:libbluetooth3-32bit-5.55-3.3.1.x86_64",
"openSUSE Leap 15.3:libbluetooth3-5.55-3.3.1.aarch64",
"openSUSE Leap 15.3:libbluetooth3-5.55-3.3.1.ppc64le",
"openSUSE Leap 15.3:libbluetooth3-5.55-3.3.1.s390x",
"openSUSE Leap 15.3:libbluetooth3-5.55-3.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-26558",
"url": "https://www.suse.com/security/cve/CVE-2020-26558"
},
{
"category": "external",
"summary": "SUSE Bug 1179610 for CVE-2020-26558",
"url": "https://bugzilla.suse.com/1179610"
},
{
"category": "external",
"summary": "SUSE Bug 1186463 for CVE-2020-26558",
"url": "https://bugzilla.suse.com/1186463"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:bluez-5.55-3.3.1.aarch64",
"openSUSE Leap 15.3:bluez-5.55-3.3.1.ppc64le",
"openSUSE Leap 15.3:bluez-5.55-3.3.1.s390x",
"openSUSE Leap 15.3:bluez-5.55-3.3.1.x86_64",
"openSUSE Leap 15.3:bluez-auto-enable-devices-5.55-3.3.1.noarch",
"openSUSE Leap 15.3:bluez-cups-5.55-3.3.1.aarch64",
"openSUSE Leap 15.3:bluez-cups-5.55-3.3.1.ppc64le",
"openSUSE Leap 15.3:bluez-cups-5.55-3.3.1.s390x",
"openSUSE Leap 15.3:bluez-cups-5.55-3.3.1.x86_64",
"openSUSE Leap 15.3:bluez-deprecated-5.55-3.3.1.aarch64",
"openSUSE Leap 15.3:bluez-deprecated-5.55-3.3.1.ppc64le",
"openSUSE Leap 15.3:bluez-deprecated-5.55-3.3.1.s390x",
"openSUSE Leap 15.3:bluez-deprecated-5.55-3.3.1.x86_64",
"openSUSE Leap 15.3:bluez-devel-32bit-5.55-3.3.1.x86_64",
"openSUSE Leap 15.3:bluez-devel-5.55-3.3.1.aarch64",
"openSUSE Leap 15.3:bluez-devel-5.55-3.3.1.ppc64le",
"openSUSE Leap 15.3:bluez-devel-5.55-3.3.1.s390x",
"openSUSE Leap 15.3:bluez-devel-5.55-3.3.1.x86_64",
"openSUSE Leap 15.3:bluez-test-5.55-3.3.1.aarch64",
"openSUSE Leap 15.3:bluez-test-5.55-3.3.1.ppc64le",
"openSUSE Leap 15.3:bluez-test-5.55-3.3.1.s390x",
"openSUSE Leap 15.3:bluez-test-5.55-3.3.1.x86_64",
"openSUSE Leap 15.3:libbluetooth3-32bit-5.55-3.3.1.x86_64",
"openSUSE Leap 15.3:libbluetooth3-5.55-3.3.1.aarch64",
"openSUSE Leap 15.3:libbluetooth3-5.55-3.3.1.ppc64le",
"openSUSE Leap 15.3:libbluetooth3-5.55-3.3.1.s390x",
"openSUSE Leap 15.3:libbluetooth3-5.55-3.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:bluez-5.55-3.3.1.aarch64",
"openSUSE Leap 15.3:bluez-5.55-3.3.1.ppc64le",
"openSUSE Leap 15.3:bluez-5.55-3.3.1.s390x",
"openSUSE Leap 15.3:bluez-5.55-3.3.1.x86_64",
"openSUSE Leap 15.3:bluez-auto-enable-devices-5.55-3.3.1.noarch",
"openSUSE Leap 15.3:bluez-cups-5.55-3.3.1.aarch64",
"openSUSE Leap 15.3:bluez-cups-5.55-3.3.1.ppc64le",
"openSUSE Leap 15.3:bluez-cups-5.55-3.3.1.s390x",
"openSUSE Leap 15.3:bluez-cups-5.55-3.3.1.x86_64",
"openSUSE Leap 15.3:bluez-deprecated-5.55-3.3.1.aarch64",
"openSUSE Leap 15.3:bluez-deprecated-5.55-3.3.1.ppc64le",
"openSUSE Leap 15.3:bluez-deprecated-5.55-3.3.1.s390x",
"openSUSE Leap 15.3:bluez-deprecated-5.55-3.3.1.x86_64",
"openSUSE Leap 15.3:bluez-devel-32bit-5.55-3.3.1.x86_64",
"openSUSE Leap 15.3:bluez-devel-5.55-3.3.1.aarch64",
"openSUSE Leap 15.3:bluez-devel-5.55-3.3.1.ppc64le",
"openSUSE Leap 15.3:bluez-devel-5.55-3.3.1.s390x",
"openSUSE Leap 15.3:bluez-devel-5.55-3.3.1.x86_64",
"openSUSE Leap 15.3:bluez-test-5.55-3.3.1.aarch64",
"openSUSE Leap 15.3:bluez-test-5.55-3.3.1.ppc64le",
"openSUSE Leap 15.3:bluez-test-5.55-3.3.1.s390x",
"openSUSE Leap 15.3:bluez-test-5.55-3.3.1.x86_64",
"openSUSE Leap 15.3:libbluetooth3-32bit-5.55-3.3.1.x86_64",
"openSUSE Leap 15.3:libbluetooth3-5.55-3.3.1.aarch64",
"openSUSE Leap 15.3:libbluetooth3-5.55-3.3.1.ppc64le",
"openSUSE Leap 15.3:libbluetooth3-5.55-3.3.1.s390x",
"openSUSE Leap 15.3:libbluetooth3-5.55-3.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-12T15:20:47Z",
"details": "moderate"
}
],
"title": "CVE-2020-26558"
},
{
"cve": "CVE-2021-0129",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-0129"
}
],
"notes": [
{
"category": "general",
"text": "Improper access control in BlueZ may allow an authenticated user to potentially enable information disclosure via adjacent access.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:bluez-5.55-3.3.1.aarch64",
"openSUSE Leap 15.3:bluez-5.55-3.3.1.ppc64le",
"openSUSE Leap 15.3:bluez-5.55-3.3.1.s390x",
"openSUSE Leap 15.3:bluez-5.55-3.3.1.x86_64",
"openSUSE Leap 15.3:bluez-auto-enable-devices-5.55-3.3.1.noarch",
"openSUSE Leap 15.3:bluez-cups-5.55-3.3.1.aarch64",
"openSUSE Leap 15.3:bluez-cups-5.55-3.3.1.ppc64le",
"openSUSE Leap 15.3:bluez-cups-5.55-3.3.1.s390x",
"openSUSE Leap 15.3:bluez-cups-5.55-3.3.1.x86_64",
"openSUSE Leap 15.3:bluez-deprecated-5.55-3.3.1.aarch64",
"openSUSE Leap 15.3:bluez-deprecated-5.55-3.3.1.ppc64le",
"openSUSE Leap 15.3:bluez-deprecated-5.55-3.3.1.s390x",
"openSUSE Leap 15.3:bluez-deprecated-5.55-3.3.1.x86_64",
"openSUSE Leap 15.3:bluez-devel-32bit-5.55-3.3.1.x86_64",
"openSUSE Leap 15.3:bluez-devel-5.55-3.3.1.aarch64",
"openSUSE Leap 15.3:bluez-devel-5.55-3.3.1.ppc64le",
"openSUSE Leap 15.3:bluez-devel-5.55-3.3.1.s390x",
"openSUSE Leap 15.3:bluez-devel-5.55-3.3.1.x86_64",
"openSUSE Leap 15.3:bluez-test-5.55-3.3.1.aarch64",
"openSUSE Leap 15.3:bluez-test-5.55-3.3.1.ppc64le",
"openSUSE Leap 15.3:bluez-test-5.55-3.3.1.s390x",
"openSUSE Leap 15.3:bluez-test-5.55-3.3.1.x86_64",
"openSUSE Leap 15.3:libbluetooth3-32bit-5.55-3.3.1.x86_64",
"openSUSE Leap 15.3:libbluetooth3-5.55-3.3.1.aarch64",
"openSUSE Leap 15.3:libbluetooth3-5.55-3.3.1.ppc64le",
"openSUSE Leap 15.3:libbluetooth3-5.55-3.3.1.s390x",
"openSUSE Leap 15.3:libbluetooth3-5.55-3.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-0129",
"url": "https://www.suse.com/security/cve/CVE-2021-0129"
},
{
"category": "external",
"summary": "SUSE Bug 1186463 for CVE-2021-0129",
"url": "https://bugzilla.suse.com/1186463"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:bluez-5.55-3.3.1.aarch64",
"openSUSE Leap 15.3:bluez-5.55-3.3.1.ppc64le",
"openSUSE Leap 15.3:bluez-5.55-3.3.1.s390x",
"openSUSE Leap 15.3:bluez-5.55-3.3.1.x86_64",
"openSUSE Leap 15.3:bluez-auto-enable-devices-5.55-3.3.1.noarch",
"openSUSE Leap 15.3:bluez-cups-5.55-3.3.1.aarch64",
"openSUSE Leap 15.3:bluez-cups-5.55-3.3.1.ppc64le",
"openSUSE Leap 15.3:bluez-cups-5.55-3.3.1.s390x",
"openSUSE Leap 15.3:bluez-cups-5.55-3.3.1.x86_64",
"openSUSE Leap 15.3:bluez-deprecated-5.55-3.3.1.aarch64",
"openSUSE Leap 15.3:bluez-deprecated-5.55-3.3.1.ppc64le",
"openSUSE Leap 15.3:bluez-deprecated-5.55-3.3.1.s390x",
"openSUSE Leap 15.3:bluez-deprecated-5.55-3.3.1.x86_64",
"openSUSE Leap 15.3:bluez-devel-32bit-5.55-3.3.1.x86_64",
"openSUSE Leap 15.3:bluez-devel-5.55-3.3.1.aarch64",
"openSUSE Leap 15.3:bluez-devel-5.55-3.3.1.ppc64le",
"openSUSE Leap 15.3:bluez-devel-5.55-3.3.1.s390x",
"openSUSE Leap 15.3:bluez-devel-5.55-3.3.1.x86_64",
"openSUSE Leap 15.3:bluez-test-5.55-3.3.1.aarch64",
"openSUSE Leap 15.3:bluez-test-5.55-3.3.1.ppc64le",
"openSUSE Leap 15.3:bluez-test-5.55-3.3.1.s390x",
"openSUSE Leap 15.3:bluez-test-5.55-3.3.1.x86_64",
"openSUSE Leap 15.3:libbluetooth3-32bit-5.55-3.3.1.x86_64",
"openSUSE Leap 15.3:libbluetooth3-5.55-3.3.1.aarch64",
"openSUSE Leap 15.3:libbluetooth3-5.55-3.3.1.ppc64le",
"openSUSE Leap 15.3:libbluetooth3-5.55-3.3.1.s390x",
"openSUSE Leap 15.3:libbluetooth3-5.55-3.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:bluez-5.55-3.3.1.aarch64",
"openSUSE Leap 15.3:bluez-5.55-3.3.1.ppc64le",
"openSUSE Leap 15.3:bluez-5.55-3.3.1.s390x",
"openSUSE Leap 15.3:bluez-5.55-3.3.1.x86_64",
"openSUSE Leap 15.3:bluez-auto-enable-devices-5.55-3.3.1.noarch",
"openSUSE Leap 15.3:bluez-cups-5.55-3.3.1.aarch64",
"openSUSE Leap 15.3:bluez-cups-5.55-3.3.1.ppc64le",
"openSUSE Leap 15.3:bluez-cups-5.55-3.3.1.s390x",
"openSUSE Leap 15.3:bluez-cups-5.55-3.3.1.x86_64",
"openSUSE Leap 15.3:bluez-deprecated-5.55-3.3.1.aarch64",
"openSUSE Leap 15.3:bluez-deprecated-5.55-3.3.1.ppc64le",
"openSUSE Leap 15.3:bluez-deprecated-5.55-3.3.1.s390x",
"openSUSE Leap 15.3:bluez-deprecated-5.55-3.3.1.x86_64",
"openSUSE Leap 15.3:bluez-devel-32bit-5.55-3.3.1.x86_64",
"openSUSE Leap 15.3:bluez-devel-5.55-3.3.1.aarch64",
"openSUSE Leap 15.3:bluez-devel-5.55-3.3.1.ppc64le",
"openSUSE Leap 15.3:bluez-devel-5.55-3.3.1.s390x",
"openSUSE Leap 15.3:bluez-devel-5.55-3.3.1.x86_64",
"openSUSE Leap 15.3:bluez-test-5.55-3.3.1.aarch64",
"openSUSE Leap 15.3:bluez-test-5.55-3.3.1.ppc64le",
"openSUSE Leap 15.3:bluez-test-5.55-3.3.1.s390x",
"openSUSE Leap 15.3:bluez-test-5.55-3.3.1.x86_64",
"openSUSE Leap 15.3:libbluetooth3-32bit-5.55-3.3.1.x86_64",
"openSUSE Leap 15.3:libbluetooth3-5.55-3.3.1.aarch64",
"openSUSE Leap 15.3:libbluetooth3-5.55-3.3.1.ppc64le",
"openSUSE Leap 15.3:libbluetooth3-5.55-3.3.1.s390x",
"openSUSE Leap 15.3:libbluetooth3-5.55-3.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-12T15:20:47Z",
"details": "moderate"
}
],
"title": "CVE-2021-0129"
}
]
}
suse-su-2024:2901-1
Vulnerability from csaf_suse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel",
"title": "Title of the patch"
},
{
"category": "description",
"text": "The SUSE Linux Enterprise 12 SP5 Azure kernel was updated to receive various security bugfixes.\n\n\nThe following security bugs were fixed:\n\n- CVE-2024-39494: ima: Fix use-after-free on a dentry\u0027s dname.name (bsc#1227716).\n- CVE-2024-42096: x86: stop playing stack games in profile_pc() (bsc#1228633).\n- CVE-2024-39506: liquidio: adjust a NULL pointer handling path in lio_vf_rep_copy_packet (bsc#1227729).\n- CVE-2021-47619: i40e: Fix queues reservation for XDP (bsc#1226645).\n- CVE-2024-42145: IB/core: Implement a limit on UMAD receive List (bsc#1228743).\n- CVE-2024-42124: scsi: qedf: Make qedf_execute_tmf() non-preemptible (bsc#1228705).\n- CVE-2024-42223: media: dvb-frontends: tda10048: Fix integer overflow (bsc#1228726).\n- CVE-2024-42119: drm/amd/display: Skip finding free audio for unknown engine_id (bsc#1228584).\n- CVE-2024-42120: drm/amd/display: Check pipe offset before setting vblank (bsc#1228588).\n- CVE-2024-41095: drm/nouveau/dispnv04: fix null pointer dereference in nv17_tv_get_ld_modes (bsc#1228662).\n- CVE-2024-42224: net: dsa: mv88e6xxx: Correct check for empty list (bsc#1228723).\n- CVE-2024-41072: wifi: cfg80211: wext: add extra SIOCSIWSCAN data check (bsc#1228626).\n- CVE-2024-41048: skmsg: Skip zero length skb in sk_msg_recvmsg (bsc#1228565).\n- CVE-2024-40995: net/sched: act_api: fix possible infinite loop in tcf_idr_check_alloc() (bsc#1227830).\n- CVE-2024-41044: ppp: reject claimed-as-LCP but actually malformed packets (bsc#1228530).\n- CVE-2024-41066: ibmvnic: add tx check to prevent skb leak (bsc#1228640).\n- CVE-2024-42093: net/dpaa2: Avoid explicit cpumask var allocation on stack (bsc#1228680).\n- CVE-2024-41089: drm/nouveau/dispnv04: fix null pointer dereference in nv17_tv_get_hd_modes (bsc#1228658).\n- CVE-2024-41060: drm/radeon: check bo_va-\u003ebo is non-NULL before using it (bsc#1228567).\n- CVE-2022-48829: NFSD: Fix NFSv3 SETATTR/CREATE\u0027s handling of large file sizes (bsc#1228055).\n- CVE-2022-48828: NFSD: Fix ia_size underflow (bsc#1228054).\n- CVE-2022-48827: NFSD: Fix the behavior of READ near OFFSET_MAX (bsc#1228037).\n- CVE-2024-41078: btrfs: qgroup: fix quota root leak after quota disable failure (bsc#1228655).\n- CVE-2024-41071: wifi: mac80211: Avoid address calculations via out of bounds array indexing (bsc#1228625).\n- CVE-2024-41064: powerpc/eeh: avoid possible crash when edev-\u003epdev changes (bsc#1228599).\n- CVE-2024-35949: btrfs: make sure that WRITTEN is set on all metadata blocks (bsc#1224700).\n- CVE-2024-41081: ila: block BH in ila_output() (bsc#1228617).\n- CVE-2024-40978: scsi: qedi: Fix crash while reading debugfs attribute (bsc#1227929).\n- CVE-2022-48792: scsi: pm8001: Fix use-after-free for aborted SSP/STP sas_task (bsc#1228013).\n- CVE-2022-48823: scsi: qedf: Fix refcount issue when LOGO is received during TMF (bsc#1228045).\n- CVE-2024-41076: NFSv4: Fix memory leak in nfs4_set_security_label (bsc#1228649).\n- CVE-2024-40998: ext4: fix uninitialized ratelimit_state-\u003elock access in __ext4_fill_super() (bsc#1227866).\n- CVE-2024-41059: hfsplus: fix uninit-value in copy_name (bsc#1228561).\n- CVE-2024-40987: drm/amdgpu: fix UBSAN warning in kv_dpm.c (bsc#1228235).\n- CVE-2022-48826: drm/vc4: Fix deadlock on DSI device attach error (bsc#1227975)\n- CVE-2024-27437: vfio/pci: Disable auto-enable of exclusive INTx IRQ (bsc#1222625).\n- CVE-2024-41015: ocfs2: add bounds checking to ocfs2_check_dir_entry() (bsc#1228409).\n- CVE-2024-41016: ocfs2: strict bound check before memcmp in ocfs2_xattr_find_entry() (bsc#1228410).\n- CVE-2024-41063: bluetooth: hci_core: cancel all works upon hci_unregister_dev() (bsc#1228580).\n- CVE-2024-42070: netfilter: nf_tables: fully validate NFT_DATA_VALUE on store to data registers (bsc#1228470).\n- CVE-2024-41070: KVM: PPC: Book3S HV: Prevent UAF in kvm_spapr_tce_attach_iommu_group() (bsc#1228581).\n- CVE-2021-47405: HID: usbhid: free raw_report buffers in usbhid_stop (bsc#1225238).\n- CVE-2024-40988: drm/radeon: fix UBSAN warning in kv_dpm.c (bsc#1227957).\n- CVE-2024-40932: drm/exynos/vidi: fix memory leak in .get_modes() (bsc#1227828).\n- CVE-2021-47403: ipack: ipoctal: fix module reference leak (bsc#1225241).\n- CVE-2021-47388: mac80211: fix use-after-free in CCMP/GCMP RX (bsc#1225214).\n- CVE-2024-41014: xfs: add bounds checking to xlog_recover_process_data (bsc#1228408).\n- CVE-2024-41091: tun: add missing verification for short frame (bsc#1228327).\n- CVE-2024-41090: tap: add missing verification for short frame (bsc#1228328).\n- CVE-2024-40999: net: ena: Add validation for completion descriptors consistency (bsc#1227913).\n- CVE-2024-35837: net: mvpp2: clear BM pool before initialization (bsc#1224500).\n- CVE-2021-47588: sit: do not call ipip6_dev_free() from sit_init_net() (bsc#1226568).\n- CVE-2022-48804: vt_ioctl: fix array_index_nospec in vt_setactivate (bsc#1227968).\n- CVE-2024-40967: serial: imx: Introduce timeout when waiting on transmitter empty (bsc#1227891).\n- CVE-2024-40966: kABI: tty: add the option to have a tty reject a new ldisc (bsc#1227886).\n- CVE-2022-48850: net-sysfs: add check for netdevice being present to speed_show (bsc#1228071).\n- CVE-2021-47582: usb: core: Do not hold the device lock while sleeping in do_proc_control() (bsc#1226559).\n- CVE-2024-40982: ssb: fix potential NULL pointer dereference in ssb_device_uevent() (bsc#1227865).\n- CVE-2021-47468: isdn: mISDN: Fix sleeping function called from invalid context (bsc#1225346).\n- CVE-2021-47395: mac80211: limit injected vht mcs/nss in ieee80211_parse_tx_radiotap (bsc#1225326).\n- CVE-2022-48810: ipmr,ip6mr: acquire RTNL before calling ip[6]mr_free_table() on failure path (bsc#1227936).\n- CVE-2023-52594: Fixed potential array-index-out-of-bounds read in ath9k_htc_txstatus() (bsc#1221045).\n- CVE-2022-48855: sctp: fix kernel-infoleak for SCTP sockets (bsc#1228003).\n- CVE-2021-47580: scsi: scsi_debug: Fix type in min_t to avoid stack OOB (bsc#1226550).\n- CVE-2024-26735: ipv6: sr: fix possible use-after-free and null-ptr-deref (bsc#1222372).\n- CVE-2024-38560: scsi: bfa: Ensure the copied buf is NUL terminated (bsc#1226786).\n- CVE-2022-48811: ibmvnic: do not release napi in __ibmvnic_open() (bsc#1227928).\n- CVE-2021-0129: Improper access control in BlueZ may have allowed an authenticated user to potentially enable information disclosure via adjacent access (bsc#1186463).\n- CVE-2020-26558: Fixed a flaw in the Bluetooth LE and BR/EDR secure pairing that could permit a nearby man-in-the-middle attacker to identify the Passkey used during pairing (bsc#1179610).\n- CVE-2024-40937: gve: Clear napi-\u003eskb before dev_kfree_skb_any() (bsc#1227836).\n- CVE-2024-39507: net: hns3: fix kernel crash problem in concurrent scenario (bsc#1227730).\n- CVE-2024-40923: vmxnet3: disable rx data ring on dma allocation failure (bsc#1227786).\n- CVE-2024-40941: wifi: iwlwifi: mvm: do not read past the mfuart notifcation (bsc#1227771).\n- CVE-2022-48860: ethernet: Fix error handling in xemaclite_of_probe (bsc#1228008).\n- CVE-2022-48863: mISDN: Fix memory leak in dsp_pipeline_build() (bsc#1228063).\n- CVE-2024-40953: KVM: Fix a data race on last_boosted_vcpu in kvm_vcpu_on_spin() (bsc#1227806).\n- CVE-2024-39499: vmci: prevent speculation leaks by sanitizing event in event_deliver() (bsc#1227725).\n- CVE-2024-39487: bonding: Fix out-of-bounds read in bond_option_arp_ip_targets_set() (bsc#1227573)\n- CVE-2024-35934: net/smc: reduce rtnl pressure in smc_pnet_create_pnetids_list() (bsc#1224641)\n- CVE-2024-40959: xfrm6: check ip6_dst_idev() return value in xfrm6_get_saddr() (bsc#1227884).\n- CVE-2024-35893: net/sched: act_skbmod: prevent kernel-infoleak (bsc#1224512)\n- CVE-2021-47441: mlxsw: thermal: Fix out-of-bounds memory accesses (bsc#1225224)\n- CVE-2021-47194: cfg80211: call cfg80211_stop_ap when switch from P2P_GO type (bsc#1222829).\n- CVE-2024-27020: netfilter: nf_tables: Fix potential data-race in __nft_expr_type_get() (bsc#1223815)\n- CVE-2022-48775: Drivers: hv: vmbus: Fix memory leak in vmbus_add_channel_kobj (bsc#1227924).\n- CVE-2024-27019: netfilter: nf_tables: Fix potential data-race in __nft_obj_type_get() (bsc#1223813)\n- CVE-2024-40929: wifi: iwlwifi: mvm: check n_ssids before accessing the ssids (bsc#1227774).\n- CVE-2024-40912: wifi: mac80211: Fix deadlock in ieee80211_sta_ps_deliver_wakeup() (bsc#1227790).\n- CVE-2024-40942: wifi: mac80211: mesh: Fix leak of mesh_preq_queue objects (bsc#1227770).\n- CVE-2022-48857: NFC: port100: fix use-after-free in port100_send_complete (bsc#1228005).\n- CVE-2024-36902: ipv6: fib6_rules: avoid possible NULL dereference in fib6_rule_action() (bsc#1225719).\n- CVE-2021-47606: net: netlink: af_netlink: Prevent empty skb by adding a check on len. (bsc#1226555).\n- CVE-2024-40901: scsi: mpt3sas: Avoid test/set_bit() operating in non-allocated memory (bsc#1227762).\n- CVE-2024-26924: scsi: lpfc: Release hbalock before calling lpfc_worker_wake_up() (bsc#1225820).\n- CVE-2024-26830: Fixed i40e to not allow untrusted VF to remove administratively set MAC (bsc#1223012).\n- CVE-2021-47516: nfp: Fix memory leak in nfp_cpp_area_cache_add() (bsc#1225427).\n- CVE-2021-47501: i40e: Fix NULL pointer dereference in i40e_dbg_dump_desc (bsc#1225361).\n- CVE-2024-39501: drivers: core: synchronize really_probe() and dev_uevent() (bsc#1227754).\n- CVE-2023-52743: ice: Do not use WQ_MEM_RECLAIM flag for workqueue (bsc#1225003)\n- CVE-2021-47542: net: qlogic: qlcnic: Fix a NULL pointer dereference in qlcnic_83xx_add_rings() (bsc#1225455).\n- CVE-2024-36901: ipv6: prevent NULL dereference in ip6_output() (bsc#1225711)\n- CVE-2024-36004: i40e: Do not use WQ_MEM_RECLAIM flag for workqueue (bsc#1224545)\n- CVE-2024-27025: nbd: null check for nla_nest_start (bsc#1223778)\n- CVE-2021-47599: btrfs: use latest_dev in btrfs_show_devname (bsc#1226571).\n- CVE-2023-52435: net: prevent mss overflow in skb_segment() (bsc#1220138).\n- CVE-2024-26663: tipc: Check the bearer type before calling tipc_udp_nl_bearer_add() (bsc#1222326).\n- CVE-2021-47597: inet_diag: fix kernel-infoleak for UDP sockets (bsc#1226553).\n- CVE-2024-39490: ipv6: sr: fix missing sk_buff release in seg6_input_core (bsc#1227626).\n- CVE-2024-38558: net: openvswitch: fix overwriting ct original tuple for ICMPv6 (bsc#1226783).\n- CVE-2024-26615: net/smc: fix illegal rmb_desc access in SMC-D connection dump (bsc#1220942).\n- CVE-2023-52619: Fixed possible crash when setting number of cpus to an odd number in pstore/ram (bsc#1221618).\n- CVE-2024-26659: Fixed wrong handling of isoc Babble and Buffer Overrun events in xhci (bsc#1222317).\n- CVE-2024-35978: Bluetooth: Fix memory leak in hci_req_sync_complete() (bsc#1224571).\n- CVE-2023-52669: crypto: s390/aes - Fix buffer overread in CTR mode (bsc#1224637).\n- CVE-2023-52615: Fixed page fault dead lock on mmap-ed hwrng (bsc#1221614).\n- CVE-2023-52612: Fixed req-\u003edst buffer overflow in crypto/scomp (bsc#1221616).\n- CVE-2024-35995: ACPI: CPPC: Use access_width over bit_width for system memory accesses (bsc#1224557).\n- CVE-2023-52623: Fixed suspicious RCU usage in SUNRPC (bsc#1222060).\n- CVE-2021-47295: net: sched: fix memory leak in tcindex_partial_destroy_work (bsc#1224975)\n- CVE-2023-52693: ACPI: video: check for error while searching for backlight device parent (bsc#1224686).\n- CVE-2023-52683: ACPI: LPIT: Avoid u32 multiplication overflow (bsc#1224627).\n- CVE-2023-4244: Fixed a use-after-free in the nf_tables component, which could be exploited to achieve local privilege escalation (bsc#1215420).\n- CVE-2024-39475: fbdev: savage: Handle err return when savagefb_check_var failed (bsc#1227435)\n- CVE-2021-47520: can: pch_can: pch_can_rx_normal: fix use after free (bsc#1225431).\n- CVE-2024-36941: wifi: nl80211: do not free NULL coalescing rule (bsc#1225835).\n- CVE-2021-47145: btrfs: do not BUG_ON in link_to_fixup_dir (bsc#1222005).\n- CVE-2021-47547: net: tulip: de4x5: fix the problem that the array \u0027lp-\u003ephy\u0027 may be out of bound (bsc#1225505).\n- CVE-2023-52817: drm/amdgpu: Fix a null pointer access when the smc_rreg pointer is NULL (bsc#1225569).\n- CVE-2023-52819: drm/amd: Fix UBSAN array-index-out-of-bounds for Polaris and Tonga (bsc#1225532).\n- CVE-2023-52818: drm/amd: Fix UBSAN array-index-out-of-bounds for SMU7 (bsc#1225530).\n- CVE-2023-52753: drm/amd/display: Avoid NULL dereference of timing generator (bsc#1225478).\n- CVE-2024-36014: drm/arm/malidp: fix a possible null pointer dereference (bsc#1225593).\n- CVE-2024-26636: llc: make llc_ui_sendmsg() more robust against bonding changes (bsc#1221659).\n- CVE-2024-26635: llc: Drop support for ETH_P_TR_802_2 (bsc#1221656).\n- CVE-2024-35828: wifi: libertas: fix some memleaks in lbs_allocate_cmd_buffer() (bsc#1224622).\n- CVE-2023-52507: Fixed possible shift-out-of-bounds in nfc/nci (bsc#1220833).\n- CVE-2024-38598: md: fix resync softlockup when bitmap size is less than array size (bsc#1226757).\n- CVE-2024-35805: dm snapshot: fix lockup in dm_exception_table_exit (bsc#1224743).\n- CVE-2024-26880: dm: call the resume method on internal suspend (bsc#1223188).\n- CVE-2021-47498: dm rq: do not queue request to blk-mq during DM suspend (bsc#1225357).\n- CVE-2021-47275: bcache: avoid oversized read request in cache missing code path (bsc#1224965).\n- CVE-2024-38619: usb-storage: alauda: Check whether the media is initialized (bsc#1226861).\n- CVE-2021-47201: iavf: free q_vectors before queues in iavf_disable_vf (bsc#1222792).\n- CVE-2024-26863: hsr: Fix uninit-value access in hsr_get_node() (bsc#1223021).\n- CVE-2024-38630: watchdog: cpu5wdt.c: Fix use-after-free bug caused by cpu5wdt_trigger (bsc#1226908).\n- CVE-2024-39301: net/9p: fix uninit-value in p9_client_rpc() (bsc#1226994).\n- CVE-2021-47559: net/smc: Fix NULL pointer dereferencing in smc_vlan_by_tcpsk() (bsc#1225396).\n\nThe following non-security bugs were fixed:\n\n- Fix spurious WARNING caused by a qxl driver patch (bsc#1227213,bsc#1227191)\n- KVM: PPC: Book3S HV: Do not take kvm-\u003elock around kvm_for_each_vcpu (bsc#1065729).\n- KVM: PPC: Book3S HV: remove extraneous asterisk from rm_host_ipi_action() comment (bsc#1065729).\n- KVM: PPC: Book3S PR: Exiting split hack mode needs to fixup both PC and LR (bsc#1065729).\n- KVM: PPC: Book3S: Fix some RCU-list locks (git-fixes).\n- KVM: PPC: Book3S: Only report KVM_CAP_SPAPR_TCE_VFIO on powernv machines (bsc#1065729).\n- KVM: PPC: Book3S: Use new mutex to synchronize access to rtas token list (bsc#1065729).\n- KVM: PPC: Inform the userspace about TCE update failures (bsc#1065729).\n- KVM: PPC: Move and undef TRACE_INCLUDE_PATH/FILE (bsc#1065729).\n- PCI: Fix resource double counting on remove \u0026 rescan (git-fixes).\n- PCI: hv: Return zero, not garbage, when reading PCI_INTERRUPT_PIN (git-fixes).\n- PM: hibernate: x86: Use crc32 instead of md5 for hibernation e820 integrity check (git-fixes).\n- SUNRPC: Fix gss_free_in_token_pages() (git-fixes).\n- SUNRPC: Fix loop termination condition in gss_free_in_token_pages() (git-fixes).\n- Tools: hv: kvp: eliminate \u0027may be used uninitialized\u0027 warning (git-fixes).\n- USB: class: cdc-wdm: Fix CPU lockup caused by excessive log messages (git-fixes).\n- btrfs: fix 64bit compat send ioctl arguments not initializing version member (bsc#1228030).\n- btrfs: fix send ioctl on 32bit with 64bit kernel (bsc#1228030).\n- btrfs: incremental send, fix emission of invalid clone operations (bsc#1228030).\n- btrfs: remove unused members dir_path from recorded_ref (bsc#1228030).\n- btrfs: send, improve clone range (bsc#1228030).\n- btrfs: send: add new command FILEATTR for file attributes (bsc#1228030).\n- btrfs: send: add stream v2 definitions (bsc#1228030).\n- btrfs: send: always use the rbtree based inode ref management infrastructure (bsc#1228030).\n- btrfs: send: avoid copying file data (bsc#1228030).\n- btrfs: send: explicitly number commands and attributes (bsc#1228030).\n- btrfs: send: fix failures when processing inodes with no links (bsc#1228030).\n- btrfs: send: fix send failure of a subcase of orphan inodes (bsc#1228030).\n- btrfs: send: fix sending link commands for existing file paths (bsc#1228030).\n- btrfs: send: get rid of i_size logic in send_write() (bsc#1228030).\n- btrfs: send: introduce recorded_ref_alloc and recorded_ref_free (bsc#1228030).\n- btrfs: send: prepare for v2 protocol (bsc#1228030).\n- btrfs: send: refactor arguments of get_inode_info() (bsc#1228030).\n- btrfs: send: remove stale code when checking for shared extents (bsc#1228030).\n- btrfs: send: remove unused found_type parameter to lookup_dir_item_inode() (bsc#1228030).\n- btrfs: send: remove unused send_ctx::{total,cmd}_send_size (bsc#1228030).\n- btrfs: send: use boolean types for current inode status (bsc#1228030).\n- btrfs: silence maybe-uninitialized warning in clone_range (bsc#1228030).\n- drm/amdgpu/debugfs: fix error code when smc register accessors are NULL (git-fixes).\n- drm/vc4: dsi: Only register our component once a DSI device is (bsc#1227975)\n- hv_netvsc: rndis_filter needs to select NLS (git-fixes).\n- ipv6: sr: fix incorrect unregister order (git-fixes).\n- kgdb: Add kgdb_has_hit_break function (git-fixes).\n- kgdb: Move the extern declaration kgdb_has_hit_break() to generic kgdb.h (git-fixes).\n- net: hsr: fix placement of logical operator in a multi-line statement (bsc#1223021).\n- net: mana: Fix the extra HZ in mana_hwc_send_request (git-fixes).\n- net: mana: select PAGE_POOL (git-fixes).\n- net_sched: add a temporary refcnt for struct tcindex_data (bsc#1224975).\n- net_sched: fix a memory leak in cls_tcindex (bsc#1224975).\n- net_sched: fix a missing refcnt in tcindex_init() (bsc#1224975).\n- net_sched: hold rtnl lock in tcindex_partial_destroy_work() (bsc#1224975)\n- nfs: Handle error of rpc_proc_register() in nfs_net_init() (git-fixes).\n- nvme: fixup comment for nvme RDMA Provider Type (git-fixes).\n- ocfs2: fix DIO failure due to insufficient transaction credits (bsc#1216834).\n- ocfs2: remove redundant assignment to variable free_space (bsc#1228409).\n- ocfs2: strict bound check before memcmp in ocfs2_xattr_find_entry() (bsc#1228410).\n- powerpc/rtas: Prevent Spectre v1 gadget construction in sys_rtas() (bsc#1227487).\n- sched/deadline: Fix BUG_ON condition for deboosted tasks (bsc#1227407).\n- scsi: qla2xxx: Avoid possible run-time warning with long model_num (bsc#1228850).\n- scsi: qla2xxx: Complete command early within lock (bsc#1228850).\n- scsi: qla2xxx: Convert comma to semicolon (bsc#1228850).\n- scsi: qla2xxx: Drop driver owner assignment (bsc#1228850).\n- scsi: qla2xxx: During vport delete send async logout explicitly (bsc#1228850).\n- scsi: qla2xxx: Fix debugfs output for fw_resource_count (bsc#1228850).\n- scsi: qla2xxx: Fix flash read failure (bsc#1228850).\n- scsi: qla2xxx: Fix for possible memory corruption (bsc#1228850).\n- scsi: qla2xxx: Fix optrom version displayed in FDMI (bsc#1228850).\n- scsi: qla2xxx: Reduce fabric scan duplicate code (bsc#1228850).\n- scsi: qla2xxx: Remove unused struct \u0027scsi_dif_tuple\u0027 (bsc#1228850).\n- scsi: qla2xxx: Return ENOBUFS if sg_cnt is more than one for ELS cmds (bsc#1228850).\n- scsi: qla2xxx: Unable to act on RSCN for port online (bsc#1228850).\n- scsi: qla2xxx: Update version to 10.02.09.300-k (bsc#1228850).\n- scsi: qla2xxx: Use QP lock to search for bsg (bsc#1228850).\n- scsi: qla2xxx: validate nvme_local_port correctly (bsc#1228850).\n- signal: Introduce clear_siginfo (git-fixes).\n- string.h: Introduce memtostr() and memtostr_pad() (bsc#1228850).\n- sunrpc: fix NFSACL RPC retry on soft mount (git-fixes).\n- tools lib: Fix builds when glibc contains strlcpy() (git-fixes).\n- tools: hv: fix KVP and VSS daemons exit code (git-fixes).\n- usb: add a hcd_uses_dma helper (git-fixes).\n- usb: atm: cxacru: fix endpoint checking in cxacru_bind() (git-fixes).\n- usb: musb: da8xx: fix a resource leak in probe() (git-fixes).\n- x86/apic: Fix kernel panic when booting with intremap=off and x2apic_phys (git-fixes).\n- x86/bhi: Avoid warning in #DB handler due to BHI mitigation (git-fixes).\n- x86/boot/e820: Fix typo in e820.c comment (git-fixes).\n- x86/bugs: Remove CONFIG_BHI_MITIGATION_AUTO and spectre_bhi=auto (git-fixes).\n- x86/bugs: Replace CONFIG_SPECTRE_BHI_{ON,OFF} with CONFIG_MITIGATION_SPECTRE_BHI (git-fixes).\n- x86/cpu: Fix AMD erratum #1485 on Zen4-based CPUs (git-fixes).\n- x86/fpu: Return proper error codes from user access functions (git-fixes).\n- x86/ioremap: Fix page aligned size calculation in __ioremap_caller() (git-fixes).\n- x86/kprobes: Fix kprobes instruction boudary check with CONFIG_RETHUNK (git-fixes).\n- x86/kprobes: Fix optprobe optimization check with CONFIG_RETHUNK (git-fixes).\n- x86/msr: Fix wr/rdmsr_safe_regs_on_cpu() prototypes (git-fixes).\n- x86/numa: Use cpumask_available instead of hardcoded NULL check (git-fixes).\n- x86: __memcpy_flushcache: fix wrong alignment if size \u003e 2^32 (git-fixes).\n- xfs: check that dir block entries do not off the end of the buffer (git-fixes).\n- xfs: refactor xfs_verifier_error and xfs_buf_ioerror (git-fixes).\n- xfs: remove XFS_WANT_CORRUPTED_RETURN from dir3 data verifiers (git-fixes).\n- xhci: Poll for U0 after disabling USB2 LPM (git-fixes).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2024-2901,SUSE-SLE-SERVER-12-SP5-2024-2901",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2024_2901-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2024:2901-1",
"url": "https://www.suse.com/support/update/announcement/2024/suse-su-20242901-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2024:2901-1",
"url": "https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html"
},
{
"category": "self",
"summary": "SUSE Bug 1065729",
"url": "https://bugzilla.suse.com/1065729"
},
{
"category": "self",
"summary": "SUSE Bug 1088701",
"url": "https://bugzilla.suse.com/1088701"
},
{
"category": "self",
"summary": "SUSE Bug 1149446",
"url": "https://bugzilla.suse.com/1149446"
},
{
"category": "self",
"summary": "SUSE Bug 1179610",
"url": "https://bugzilla.suse.com/1179610"
},
{
"category": "self",
"summary": "SUSE Bug 1186463",
"url": "https://bugzilla.suse.com/1186463"
},
{
"category": "self",
"summary": "SUSE Bug 1196018",
"url": "https://bugzilla.suse.com/1196018"
},
{
"category": "self",
"summary": "SUSE Bug 1202346",
"url": "https://bugzilla.suse.com/1202346"
},
{
"category": "self",
"summary": "SUSE Bug 1215420",
"url": "https://bugzilla.suse.com/1215420"
},
{
"category": "self",
"summary": "SUSE Bug 1216834",
"url": "https://bugzilla.suse.com/1216834"
},
{
"category": "self",
"summary": "SUSE Bug 1220138",
"url": "https://bugzilla.suse.com/1220138"
},
{
"category": "self",
"summary": "SUSE Bug 1220833",
"url": "https://bugzilla.suse.com/1220833"
},
{
"category": "self",
"summary": "SUSE Bug 1220942",
"url": "https://bugzilla.suse.com/1220942"
},
{
"category": "self",
"summary": "SUSE Bug 1221045",
"url": "https://bugzilla.suse.com/1221045"
},
{
"category": "self",
"summary": "SUSE Bug 1221614",
"url": "https://bugzilla.suse.com/1221614"
},
{
"category": "self",
"summary": "SUSE Bug 1221616",
"url": "https://bugzilla.suse.com/1221616"
},
{
"category": "self",
"summary": "SUSE Bug 1221618",
"url": "https://bugzilla.suse.com/1221618"
},
{
"category": "self",
"summary": "SUSE Bug 1221656",
"url": "https://bugzilla.suse.com/1221656"
},
{
"category": "self",
"summary": "SUSE Bug 1221659",
"url": "https://bugzilla.suse.com/1221659"
},
{
"category": "self",
"summary": "SUSE Bug 1222005",
"url": "https://bugzilla.suse.com/1222005"
},
{
"category": "self",
"summary": "SUSE Bug 1222060",
"url": "https://bugzilla.suse.com/1222060"
},
{
"category": "self",
"summary": "SUSE Bug 1222317",
"url": "https://bugzilla.suse.com/1222317"
},
{
"category": "self",
"summary": "SUSE Bug 1222326",
"url": "https://bugzilla.suse.com/1222326"
},
{
"category": "self",
"summary": "SUSE Bug 1222372",
"url": "https://bugzilla.suse.com/1222372"
},
{
"category": "self",
"summary": "SUSE Bug 1222625",
"url": "https://bugzilla.suse.com/1222625"
},
{
"category": "self",
"summary": "SUSE Bug 1222776",
"url": "https://bugzilla.suse.com/1222776"
},
{
"category": "self",
"summary": "SUSE Bug 1222792",
"url": "https://bugzilla.suse.com/1222792"
},
{
"category": "self",
"summary": "SUSE Bug 1222824",
"url": "https://bugzilla.suse.com/1222824"
},
{
"category": "self",
"summary": "SUSE Bug 1222829",
"url": "https://bugzilla.suse.com/1222829"
},
{
"category": "self",
"summary": "SUSE Bug 1222866",
"url": "https://bugzilla.suse.com/1222866"
},
{
"category": "self",
"summary": "SUSE Bug 1223012",
"url": "https://bugzilla.suse.com/1223012"
},
{
"category": "self",
"summary": "SUSE Bug 1223021",
"url": "https://bugzilla.suse.com/1223021"
},
{
"category": "self",
"summary": "SUSE Bug 1223188",
"url": "https://bugzilla.suse.com/1223188"
},
{
"category": "self",
"summary": "SUSE Bug 1223778",
"url": "https://bugzilla.suse.com/1223778"
},
{
"category": "self",
"summary": "SUSE Bug 1223813",
"url": "https://bugzilla.suse.com/1223813"
},
{
"category": "self",
"summary": "SUSE Bug 1223815",
"url": "https://bugzilla.suse.com/1223815"
},
{
"category": "self",
"summary": "SUSE Bug 1224500",
"url": "https://bugzilla.suse.com/1224500"
},
{
"category": "self",
"summary": "SUSE Bug 1224512",
"url": "https://bugzilla.suse.com/1224512"
},
{
"category": "self",
"summary": "SUSE Bug 1224545",
"url": "https://bugzilla.suse.com/1224545"
},
{
"category": "self",
"summary": "SUSE Bug 1224557",
"url": "https://bugzilla.suse.com/1224557"
},
{
"category": "self",
"summary": "SUSE Bug 1224571",
"url": "https://bugzilla.suse.com/1224571"
},
{
"category": "self",
"summary": "SUSE Bug 1224576",
"url": "https://bugzilla.suse.com/1224576"
},
{
"category": "self",
"summary": "SUSE Bug 1224587",
"url": "https://bugzilla.suse.com/1224587"
},
{
"category": "self",
"summary": "SUSE Bug 1224622",
"url": "https://bugzilla.suse.com/1224622"
},
{
"category": "self",
"summary": "SUSE Bug 1224627",
"url": "https://bugzilla.suse.com/1224627"
},
{
"category": "self",
"summary": "SUSE Bug 1224637",
"url": "https://bugzilla.suse.com/1224637"
},
{
"category": "self",
"summary": "SUSE Bug 1224641",
"url": "https://bugzilla.suse.com/1224641"
},
{
"category": "self",
"summary": "SUSE Bug 1224647",
"url": "https://bugzilla.suse.com/1224647"
},
{
"category": "self",
"summary": "SUSE Bug 1224663",
"url": "https://bugzilla.suse.com/1224663"
},
{
"category": "self",
"summary": "SUSE Bug 1224683",
"url": "https://bugzilla.suse.com/1224683"
},
{
"category": "self",
"summary": "SUSE Bug 1224686",
"url": "https://bugzilla.suse.com/1224686"
},
{
"category": "self",
"summary": "SUSE Bug 1224699",
"url": "https://bugzilla.suse.com/1224699"
},
{
"category": "self",
"summary": "SUSE Bug 1224700",
"url": "https://bugzilla.suse.com/1224700"
},
{
"category": "self",
"summary": "SUSE Bug 1224743",
"url": "https://bugzilla.suse.com/1224743"
},
{
"category": "self",
"summary": "SUSE Bug 1224965",
"url": "https://bugzilla.suse.com/1224965"
},
{
"category": "self",
"summary": "SUSE Bug 1224975",
"url": "https://bugzilla.suse.com/1224975"
},
{
"category": "self",
"summary": "SUSE Bug 1225003",
"url": "https://bugzilla.suse.com/1225003"
},
{
"category": "self",
"summary": "SUSE Bug 1225214",
"url": "https://bugzilla.suse.com/1225214"
},
{
"category": "self",
"summary": "SUSE Bug 1225224",
"url": "https://bugzilla.suse.com/1225224"
},
{
"category": "self",
"summary": "SUSE Bug 1225229",
"url": "https://bugzilla.suse.com/1225229"
},
{
"category": "self",
"summary": "SUSE Bug 1225238",
"url": "https://bugzilla.suse.com/1225238"
},
{
"category": "self",
"summary": "SUSE Bug 1225241",
"url": "https://bugzilla.suse.com/1225241"
},
{
"category": "self",
"summary": "SUSE Bug 1225326",
"url": "https://bugzilla.suse.com/1225326"
},
{
"category": "self",
"summary": "SUSE Bug 1225328",
"url": "https://bugzilla.suse.com/1225328"
},
{
"category": "self",
"summary": "SUSE Bug 1225346",
"url": "https://bugzilla.suse.com/1225346"
},
{
"category": "self",
"summary": "SUSE Bug 1225357",
"url": "https://bugzilla.suse.com/1225357"
},
{
"category": "self",
"summary": "SUSE Bug 1225361",
"url": "https://bugzilla.suse.com/1225361"
},
{
"category": "self",
"summary": "SUSE Bug 1225396",
"url": "https://bugzilla.suse.com/1225396"
},
{
"category": "self",
"summary": "SUSE Bug 1225427",
"url": "https://bugzilla.suse.com/1225427"
},
{
"category": "self",
"summary": "SUSE Bug 1225431",
"url": "https://bugzilla.suse.com/1225431"
},
{
"category": "self",
"summary": "SUSE Bug 1225455",
"url": "https://bugzilla.suse.com/1225455"
},
{
"category": "self",
"summary": "SUSE Bug 1225478",
"url": "https://bugzilla.suse.com/1225478"
},
{
"category": "self",
"summary": "SUSE Bug 1225505",
"url": "https://bugzilla.suse.com/1225505"
},
{
"category": "self",
"summary": "SUSE Bug 1225530",
"url": "https://bugzilla.suse.com/1225530"
},
{
"category": "self",
"summary": "SUSE Bug 1225532",
"url": "https://bugzilla.suse.com/1225532"
},
{
"category": "self",
"summary": "SUSE Bug 1225569",
"url": "https://bugzilla.suse.com/1225569"
},
{
"category": "self",
"summary": "SUSE Bug 1225593",
"url": "https://bugzilla.suse.com/1225593"
},
{
"category": "self",
"summary": "SUSE Bug 1225711",
"url": "https://bugzilla.suse.com/1225711"
},
{
"category": "self",
"summary": "SUSE Bug 1225719",
"url": "https://bugzilla.suse.com/1225719"
},
{
"category": "self",
"summary": "SUSE Bug 1225767",
"url": "https://bugzilla.suse.com/1225767"
},
{
"category": "self",
"summary": "SUSE Bug 1225820",
"url": "https://bugzilla.suse.com/1225820"
},
{
"category": "self",
"summary": "SUSE Bug 1225835",
"url": "https://bugzilla.suse.com/1225835"
},
{
"category": "self",
"summary": "SUSE Bug 1225838",
"url": "https://bugzilla.suse.com/1225838"
},
{
"category": "self",
"summary": "SUSE Bug 1225898",
"url": "https://bugzilla.suse.com/1225898"
},
{
"category": "self",
"summary": "SUSE Bug 1226550",
"url": "https://bugzilla.suse.com/1226550"
},
{
"category": "self",
"summary": "SUSE Bug 1226553",
"url": "https://bugzilla.suse.com/1226553"
},
{
"category": "self",
"summary": "SUSE Bug 1226555",
"url": "https://bugzilla.suse.com/1226555"
},
{
"category": "self",
"summary": "SUSE Bug 1226559",
"url": "https://bugzilla.suse.com/1226559"
},
{
"category": "self",
"summary": "SUSE Bug 1226568",
"url": "https://bugzilla.suse.com/1226568"
},
{
"category": "self",
"summary": "SUSE Bug 1226571",
"url": "https://bugzilla.suse.com/1226571"
},
{
"category": "self",
"summary": "SUSE Bug 1226645",
"url": "https://bugzilla.suse.com/1226645"
},
{
"category": "self",
"summary": "SUSE Bug 1226757",
"url": "https://bugzilla.suse.com/1226757"
},
{
"category": "self",
"summary": "SUSE Bug 1226783",
"url": "https://bugzilla.suse.com/1226783"
},
{
"category": "self",
"summary": "SUSE Bug 1226786",
"url": "https://bugzilla.suse.com/1226786"
},
{
"category": "self",
"summary": "SUSE Bug 1226834",
"url": "https://bugzilla.suse.com/1226834"
},
{
"category": "self",
"summary": "SUSE Bug 1226861",
"url": "https://bugzilla.suse.com/1226861"
},
{
"category": "self",
"summary": "SUSE Bug 1226908",
"url": "https://bugzilla.suse.com/1226908"
},
{
"category": "self",
"summary": "SUSE Bug 1226994",
"url": "https://bugzilla.suse.com/1226994"
},
{
"category": "self",
"summary": "SUSE Bug 1227191",
"url": "https://bugzilla.suse.com/1227191"
},
{
"category": "self",
"summary": "SUSE Bug 1227213",
"url": "https://bugzilla.suse.com/1227213"
},
{
"category": "self",
"summary": "SUSE Bug 1227407",
"url": "https://bugzilla.suse.com/1227407"
},
{
"category": "self",
"summary": "SUSE Bug 1227435",
"url": "https://bugzilla.suse.com/1227435"
},
{
"category": "self",
"summary": "SUSE Bug 1227487",
"url": "https://bugzilla.suse.com/1227487"
},
{
"category": "self",
"summary": "SUSE Bug 1227573",
"url": "https://bugzilla.suse.com/1227573"
},
{
"category": "self",
"summary": "SUSE Bug 1227618",
"url": "https://bugzilla.suse.com/1227618"
},
{
"category": "self",
"summary": "SUSE Bug 1227626",
"url": "https://bugzilla.suse.com/1227626"
},
{
"category": "self",
"summary": "SUSE Bug 1227716",
"url": "https://bugzilla.suse.com/1227716"
},
{
"category": "self",
"summary": "SUSE Bug 1227725",
"url": "https://bugzilla.suse.com/1227725"
},
{
"category": "self",
"summary": "SUSE Bug 1227729",
"url": "https://bugzilla.suse.com/1227729"
},
{
"category": "self",
"summary": "SUSE Bug 1227730",
"url": "https://bugzilla.suse.com/1227730"
},
{
"category": "self",
"summary": "SUSE Bug 1227733",
"url": "https://bugzilla.suse.com/1227733"
},
{
"category": "self",
"summary": "SUSE Bug 1227750",
"url": "https://bugzilla.suse.com/1227750"
},
{
"category": "self",
"summary": "SUSE Bug 1227754",
"url": "https://bugzilla.suse.com/1227754"
},
{
"category": "self",
"summary": "SUSE Bug 1227762",
"url": "https://bugzilla.suse.com/1227762"
},
{
"category": "self",
"summary": "SUSE Bug 1227770",
"url": "https://bugzilla.suse.com/1227770"
},
{
"category": "self",
"summary": "SUSE Bug 1227771",
"url": "https://bugzilla.suse.com/1227771"
},
{
"category": "self",
"summary": "SUSE Bug 1227772",
"url": "https://bugzilla.suse.com/1227772"
},
{
"category": "self",
"summary": "SUSE Bug 1227774",
"url": "https://bugzilla.suse.com/1227774"
},
{
"category": "self",
"summary": "SUSE Bug 1227786",
"url": "https://bugzilla.suse.com/1227786"
},
{
"category": "self",
"summary": "SUSE Bug 1227790",
"url": "https://bugzilla.suse.com/1227790"
},
{
"category": "self",
"summary": "SUSE Bug 1227806",
"url": "https://bugzilla.suse.com/1227806"
},
{
"category": "self",
"summary": "SUSE Bug 1227824",
"url": "https://bugzilla.suse.com/1227824"
},
{
"category": "self",
"summary": "SUSE Bug 1227828",
"url": "https://bugzilla.suse.com/1227828"
},
{
"category": "self",
"summary": "SUSE Bug 1227830",
"url": "https://bugzilla.suse.com/1227830"
},
{
"category": "self",
"summary": "SUSE Bug 1227836",
"url": "https://bugzilla.suse.com/1227836"
},
{
"category": "self",
"summary": "SUSE Bug 1227849",
"url": "https://bugzilla.suse.com/1227849"
},
{
"category": "self",
"summary": "SUSE Bug 1227865",
"url": "https://bugzilla.suse.com/1227865"
},
{
"category": "self",
"summary": "SUSE Bug 1227866",
"url": "https://bugzilla.suse.com/1227866"
},
{
"category": "self",
"summary": "SUSE Bug 1227884",
"url": "https://bugzilla.suse.com/1227884"
},
{
"category": "self",
"summary": "SUSE Bug 1227886",
"url": "https://bugzilla.suse.com/1227886"
},
{
"category": "self",
"summary": "SUSE Bug 1227891",
"url": "https://bugzilla.suse.com/1227891"
},
{
"category": "self",
"summary": "SUSE Bug 1227913",
"url": "https://bugzilla.suse.com/1227913"
},
{
"category": "self",
"summary": "SUSE Bug 1227924",
"url": "https://bugzilla.suse.com/1227924"
},
{
"category": "self",
"summary": "SUSE Bug 1227928",
"url": "https://bugzilla.suse.com/1227928"
},
{
"category": "self",
"summary": "SUSE Bug 1227929",
"url": "https://bugzilla.suse.com/1227929"
},
{
"category": "self",
"summary": "SUSE Bug 1227936",
"url": "https://bugzilla.suse.com/1227936"
},
{
"category": "self",
"summary": "SUSE Bug 1227957",
"url": "https://bugzilla.suse.com/1227957"
},
{
"category": "self",
"summary": "SUSE Bug 1227968",
"url": "https://bugzilla.suse.com/1227968"
},
{
"category": "self",
"summary": "SUSE Bug 1227969",
"url": "https://bugzilla.suse.com/1227969"
},
{
"category": "self",
"summary": "SUSE Bug 1227975",
"url": "https://bugzilla.suse.com/1227975"
},
{
"category": "self",
"summary": "SUSE Bug 1227985",
"url": "https://bugzilla.suse.com/1227985"
},
{
"category": "self",
"summary": "SUSE Bug 1227989",
"url": "https://bugzilla.suse.com/1227989"
},
{
"category": "self",
"summary": "SUSE Bug 1228003",
"url": "https://bugzilla.suse.com/1228003"
},
{
"category": "self",
"summary": "SUSE Bug 1228005",
"url": "https://bugzilla.suse.com/1228005"
},
{
"category": "self",
"summary": "SUSE Bug 1228008",
"url": "https://bugzilla.suse.com/1228008"
},
{
"category": "self",
"summary": "SUSE Bug 1228013",
"url": "https://bugzilla.suse.com/1228013"
},
{
"category": "self",
"summary": "SUSE Bug 1228025",
"url": "https://bugzilla.suse.com/1228025"
},
{
"category": "self",
"summary": "SUSE Bug 1228030",
"url": "https://bugzilla.suse.com/1228030"
},
{
"category": "self",
"summary": "SUSE Bug 1228037",
"url": "https://bugzilla.suse.com/1228037"
},
{
"category": "self",
"summary": "SUSE Bug 1228045",
"url": "https://bugzilla.suse.com/1228045"
},
{
"category": "self",
"summary": "SUSE Bug 1228054",
"url": "https://bugzilla.suse.com/1228054"
},
{
"category": "self",
"summary": "SUSE Bug 1228055",
"url": "https://bugzilla.suse.com/1228055"
},
{
"category": "self",
"summary": "SUSE Bug 1228063",
"url": "https://bugzilla.suse.com/1228063"
},
{
"category": "self",
"summary": "SUSE Bug 1228071",
"url": "https://bugzilla.suse.com/1228071"
},
{
"category": "self",
"summary": "SUSE Bug 1228235",
"url": "https://bugzilla.suse.com/1228235"
},
{
"category": "self",
"summary": "SUSE Bug 1228237",
"url": "https://bugzilla.suse.com/1228237"
},
{
"category": "self",
"summary": "SUSE Bug 1228327",
"url": "https://bugzilla.suse.com/1228327"
},
{
"category": "self",
"summary": "SUSE Bug 1228328",
"url": "https://bugzilla.suse.com/1228328"
},
{
"category": "self",
"summary": "SUSE Bug 1228408",
"url": "https://bugzilla.suse.com/1228408"
},
{
"category": "self",
"summary": "SUSE Bug 1228409",
"url": "https://bugzilla.suse.com/1228409"
},
{
"category": "self",
"summary": "SUSE Bug 1228410",
"url": "https://bugzilla.suse.com/1228410"
},
{
"category": "self",
"summary": "SUSE Bug 1228470",
"url": "https://bugzilla.suse.com/1228470"
},
{
"category": "self",
"summary": "SUSE Bug 1228530",
"url": "https://bugzilla.suse.com/1228530"
},
{
"category": "self",
"summary": "SUSE Bug 1228561",
"url": "https://bugzilla.suse.com/1228561"
},
{
"category": "self",
"summary": "SUSE Bug 1228565",
"url": "https://bugzilla.suse.com/1228565"
},
{
"category": "self",
"summary": "SUSE Bug 1228567",
"url": "https://bugzilla.suse.com/1228567"
},
{
"category": "self",
"summary": "SUSE Bug 1228580",
"url": "https://bugzilla.suse.com/1228580"
},
{
"category": "self",
"summary": "SUSE Bug 1228581",
"url": "https://bugzilla.suse.com/1228581"
},
{
"category": "self",
"summary": "SUSE Bug 1228584",
"url": "https://bugzilla.suse.com/1228584"
},
{
"category": "self",
"summary": "SUSE Bug 1228588",
"url": "https://bugzilla.suse.com/1228588"
},
{
"category": "self",
"summary": "SUSE Bug 1228599",
"url": "https://bugzilla.suse.com/1228599"
},
{
"category": "self",
"summary": "SUSE Bug 1228617",
"url": "https://bugzilla.suse.com/1228617"
},
{
"category": "self",
"summary": "SUSE Bug 1228625",
"url": "https://bugzilla.suse.com/1228625"
},
{
"category": "self",
"summary": "SUSE Bug 1228626",
"url": "https://bugzilla.suse.com/1228626"
},
{
"category": "self",
"summary": "SUSE Bug 1228633",
"url": "https://bugzilla.suse.com/1228633"
},
{
"category": "self",
"summary": "SUSE Bug 1228640",
"url": "https://bugzilla.suse.com/1228640"
},
{
"category": "self",
"summary": "SUSE Bug 1228649",
"url": "https://bugzilla.suse.com/1228649"
},
{
"category": "self",
"summary": "SUSE Bug 1228655",
"url": "https://bugzilla.suse.com/1228655"
},
{
"category": "self",
"summary": "SUSE Bug 1228658",
"url": "https://bugzilla.suse.com/1228658"
},
{
"category": "self",
"summary": "SUSE Bug 1228662",
"url": "https://bugzilla.suse.com/1228662"
},
{
"category": "self",
"summary": "SUSE Bug 1228680",
"url": "https://bugzilla.suse.com/1228680"
},
{
"category": "self",
"summary": "SUSE Bug 1228705",
"url": "https://bugzilla.suse.com/1228705"
},
{
"category": "self",
"summary": "SUSE Bug 1228723",
"url": "https://bugzilla.suse.com/1228723"
},
{
"category": "self",
"summary": "SUSE Bug 1228726",
"url": "https://bugzilla.suse.com/1228726"
},
{
"category": "self",
"summary": "SUSE Bug 1228743",
"url": "https://bugzilla.suse.com/1228743"
},
{
"category": "self",
"summary": "SUSE Bug 1228850",
"url": "https://bugzilla.suse.com/1228850"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-26558 page",
"url": "https://www.suse.com/security/cve/CVE-2020-26558/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-0129 page",
"url": "https://www.suse.com/security/cve/CVE-2021-0129/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47145 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47145/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47191 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47191/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47194 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47194/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47197 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47197/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47201 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47201/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47219 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47219/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47275 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47275/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47295 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47295/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47388 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47388/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47395 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47395/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47399 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47399/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47403 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47403/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47405 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47405/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47438 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47438/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47441 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47441/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47468 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47468/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47498 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47498/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47501 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47501/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47516 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47516/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47520 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47520/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47542 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47542/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47547 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47547/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47559 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47559/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47580 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47580/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47582 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47582/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47588 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47588/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47597 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47597/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47599 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47599/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47606 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47606/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47619 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47619/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-20368 page",
"url": "https://www.suse.com/security/cve/CVE-2022-20368/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-28748 page",
"url": "https://www.suse.com/security/cve/CVE-2022-28748/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-2964 page",
"url": "https://www.suse.com/security/cve/CVE-2022-2964/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-48775 page",
"url": "https://www.suse.com/security/cve/CVE-2022-48775/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-48792 page",
"url": "https://www.suse.com/security/cve/CVE-2022-48792/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-48794 page",
"url": "https://www.suse.com/security/cve/CVE-2022-48794/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-48804 page",
"url": "https://www.suse.com/security/cve/CVE-2022-48804/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-48805 page",
"url": "https://www.suse.com/security/cve/CVE-2022-48805/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-48810 page",
"url": "https://www.suse.com/security/cve/CVE-2022-48810/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-48811 page",
"url": "https://www.suse.com/security/cve/CVE-2022-48811/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-48823 page",
"url": "https://www.suse.com/security/cve/CVE-2022-48823/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-48826 page",
"url": "https://www.suse.com/security/cve/CVE-2022-48826/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-48827 page",
"url": "https://www.suse.com/security/cve/CVE-2022-48827/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-48828 page",
"url": "https://www.suse.com/security/cve/CVE-2022-48828/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-48829 page",
"url": "https://www.suse.com/security/cve/CVE-2022-48829/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-48836 page",
"url": "https://www.suse.com/security/cve/CVE-2022-48836/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-48839 page",
"url": "https://www.suse.com/security/cve/CVE-2022-48839/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-48850 page",
"url": "https://www.suse.com/security/cve/CVE-2022-48850/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-48855 page",
"url": "https://www.suse.com/security/cve/CVE-2022-48855/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-48857 page",
"url": "https://www.suse.com/security/cve/CVE-2022-48857/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-48860 page",
"url": "https://www.suse.com/security/cve/CVE-2022-48860/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-48863 page",
"url": "https://www.suse.com/security/cve/CVE-2022-48863/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-4244 page",
"url": "https://www.suse.com/security/cve/CVE-2023-4244/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-52435 page",
"url": "https://www.suse.com/security/cve/CVE-2023-52435/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-52507 page",
"url": "https://www.suse.com/security/cve/CVE-2023-52507/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-52594 page",
"url": "https://www.suse.com/security/cve/CVE-2023-52594/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-52612 page",
"url": "https://www.suse.com/security/cve/CVE-2023-52612/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-52615 page",
"url": "https://www.suse.com/security/cve/CVE-2023-52615/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-52619 page",
"url": "https://www.suse.com/security/cve/CVE-2023-52619/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-52623 page",
"url": "https://www.suse.com/security/cve/CVE-2023-52623/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-52669 page",
"url": "https://www.suse.com/security/cve/CVE-2023-52669/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-52683 page",
"url": "https://www.suse.com/security/cve/CVE-2023-52683/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-52693 page",
"url": "https://www.suse.com/security/cve/CVE-2023-52693/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-52743 page",
"url": "https://www.suse.com/security/cve/CVE-2023-52743/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-52753 page",
"url": "https://www.suse.com/security/cve/CVE-2023-52753/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-52817 page",
"url": "https://www.suse.com/security/cve/CVE-2023-52817/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-52818 page",
"url": "https://www.suse.com/security/cve/CVE-2023-52818/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-52819 page",
"url": "https://www.suse.com/security/cve/CVE-2023-52819/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-52885 page",
"url": "https://www.suse.com/security/cve/CVE-2023-52885/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-26615 page",
"url": "https://www.suse.com/security/cve/CVE-2024-26615/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-26635 page",
"url": "https://www.suse.com/security/cve/CVE-2024-26635/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-26636 page",
"url": "https://www.suse.com/security/cve/CVE-2024-26636/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-26659 page",
"url": "https://www.suse.com/security/cve/CVE-2024-26659/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-26663 page",
"url": "https://www.suse.com/security/cve/CVE-2024-26663/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-26735 page",
"url": "https://www.suse.com/security/cve/CVE-2024-26735/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-26830 page",
"url": "https://www.suse.com/security/cve/CVE-2024-26830/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-26863 page",
"url": "https://www.suse.com/security/cve/CVE-2024-26863/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-26880 page",
"url": "https://www.suse.com/security/cve/CVE-2024-26880/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-26920 page",
"url": "https://www.suse.com/security/cve/CVE-2024-26920/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-26924 page",
"url": "https://www.suse.com/security/cve/CVE-2024-26924/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-27019 page",
"url": "https://www.suse.com/security/cve/CVE-2024-27019/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-27020 page",
"url": "https://www.suse.com/security/cve/CVE-2024-27020/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-27025 page",
"url": "https://www.suse.com/security/cve/CVE-2024-27025/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-27437 page",
"url": "https://www.suse.com/security/cve/CVE-2024-27437/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-35805 page",
"url": "https://www.suse.com/security/cve/CVE-2024-35805/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-35806 page",
"url": "https://www.suse.com/security/cve/CVE-2024-35806/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-35819 page",
"url": "https://www.suse.com/security/cve/CVE-2024-35819/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-35828 page",
"url": "https://www.suse.com/security/cve/CVE-2024-35828/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-35837 page",
"url": "https://www.suse.com/security/cve/CVE-2024-35837/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-35887 page",
"url": "https://www.suse.com/security/cve/CVE-2024-35887/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-35893 page",
"url": "https://www.suse.com/security/cve/CVE-2024-35893/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-35934 page",
"url": "https://www.suse.com/security/cve/CVE-2024-35934/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-35947 page",
"url": "https://www.suse.com/security/cve/CVE-2024-35947/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-35949 page",
"url": "https://www.suse.com/security/cve/CVE-2024-35949/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-35966 page",
"url": "https://www.suse.com/security/cve/CVE-2024-35966/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-35967 page",
"url": "https://www.suse.com/security/cve/CVE-2024-35967/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-35978 page",
"url": "https://www.suse.com/security/cve/CVE-2024-35978/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-35995 page",
"url": "https://www.suse.com/security/cve/CVE-2024-35995/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-36004 page",
"url": "https://www.suse.com/security/cve/CVE-2024-36004/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-36014 page",
"url": "https://www.suse.com/security/cve/CVE-2024-36014/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-36288 page",
"url": "https://www.suse.com/security/cve/CVE-2024-36288/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-36592 page",
"url": "https://www.suse.com/security/cve/CVE-2024-36592/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-36901 page",
"url": "https://www.suse.com/security/cve/CVE-2024-36901/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-36902 page",
"url": "https://www.suse.com/security/cve/CVE-2024-36902/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-36919 page",
"url": "https://www.suse.com/security/cve/CVE-2024-36919/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-36924 page",
"url": "https://www.suse.com/security/cve/CVE-2024-36924/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-36939 page",
"url": "https://www.suse.com/security/cve/CVE-2024-36939/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-36941 page",
"url": "https://www.suse.com/security/cve/CVE-2024-36941/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-36952 page",
"url": "https://www.suse.com/security/cve/CVE-2024-36952/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-38558 page",
"url": "https://www.suse.com/security/cve/CVE-2024-38558/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-38560 page",
"url": "https://www.suse.com/security/cve/CVE-2024-38560/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-38598 page",
"url": "https://www.suse.com/security/cve/CVE-2024-38598/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-38619 page",
"url": "https://www.suse.com/security/cve/CVE-2024-38619/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-38630 page",
"url": "https://www.suse.com/security/cve/CVE-2024-38630/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-39301 page",
"url": "https://www.suse.com/security/cve/CVE-2024-39301/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-39475 page",
"url": "https://www.suse.com/security/cve/CVE-2024-39475/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-39487 page",
"url": "https://www.suse.com/security/cve/CVE-2024-39487/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-39488 page",
"url": "https://www.suse.com/security/cve/CVE-2024-39488/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-39490 page",
"url": "https://www.suse.com/security/cve/CVE-2024-39490/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-39494 page",
"url": "https://www.suse.com/security/cve/CVE-2024-39494/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-39499 page",
"url": "https://www.suse.com/security/cve/CVE-2024-39499/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-39501 page",
"url": "https://www.suse.com/security/cve/CVE-2024-39501/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-39506 page",
"url": "https://www.suse.com/security/cve/CVE-2024-39506/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-39507 page",
"url": "https://www.suse.com/security/cve/CVE-2024-39507/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-39509 page",
"url": "https://www.suse.com/security/cve/CVE-2024-39509/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-40901 page",
"url": "https://www.suse.com/security/cve/CVE-2024-40901/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-40904 page",
"url": "https://www.suse.com/security/cve/CVE-2024-40904/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-40912 page",
"url": "https://www.suse.com/security/cve/CVE-2024-40912/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-40923 page",
"url": "https://www.suse.com/security/cve/CVE-2024-40923/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-40929 page",
"url": "https://www.suse.com/security/cve/CVE-2024-40929/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-40932 page",
"url": "https://www.suse.com/security/cve/CVE-2024-40932/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-40937 page",
"url": "https://www.suse.com/security/cve/CVE-2024-40937/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-40941 page",
"url": "https://www.suse.com/security/cve/CVE-2024-40941/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-40942 page",
"url": "https://www.suse.com/security/cve/CVE-2024-40942/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-40943 page",
"url": "https://www.suse.com/security/cve/CVE-2024-40943/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-40953 page",
"url": "https://www.suse.com/security/cve/CVE-2024-40953/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-40959 page",
"url": "https://www.suse.com/security/cve/CVE-2024-40959/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-40966 page",
"url": "https://www.suse.com/security/cve/CVE-2024-40966/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-40967 page",
"url": "https://www.suse.com/security/cve/CVE-2024-40967/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-40978 page",
"url": "https://www.suse.com/security/cve/CVE-2024-40978/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-40982 page",
"url": "https://www.suse.com/security/cve/CVE-2024-40982/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-40987 page",
"url": "https://www.suse.com/security/cve/CVE-2024-40987/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-40988 page",
"url": "https://www.suse.com/security/cve/CVE-2024-40988/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-40990 page",
"url": "https://www.suse.com/security/cve/CVE-2024-40990/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-40995 page",
"url": "https://www.suse.com/security/cve/CVE-2024-40995/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-40998 page",
"url": "https://www.suse.com/security/cve/CVE-2024-40998/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-40999 page",
"url": "https://www.suse.com/security/cve/CVE-2024-40999/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-41014 page",
"url": "https://www.suse.com/security/cve/CVE-2024-41014/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-41015 page",
"url": "https://www.suse.com/security/cve/CVE-2024-41015/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-41016 page",
"url": "https://www.suse.com/security/cve/CVE-2024-41016/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-41044 page",
"url": "https://www.suse.com/security/cve/CVE-2024-41044/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-41048 page",
"url": "https://www.suse.com/security/cve/CVE-2024-41048/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-41059 page",
"url": "https://www.suse.com/security/cve/CVE-2024-41059/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-41060 page",
"url": "https://www.suse.com/security/cve/CVE-2024-41060/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-41063 page",
"url": "https://www.suse.com/security/cve/CVE-2024-41063/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-41064 page",
"url": "https://www.suse.com/security/cve/CVE-2024-41064/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-41066 page",
"url": "https://www.suse.com/security/cve/CVE-2024-41066/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-41070 page",
"url": "https://www.suse.com/security/cve/CVE-2024-41070/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-41071 page",
"url": "https://www.suse.com/security/cve/CVE-2024-41071/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-41072 page",
"url": "https://www.suse.com/security/cve/CVE-2024-41072/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-41076 page",
"url": "https://www.suse.com/security/cve/CVE-2024-41076/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-41078 page",
"url": "https://www.suse.com/security/cve/CVE-2024-41078/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-41081 page",
"url": "https://www.suse.com/security/cve/CVE-2024-41081/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-41089 page",
"url": "https://www.suse.com/security/cve/CVE-2024-41089/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-41090 page",
"url": "https://www.suse.com/security/cve/CVE-2024-41090/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-41091 page",
"url": "https://www.suse.com/security/cve/CVE-2024-41091/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-41095 page",
"url": "https://www.suse.com/security/cve/CVE-2024-41095/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-42070 page",
"url": "https://www.suse.com/security/cve/CVE-2024-42070/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-42093 page",
"url": "https://www.suse.com/security/cve/CVE-2024-42093/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-42096 page",
"url": "https://www.suse.com/security/cve/CVE-2024-42096/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-42119 page",
"url": "https://www.suse.com/security/cve/CVE-2024-42119/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-42120 page",
"url": "https://www.suse.com/security/cve/CVE-2024-42120/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-42124 page",
"url": "https://www.suse.com/security/cve/CVE-2024-42124/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-42145 page",
"url": "https://www.suse.com/security/cve/CVE-2024-42145/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-42223 page",
"url": "https://www.suse.com/security/cve/CVE-2024-42223/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-42224 page",
"url": "https://www.suse.com/security/cve/CVE-2024-42224/"
}
],
"title": "Security update for the Linux Kernel",
"tracking": {
"current_release_date": "2024-08-14T07:24:46Z",
"generator": {
"date": "2024-08-14T07:24:46Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2024:2901-1",
"initial_release_date": "2024-08-14T07:24:46Z",
"revision_history": [
{
"date": "2024-08-14T07:24:46Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "kernel-devel-azure-4.12.14-16.194.1.noarch",
"product": {
"name": "kernel-devel-azure-4.12.14-16.194.1.noarch",
"product_id": "kernel-devel-azure-4.12.14-16.194.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-azure-4.12.14-16.194.1.noarch",
"product": {
"name": "kernel-source-azure-4.12.14-16.194.1.noarch",
"product_id": "kernel-source-azure-4.12.14-16.194.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-azure-4.12.14-16.194.1.x86_64",
"product": {
"name": "cluster-md-kmp-azure-4.12.14-16.194.1.x86_64",
"product_id": "cluster-md-kmp-azure-4.12.14-16.194.1.x86_64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-azure-4.12.14-16.194.1.x86_64",
"product": {
"name": "dlm-kmp-azure-4.12.14-16.194.1.x86_64",
"product_id": "dlm-kmp-azure-4.12.14-16.194.1.x86_64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-azure-4.12.14-16.194.1.x86_64",
"product": {
"name": "gfs2-kmp-azure-4.12.14-16.194.1.x86_64",
"product_id": "gfs2-kmp-azure-4.12.14-16.194.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-azure-4.12.14-16.194.1.x86_64",
"product": {
"name": "kernel-azure-4.12.14-16.194.1.x86_64",
"product_id": "kernel-azure-4.12.14-16.194.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-azure-base-4.12.14-16.194.1.x86_64",
"product": {
"name": "kernel-azure-base-4.12.14-16.194.1.x86_64",
"product_id": "kernel-azure-base-4.12.14-16.194.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-azure-devel-4.12.14-16.194.1.x86_64",
"product": {
"name": "kernel-azure-devel-4.12.14-16.194.1.x86_64",
"product_id": "kernel-azure-devel-4.12.14-16.194.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-azure-extra-4.12.14-16.194.1.x86_64",
"product": {
"name": "kernel-azure-extra-4.12.14-16.194.1.x86_64",
"product_id": "kernel-azure-extra-4.12.14-16.194.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-azure-kgraft-devel-4.12.14-16.194.1.x86_64",
"product": {
"name": "kernel-azure-kgraft-devel-4.12.14-16.194.1.x86_64",
"product_id": "kernel-azure-kgraft-devel-4.12.14-16.194.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-syms-azure-4.12.14-16.194.1.x86_64",
"product": {
"name": "kernel-syms-azure-4.12.14-16.194.1.x86_64",
"product_id": "kernel-syms-azure-4.12.14-16.194.1.x86_64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-azure-4.12.14-16.194.1.x86_64",
"product": {
"name": "kselftests-kmp-azure-4.12.14-16.194.1.x86_64",
"product_id": "kselftests-kmp-azure-4.12.14-16.194.1.x86_64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-azure-4.12.14-16.194.1.x86_64",
"product": {
"name": "ocfs2-kmp-azure-4.12.14-16.194.1.x86_64",
"product_id": "ocfs2-kmp-azure-4.12.14-16.194.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 12 SP5",
"product": {
"name": "SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles:12:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:12:sp5"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-azure-4.12.14-16.194.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64"
},
"product_reference": "kernel-azure-4.12.14-16.194.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-azure-base-4.12.14-16.194.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64"
},
"product_reference": "kernel-azure-base-4.12.14-16.194.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-azure-devel-4.12.14-16.194.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64"
},
"product_reference": "kernel-azure-devel-4.12.14-16.194.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-azure-4.12.14-16.194.1.noarch as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch"
},
"product_reference": "kernel-devel-azure-4.12.14-16.194.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-azure-4.12.14-16.194.1.noarch as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch"
},
"product_reference": "kernel-source-azure-4.12.14-16.194.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-azure-4.12.14-16.194.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
},
"product_reference": "kernel-syms-azure-4.12.14-16.194.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-azure-4.12.14-16.194.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64"
},
"product_reference": "kernel-azure-4.12.14-16.194.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-azure-base-4.12.14-16.194.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64"
},
"product_reference": "kernel-azure-base-4.12.14-16.194.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-azure-devel-4.12.14-16.194.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64"
},
"product_reference": "kernel-azure-devel-4.12.14-16.194.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-azure-4.12.14-16.194.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch"
},
"product_reference": "kernel-devel-azure-4.12.14-16.194.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-azure-4.12.14-16.194.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch"
},
"product_reference": "kernel-source-azure-4.12.14-16.194.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-azure-4.12.14-16.194.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
},
"product_reference": "kernel-syms-azure-4.12.14-16.194.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2020-26558",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-26558"
}
],
"notes": [
{
"category": "general",
"text": "Bluetooth LE and BR/EDR secure pairing in Bluetooth Core Specification 2.1 through 5.2 may permit a nearby man-in-the-middle attacker to identify the Passkey used during pairing (in the Passkey authentication procedure) by reflection of the public key and the authentication evidence of the initiating device, potentially permitting this attacker to complete authenticated pairing with the responding device using the correct Passkey for the pairing session. The attack methodology determines the Passkey value one bit at a time.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-26558",
"url": "https://www.suse.com/security/cve/CVE-2020-26558"
},
{
"category": "external",
"summary": "SUSE Bug 1179610 for CVE-2020-26558",
"url": "https://bugzilla.suse.com/1179610"
},
{
"category": "external",
"summary": "SUSE Bug 1186463 for CVE-2020-26558",
"url": "https://bugzilla.suse.com/1186463"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-14T07:24:46Z",
"details": "moderate"
}
],
"title": "CVE-2020-26558"
},
{
"cve": "CVE-2021-0129",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-0129"
}
],
"notes": [
{
"category": "general",
"text": "Improper access control in BlueZ may allow an authenticated user to potentially enable information disclosure via adjacent access.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-0129",
"url": "https://www.suse.com/security/cve/CVE-2021-0129"
},
{
"category": "external",
"summary": "SUSE Bug 1186463 for CVE-2021-0129",
"url": "https://bugzilla.suse.com/1186463"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-14T07:24:46Z",
"details": "moderate"
}
],
"title": "CVE-2021-0129"
},
{
"cve": "CVE-2021-47145",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47145"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbtrfs: do not BUG_ON in link_to_fixup_dir\n\nWhile doing error injection testing I got the following panic\n\n kernel BUG at fs/btrfs/tree-log.c:1862!\n invalid opcode: 0000 [#1] SMP NOPTI\n CPU: 1 PID: 7836 Comm: mount Not tainted 5.13.0-rc1+ #305\n Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.13.0-2.fc32 04/01/2014\n RIP: 0010:link_to_fixup_dir+0xd5/0xe0\n RSP: 0018:ffffb5800180fa30 EFLAGS: 00010216\n RAX: fffffffffffffffb RBX: 00000000fffffffb RCX: ffff8f595287faf0\n RDX: ffffb5800180fa37 RSI: ffff8f5954978800 RDI: 0000000000000000\n RBP: ffff8f5953af9450 R08: 0000000000000019 R09: 0000000000000001\n R10: 000151f408682970 R11: 0000000120021001 R12: ffff8f5954978800\n R13: ffff8f595287faf0 R14: ffff8f5953c77dd0 R15: 0000000000000065\n FS: 00007fc5284c8c40(0000) GS:ffff8f59bbd00000(0000) knlGS:0000000000000000\n CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n CR2: 00007fc5287f47c0 CR3: 000000011275e002 CR4: 0000000000370ee0\n Call Trace:\n replay_one_buffer+0x409/0x470\n ? btree_read_extent_buffer_pages+0xd0/0x110\n walk_up_log_tree+0x157/0x1e0\n walk_log_tree+0xa6/0x1d0\n btrfs_recover_log_trees+0x1da/0x360\n ? replay_one_extent+0x7b0/0x7b0\n open_ctree+0x1486/0x1720\n btrfs_mount_root.cold+0x12/0xea\n ? __kmalloc_track_caller+0x12f/0x240\n legacy_get_tree+0x24/0x40\n vfs_get_tree+0x22/0xb0\n vfs_kern_mount.part.0+0x71/0xb0\n btrfs_mount+0x10d/0x380\n ? vfs_parse_fs_string+0x4d/0x90\n legacy_get_tree+0x24/0x40\n vfs_get_tree+0x22/0xb0\n path_mount+0x433/0xa10\n __x64_sys_mount+0xe3/0x120\n do_syscall_64+0x3d/0x80\n entry_SYSCALL_64_after_hwframe+0x44/0xae\n\nWe can get -EIO or any number of legitimate errors from\nbtrfs_search_slot(), panicing here is not the appropriate response. The\nerror path for this code handles errors properly, simply return the\nerror.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47145",
"url": "https://www.suse.com/security/cve/CVE-2021-47145"
},
{
"category": "external",
"summary": "SUSE Bug 1222005 for CVE-2021-47145",
"url": "https://bugzilla.suse.com/1222005"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-14T07:24:46Z",
"details": "moderate"
}
],
"title": "CVE-2021-47145"
},
{
"cve": "CVE-2021-47191",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47191"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: scsi_debug: Fix out-of-bound read in resp_readcap16()\n\nThe following warning was observed running syzkaller:\n\n[ 3813.830724] sg_write: data in/out 65466/242 bytes for SCSI command 0x9e-- guessing data in;\n[ 3813.830724] program syz-executor not setting count and/or reply_len properly\n[ 3813.836956] ==================================================================\n[ 3813.839465] BUG: KASAN: stack-out-of-bounds in sg_copy_buffer+0x157/0x1e0\n[ 3813.841773] Read of size 4096 at addr ffff8883cf80f540 by task syz-executor/1549\n[ 3813.846612] Call Trace:\n[ 3813.846995] dump_stack+0x108/0x15f\n[ 3813.847524] print_address_description+0xa5/0x372\n[ 3813.848243] kasan_report.cold+0x236/0x2a8\n[ 3813.849439] check_memory_region+0x240/0x270\n[ 3813.850094] memcpy+0x30/0x80\n[ 3813.850553] sg_copy_buffer+0x157/0x1e0\n[ 3813.853032] sg_copy_from_buffer+0x13/0x20\n[ 3813.853660] fill_from_dev_buffer+0x135/0x370\n[ 3813.854329] resp_readcap16+0x1ac/0x280\n[ 3813.856917] schedule_resp+0x41f/0x1630\n[ 3813.858203] scsi_debug_queuecommand+0xb32/0x17e0\n[ 3813.862699] scsi_dispatch_cmd+0x330/0x950\n[ 3813.863329] scsi_request_fn+0xd8e/0x1710\n[ 3813.863946] __blk_run_queue+0x10b/0x230\n[ 3813.864544] blk_execute_rq_nowait+0x1d8/0x400\n[ 3813.865220] sg_common_write.isra.0+0xe61/0x2420\n[ 3813.871637] sg_write+0x6c8/0xef0\n[ 3813.878853] __vfs_write+0xe4/0x800\n[ 3813.883487] vfs_write+0x17b/0x530\n[ 3813.884008] ksys_write+0x103/0x270\n[ 3813.886268] __x64_sys_write+0x77/0xc0\n[ 3813.886841] do_syscall_64+0x106/0x360\n[ 3813.887415] entry_SYSCALL_64_after_hwframe+0x44/0xa9\n\nThis issue can be reproduced with the following syzkaller log:\n\nr0 = openat(0xffffffffffffff9c, \u0026(0x7f0000000040)=\u0027./file0\\x00\u0027, 0x26e1, 0x0)\nr1 = syz_open_procfs(0xffffffffffffffff, \u0026(0x7f0000000000)=\u0027fd/3\\x00\u0027)\nopen_by_handle_at(r1, \u0026(0x7f00000003c0)=ANY=[@ANYRESHEX], 0x602000)\nr2 = syz_open_dev$sg(\u0026(0x7f0000000000), 0x0, 0x40782)\nwrite$binfmt_aout(r2, \u0026(0x7f0000000340)=ANY=[@ANYBLOB=\"00000000deff000000000000000000000000000000000000000000000000000047f007af9e107a41ec395f1bded7be24277a1501ff6196a83366f4e6362bc0ff2b247f68a972989b094b2da4fb3607fcf611a22dd04310d28c75039d\"], 0x126)\n\nIn resp_readcap16() we get \"int alloc_len\" value -1104926854, and then pass\nthe huge arr_len to fill_from_dev_buffer(), but arr is only 32 bytes. This\nleads to OOB in sg_copy_buffer().\n\nTo solve this issue, define alloc_len as u32.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47191",
"url": "https://www.suse.com/security/cve/CVE-2021-47191"
},
{
"category": "external",
"summary": "SUSE Bug 1222866 for CVE-2021-47191",
"url": "https://bugzilla.suse.com/1222866"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-14T07:24:46Z",
"details": "moderate"
}
],
"title": "CVE-2021-47191"
},
{
"cve": "CVE-2021-47194",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47194"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncfg80211: call cfg80211_stop_ap when switch from P2P_GO type\n\nIf the userspace tools switch from NL80211_IFTYPE_P2P_GO to\nNL80211_IFTYPE_ADHOC via send_msg(NL80211_CMD_SET_INTERFACE), it\ndoes not call the cleanup cfg80211_stop_ap(), this leads to the\ninitialization of in-use data. For example, this path re-init the\nsdata-\u003eassigned_chanctx_list while it is still an element of\nassigned_vifs list, and makes that linked list corrupt.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47194",
"url": "https://www.suse.com/security/cve/CVE-2021-47194"
},
{
"category": "external",
"summary": "SUSE Bug 1222829 for CVE-2021-47194",
"url": "https://bugzilla.suse.com/1222829"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-14T07:24:46Z",
"details": "moderate"
}
],
"title": "CVE-2021-47194"
},
{
"cve": "CVE-2021-47197",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47197"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/mlx5e: nullify cq-\u003edbg pointer in mlx5_debug_cq_remove()\n\nPrior to this patch in case mlx5_core_destroy_cq() failed it proceeds\nto rest of destroy operations. mlx5_core_destroy_cq() could be called again\nby user and cause additional call of mlx5_debug_cq_remove().\ncq-\u003edbg was not nullify in previous call and cause the crash.\n\nFix it by nullify cq-\u003edbg pointer after removal.\n\nAlso proceed to destroy operations only if FW return 0\nfor MLX5_CMD_OP_DESTROY_CQ command.\n\ngeneral protection fault, probably for non-canonical address 0x2000300004058: 0000 [#1] SMP PTI\nCPU: 5 PID: 1228 Comm: python Not tainted 5.15.0-rc5_for_upstream_min_debug_2021_10_14_11_06 #1\nHardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS rel-1.13.0-0-gf21b5a4aeb02-prebuilt.qemu.org 04/01/2014\nRIP: 0010:lockref_get+0x1/0x60\nCode: 5d e9 53 ff ff ff 48 8d 7f 70 e8 0a 2e 48 00 c7 85 d0 00 00 00 02\n00 00 00 c6 45 70 00 fb 5d c3 c3 cc cc cc cc cc cc cc cc 53 \u003c48\u003e 8b 17\n48 89 fb 85 d2 75 3d 48 89 d0 bf 64 00 00 00 48 89 c1 48\nRSP: 0018:ffff888137dd7a38 EFLAGS: 00010206\nRAX: 0000000000000000 RBX: ffff888107d5f458 RCX: 00000000fffffffe\nRDX: 000000000002c2b0 RSI: ffffffff8155e2e0 RDI: 0002000300004058\nRBP: ffff888137dd7a88 R08: 0002000300004058 R09: ffff8881144a9f88\nR10: 0000000000000000 R11: 0000000000000000 R12: ffff8881141d4000\nR13: ffff888137dd7c68 R14: ffff888137dd7d58 R15: ffff888137dd7cc0\nFS: 00007f4644f2a4c0(0000) GS:ffff8887a2d40000(0000)\nknlGS:0000000000000000\nCS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 000055b4500f4380 CR3: 0000000114f7a003 CR4: 0000000000170ea0\nCall Trace:\n simple_recursive_removal+0x33/0x2e0\n ? debugfs_remove+0x60/0x60\n debugfs_remove+0x40/0x60\n mlx5_debug_cq_remove+0x32/0x70 [mlx5_core]\n mlx5_core_destroy_cq+0x41/0x1d0 [mlx5_core]\n devx_obj_cleanup+0x151/0x330 [mlx5_ib]\n ? __pollwait+0xd0/0xd0\n ? xas_load+0x5/0x70\n ? xa_load+0x62/0xa0\n destroy_hw_idr_uobject+0x20/0x80 [ib_uverbs]\n uverbs_destroy_uobject+0x3b/0x360 [ib_uverbs]\n uobj_destroy+0x54/0xa0 [ib_uverbs]\n ib_uverbs_cmd_verbs+0xaf2/0x1160 [ib_uverbs]\n ? uverbs_finalize_object+0xd0/0xd0 [ib_uverbs]\n ib_uverbs_ioctl+0xc4/0x1b0 [ib_uverbs]\n __x64_sys_ioctl+0x3e4/0x8e0",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47197",
"url": "https://www.suse.com/security/cve/CVE-2021-47197"
},
{
"category": "external",
"summary": "SUSE Bug 1222776 for CVE-2021-47197",
"url": "https://bugzilla.suse.com/1222776"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-14T07:24:46Z",
"details": "moderate"
}
],
"title": "CVE-2021-47197"
},
{
"cve": "CVE-2021-47201",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47201"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\niavf: free q_vectors before queues in iavf_disable_vf\n\niavf_free_queues() clears adapter-\u003enum_active_queues, which\niavf_free_q_vectors() relies on, so swap the order of these two function\ncalls in iavf_disable_vf(). This resolves a panic encountered when the\ninterface is disabled and then later brought up again after PF\ncommunication is restored.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47201",
"url": "https://www.suse.com/security/cve/CVE-2021-47201"
},
{
"category": "external",
"summary": "SUSE Bug 1222792 for CVE-2021-47201",
"url": "https://bugzilla.suse.com/1222792"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-14T07:24:46Z",
"details": "moderate"
}
],
"title": "CVE-2021-47201"
},
{
"cve": "CVE-2021-47219",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47219"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: scsi_debug: Fix out-of-bound read in resp_report_tgtpgs()\n\nThe following issue was observed running syzkaller:\n\nBUG: KASAN: slab-out-of-bounds in memcpy include/linux/string.h:377 [inline]\nBUG: KASAN: slab-out-of-bounds in sg_copy_buffer+0x150/0x1c0 lib/scatterlist.c:831\nRead of size 2132 at addr ffff8880aea95dc8 by task syz-executor.0/9815\n\nCPU: 0 PID: 9815 Comm: syz-executor.0 Not tainted 4.19.202-00874-gfc0fe04215a9 #2\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.10.2-1ubuntu1 04/01/2014\nCall Trace:\n __dump_stack lib/dump_stack.c:77 [inline]\n dump_stack+0xe4/0x14a lib/dump_stack.c:118\n print_address_description+0x73/0x280 mm/kasan/report.c:253\n kasan_report_error mm/kasan/report.c:352 [inline]\n kasan_report+0x272/0x370 mm/kasan/report.c:410\n memcpy+0x1f/0x50 mm/kasan/kasan.c:302\n memcpy include/linux/string.h:377 [inline]\n sg_copy_buffer+0x150/0x1c0 lib/scatterlist.c:831\n fill_from_dev_buffer+0x14f/0x340 drivers/scsi/scsi_debug.c:1021\n resp_report_tgtpgs+0x5aa/0x770 drivers/scsi/scsi_debug.c:1772\n schedule_resp+0x464/0x12f0 drivers/scsi/scsi_debug.c:4429\n scsi_debug_queuecommand+0x467/0x1390 drivers/scsi/scsi_debug.c:5835\n scsi_dispatch_cmd+0x3fc/0x9b0 drivers/scsi/scsi_lib.c:1896\n scsi_request_fn+0x1042/0x1810 drivers/scsi/scsi_lib.c:2034\n __blk_run_queue_uncond block/blk-core.c:464 [inline]\n __blk_run_queue+0x1a4/0x380 block/blk-core.c:484\n blk_execute_rq_nowait+0x1c2/0x2d0 block/blk-exec.c:78\n sg_common_write.isra.19+0xd74/0x1dc0 drivers/scsi/sg.c:847\n sg_write.part.23+0x6e0/0xd00 drivers/scsi/sg.c:716\n sg_write+0x64/0xa0 drivers/scsi/sg.c:622\n __vfs_write+0xed/0x690 fs/read_write.c:485\nkill_bdev:block_device:00000000e138492c\n vfs_write+0x184/0x4c0 fs/read_write.c:549\n ksys_write+0x107/0x240 fs/read_write.c:599\n do_syscall_64+0xc2/0x560 arch/x86/entry/common.c:293\n entry_SYSCALL_64_after_hwframe+0x49/0xbe\n\nWe get \u0027alen\u0027 from command its type is int. If userspace passes a large\nlength we will get a negative \u0027alen\u0027.\n\nSwitch n, alen, and rlen to u32.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47219",
"url": "https://www.suse.com/security/cve/CVE-2021-47219"
},
{
"category": "external",
"summary": "SUSE Bug 1222824 for CVE-2021-47219",
"url": "https://bugzilla.suse.com/1222824"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-14T07:24:46Z",
"details": "moderate"
}
],
"title": "CVE-2021-47219"
},
{
"cve": "CVE-2021-47275",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47275"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbcache: avoid oversized read request in cache missing code path\n\nIn the cache missing code path of cached device, if a proper location\nfrom the internal B+ tree is matched for a cache miss range, function\ncached_dev_cache_miss() will be called in cache_lookup_fn() in the\nfollowing code block,\n[code block 1]\n 526 unsigned int sectors = KEY_INODE(k) == s-\u003eiop.inode\n 527 ? min_t(uint64_t, INT_MAX,\n 528 KEY_START(k) - bio-\u003ebi_iter.bi_sector)\n 529 : INT_MAX;\n 530 int ret = s-\u003ed-\u003ecache_miss(b, s, bio, sectors);\n\nHere s-\u003ed-\u003ecache_miss() is the call backfunction pointer initialized as\ncached_dev_cache_miss(), the last parameter \u0027sectors\u0027 is an important\nhint to calculate the size of read request to backing device of the\nmissing cache data.\n\nCurrent calculation in above code block may generate oversized value of\n\u0027sectors\u0027, which consequently may trigger 2 different potential kernel\npanics by BUG() or BUG_ON() as listed below,\n\n1) BUG_ON() inside bch_btree_insert_key(),\n[code block 2]\n 886 BUG_ON(b-\u003eops-\u003eis_extents \u0026\u0026 !KEY_SIZE(k));\n2) BUG() inside biovec_slab(),\n[code block 3]\n 51 default:\n 52 BUG();\n 53 return NULL;\n\nAll the above panics are original from cached_dev_cache_miss() by the\noversized parameter \u0027sectors\u0027.\n\nInside cached_dev_cache_miss(), parameter \u0027sectors\u0027 is used to calculate\nthe size of data read from backing device for the cache missing. This\nsize is stored in s-\u003einsert_bio_sectors by the following lines of code,\n[code block 4]\n 909 s-\u003einsert_bio_sectors = min(sectors, bio_sectors(bio) + reada);\n\nThen the actual key inserting to the internal B+ tree is generated and\nstored in s-\u003eiop.replace_key by the following lines of code,\n[code block 5]\n 911 s-\u003eiop.replace_key = KEY(s-\u003eiop.inode,\n 912 bio-\u003ebi_iter.bi_sector + s-\u003einsert_bio_sectors,\n 913 s-\u003einsert_bio_sectors);\nThe oversized parameter \u0027sectors\u0027 may trigger panic 1) by BUG_ON() from\nthe above code block.\n\nAnd the bio sending to backing device for the missing data is allocated\nwith hint from s-\u003einsert_bio_sectors by the following lines of code,\n[code block 6]\n 926 cache_bio = bio_alloc_bioset(GFP_NOWAIT,\n 927 DIV_ROUND_UP(s-\u003einsert_bio_sectors, PAGE_SECTORS),\n 928 \u0026dc-\u003edisk.bio_split);\nThe oversized parameter \u0027sectors\u0027 may trigger panic 2) by BUG() from the\nagove code block.\n\nNow let me explain how the panics happen with the oversized \u0027sectors\u0027.\nIn code block 5, replace_key is generated by macro KEY(). From the\ndefinition of macro KEY(),\n[code block 7]\n 71 #define KEY(inode, offset, size) \\\n 72 ((struct bkey) { \\\n 73 .high = (1ULL \u003c\u003c 63) | ((__u64) (size) \u003c\u003c 20) | (inode), \\\n 74 .low = (offset) \\\n 75 })\n\nHere \u0027size\u0027 is 16bits width embedded in 64bits member \u0027high\u0027 of struct\nbkey. But in code block 1, if \"KEY_START(k) - bio-\u003ebi_iter.bi_sector\" is\nvery probably to be larger than (1\u003c\u003c16) - 1, which makes the bkey size\ncalculation in code block 5 is overflowed. In one bug report the value\nof parameter \u0027sectors\u0027 is 131072 (= 1 \u003c\u003c 17), the overflowed \u0027sectors\u0027\nresults the overflowed s-\u003einsert_bio_sectors in code block 4, then makes\nsize field of s-\u003eiop.replace_key to be 0 in code block 5. Then the 0-\nsized s-\u003eiop.replace_key is inserted into the internal B+ tree as cache\nmissing check key (a special key to detect and avoid a racing between\nnormal write request and cache missing read request) as,\n[code block 8]\n 915 ret = bch_btree_insert_check_key(b, \u0026s-\u003eop, \u0026s-\u003eiop.replace_key);\n\nThen the 0-sized s-\u003eiop.replace_key as 3rd parameter triggers the bkey\nsize check BUG_ON() in code block 2, and causes the kernel panic 1).\n\nAnother ke\n---truncated---",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47275",
"url": "https://www.suse.com/security/cve/CVE-2021-47275"
},
{
"category": "external",
"summary": "SUSE Bug 1224965 for CVE-2021-47275",
"url": "https://bugzilla.suse.com/1224965"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-14T07:24:46Z",
"details": "moderate"
}
],
"title": "CVE-2021-47275"
},
{
"cve": "CVE-2021-47295",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47295"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: sched: fix memory leak in tcindex_partial_destroy_work\n\nSyzbot reported memory leak in tcindex_set_parms(). The problem was in\nnon-freed perfect hash in tcindex_partial_destroy_work().\n\nIn tcindex_set_parms() new tcindex_data is allocated and some fields from\nold one are copied to new one, but not the perfect hash. Since\ntcindex_partial_destroy_work() is the destroy function for old\ntcindex_data, we need to free perfect hash to avoid memory leak.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47295",
"url": "https://www.suse.com/security/cve/CVE-2021-47295"
},
{
"category": "external",
"summary": "SUSE Bug 1224975 for CVE-2021-47295",
"url": "https://bugzilla.suse.com/1224975"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-14T07:24:46Z",
"details": "moderate"
}
],
"title": "CVE-2021-47295"
},
{
"cve": "CVE-2021-47388",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47388"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmac80211: fix use-after-free in CCMP/GCMP RX\n\nWhen PN checking is done in mac80211, for fragmentation we need\nto copy the PN to the RX struct so we can later use it to do a\ncomparison, since commit bf30ca922a0c (\"mac80211: check defrag\nPN against current frame\").\n\nUnfortunately, in that commit I used the \u0027hdr\u0027 variable without\nit being necessarily valid, so use-after-free could occur if it\nwas necessary to reallocate (parts of) the frame.\n\nFix this by reloading the variable after the code that results\nin the reallocations, if any.\n\nThis fixes https://bugzilla.kernel.org/show_bug.cgi?id=214401.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47388",
"url": "https://www.suse.com/security/cve/CVE-2021-47388"
},
{
"category": "external",
"summary": "SUSE Bug 1225214 for CVE-2021-47388",
"url": "https://bugzilla.suse.com/1225214"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-14T07:24:46Z",
"details": "moderate"
}
],
"title": "CVE-2021-47388"
},
{
"cve": "CVE-2021-47395",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47395"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmac80211: limit injected vht mcs/nss in ieee80211_parse_tx_radiotap\n\nLimit max values for vht mcs and nss in ieee80211_parse_tx_radiotap\nroutine in order to fix the following warning reported by syzbot:\n\nWARNING: CPU: 0 PID: 10717 at include/net/mac80211.h:989 ieee80211_rate_set_vht include/net/mac80211.h:989 [inline]\nWARNING: CPU: 0 PID: 10717 at include/net/mac80211.h:989 ieee80211_parse_tx_radiotap+0x101e/0x12d0 net/mac80211/tx.c:2244\nModules linked in:\nCPU: 0 PID: 10717 Comm: syz-executor.5 Not tainted 5.14.0-syzkaller #0\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011\nRIP: 0010:ieee80211_rate_set_vht include/net/mac80211.h:989 [inline]\nRIP: 0010:ieee80211_parse_tx_radiotap+0x101e/0x12d0 net/mac80211/tx.c:2244\nRSP: 0018:ffffc9000186f3e8 EFLAGS: 00010216\nRAX: 0000000000000618 RBX: ffff88804ef76500 RCX: ffffc900143a5000\nRDX: 0000000000040000 RSI: ffffffff888f478e RDI: 0000000000000003\nRBP: 00000000ffffffff R08: 0000000000000000 R09: 0000000000000100\nR10: ffffffff888f46f9 R11: 0000000000000000 R12: 00000000fffffff8\nR13: ffff88804ef7653c R14: 0000000000000001 R15: 0000000000000004\nFS: 00007fbf5718f700(0000) GS:ffff8880b9c00000(0000) knlGS:0000000000000000\nCS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 0000001b2de23000 CR3: 000000006a671000 CR4: 00000000001506f0\nDR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\nDR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000600\nCall Trace:\n ieee80211_monitor_select_queue+0xa6/0x250 net/mac80211/iface.c:740\n netdev_core_pick_tx+0x169/0x2e0 net/core/dev.c:4089\n __dev_queue_xmit+0x6f9/0x3710 net/core/dev.c:4165\n __bpf_tx_skb net/core/filter.c:2114 [inline]\n __bpf_redirect_no_mac net/core/filter.c:2139 [inline]\n __bpf_redirect+0x5ba/0xd20 net/core/filter.c:2162\n ____bpf_clone_redirect net/core/filter.c:2429 [inline]\n bpf_clone_redirect+0x2ae/0x420 net/core/filter.c:2401\n bpf_prog_eeb6f53a69e5c6a2+0x59/0x234\n bpf_dispatcher_nop_func include/linux/bpf.h:717 [inline]\n __bpf_prog_run include/linux/filter.h:624 [inline]\n bpf_prog_run include/linux/filter.h:631 [inline]\n bpf_test_run+0x381/0xa30 net/bpf/test_run.c:119\n bpf_prog_test_run_skb+0xb84/0x1ee0 net/bpf/test_run.c:663\n bpf_prog_test_run kernel/bpf/syscall.c:3307 [inline]\n __sys_bpf+0x2137/0x5df0 kernel/bpf/syscall.c:4605\n __do_sys_bpf kernel/bpf/syscall.c:4691 [inline]\n __se_sys_bpf kernel/bpf/syscall.c:4689 [inline]\n __x64_sys_bpf+0x75/0xb0 kernel/bpf/syscall.c:4689\n do_syscall_x64 arch/x86/entry/common.c:50 [inline]\n do_syscall_64+0x35/0xb0 arch/x86/entry/common.c:80\n entry_SYSCALL_64_after_hwframe+0x44/0xae\nRIP: 0033:0x4665f9",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47395",
"url": "https://www.suse.com/security/cve/CVE-2021-47395"
},
{
"category": "external",
"summary": "SUSE Bug 1225326 for CVE-2021-47395",
"url": "https://bugzilla.suse.com/1225326"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-14T07:24:46Z",
"details": "moderate"
}
],
"title": "CVE-2021-47395"
},
{
"cve": "CVE-2021-47399",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47399"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nixgbe: Fix NULL pointer dereference in ixgbe_xdp_setup\n\nThe ixgbe driver currently generates a NULL pointer dereference with\nsome machine (online cpus \u003c 63). This is due to the fact that the\nmaximum value of num_xdp_queues is nr_cpu_ids. Code is in\n\"ixgbe_set_rss_queues\"\".\n\nHere\u0027s how the problem repeats itself:\nSome machine (online cpus \u003c 63), And user set num_queues to 63 through\nethtool. Code is in the \"ixgbe_set_channels\",\n\tadapter-\u003ering_feature[RING_F_FDIR].limit = count;\n\nIt becomes 63.\n\nWhen user use xdp, \"ixgbe_set_rss_queues\" will set queues num.\n\tadapter-\u003enum_rx_queues = rss_i;\n\tadapter-\u003enum_tx_queues = rss_i;\n\tadapter-\u003enum_xdp_queues = ixgbe_xdp_queues(adapter);\n\nAnd rss_i\u0027s value is from\n\tf = \u0026adapter-\u003ering_feature[RING_F_FDIR];\n\trss_i = f-\u003eindices = f-\u003elimit;\n\nSo \"num_rx_queues\" \u003e \"num_xdp_queues\", when run to \"ixgbe_xdp_setup\",\n\tfor (i = 0; i \u003c adapter-\u003enum_rx_queues; i++)\n\t\tif (adapter-\u003exdp_ring[i]-\u003exsk_umem)\n\nIt leads to panic.\n\nCall trace:\n[exception RIP: ixgbe_xdp+368]\nRIP: ffffffffc02a76a0 RSP: ffff9fe16202f8d0 RFLAGS: 00010297\nRAX: 0000000000000000 RBX: 0000000000000020 RCX: 0000000000000000\nRDX: 0000000000000000 RSI: 000000000000001c RDI: ffffffffa94ead90\nRBP: ffff92f8f24c0c18 R8: 0000000000000000 R9: 0000000000000000\nR10: ffff9fe16202f830 R11: 0000000000000000 R12: ffff92f8f24c0000\nR13: ffff9fe16202fc01 R14: 000000000000000a R15: ffffffffc02a7530\nORIG_RAX: ffffffffffffffff CS: 0010 SS: 0018\n 7 [ffff9fe16202f8f0] dev_xdp_install at ffffffffa89fbbcc\n 8 [ffff9fe16202f920] dev_change_xdp_fd at ffffffffa8a08808\n 9 [ffff9fe16202f960] do_setlink at ffffffffa8a20235\n10 [ffff9fe16202fa88] rtnl_setlink at ffffffffa8a20384\n11 [ffff9fe16202fc78] rtnetlink_rcv_msg at ffffffffa8a1a8dd\n12 [ffff9fe16202fcf0] netlink_rcv_skb at ffffffffa8a717eb\n13 [ffff9fe16202fd40] netlink_unicast at ffffffffa8a70f88\n14 [ffff9fe16202fd80] netlink_sendmsg at ffffffffa8a71319\n15 [ffff9fe16202fdf0] sock_sendmsg at ffffffffa89df290\n16 [ffff9fe16202fe08] __sys_sendto at ffffffffa89e19c8\n17 [ffff9fe16202ff30] __x64_sys_sendto at ffffffffa89e1a64\n18 [ffff9fe16202ff38] do_syscall_64 at ffffffffa84042b9\n19 [ffff9fe16202ff50] entry_SYSCALL_64_after_hwframe at ffffffffa8c0008c\n\nSo I fix ixgbe_max_channels so that it will not allow a setting of queues\nto be higher than the num_online_cpus(). And when run to ixgbe_xdp_setup,\ntake the smaller value of num_rx_queues and num_xdp_queues.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47399",
"url": "https://www.suse.com/security/cve/CVE-2021-47399"
},
{
"category": "external",
"summary": "SUSE Bug 1225328 for CVE-2021-47399",
"url": "https://bugzilla.suse.com/1225328"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-14T07:24:46Z",
"details": "moderate"
}
],
"title": "CVE-2021-47399"
},
{
"cve": "CVE-2021-47403",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47403"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nipack: ipoctal: fix module reference leak\n\nA reference to the carrier module was taken on every open but was only\nreleased once when the final reference to the tty struct was dropped.\n\nFix this by taking the module reference and initialising the tty driver\ndata when installing the tty.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47403",
"url": "https://www.suse.com/security/cve/CVE-2021-47403"
},
{
"category": "external",
"summary": "SUSE Bug 1225241 for CVE-2021-47403",
"url": "https://bugzilla.suse.com/1225241"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-14T07:24:46Z",
"details": "moderate"
}
],
"title": "CVE-2021-47403"
},
{
"cve": "CVE-2021-47405",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47405"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nHID: usbhid: free raw_report buffers in usbhid_stop\n\nFree the unsent raw_report buffers when the device is removed.\n\nFixes a memory leak reported by syzbot at:\nhttps://syzkaller.appspot.com/bug?id=7b4fa7cb1a7c2d3342a2a8a6c53371c8c418ab47",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47405",
"url": "https://www.suse.com/security/cve/CVE-2021-47405"
},
{
"category": "external",
"summary": "SUSE Bug 1225238 for CVE-2021-47405",
"url": "https://bugzilla.suse.com/1225238"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-14T07:24:46Z",
"details": "moderate"
}
],
"title": "CVE-2021-47405"
},
{
"cve": "CVE-2021-47438",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47438"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/mlx5e: Fix memory leak in mlx5_core_destroy_cq() error path\n\nPrior to this patch in case mlx5_core_destroy_cq() failed it returns\nwithout completing all destroy operations and that leads to memory leak.\nInstead, complete the destroy flow before return error.\n\nAlso move mlx5_debug_cq_remove() to the beginning of mlx5_core_destroy_cq()\nto be symmetrical with mlx5_core_create_cq().\n\nkmemleak complains on:\n\nunreferenced object 0xc000000038625100 (size 64):\n comm \"ethtool\", pid 28301, jiffies 4298062946 (age 785.380s)\n hex dump (first 32 bytes):\n 60 01 48 94 00 00 00 c0 b8 05 34 c3 00 00 00 c0 `.H.......4.....\n 02 00 00 00 00 00 00 00 00 db 7d c1 00 00 00 c0 ..........}.....\n backtrace:\n [\u003c000000009e8643cb\u003e] add_res_tree+0xd0/0x270 [mlx5_core]\n [\u003c00000000e7cb8e6c\u003e] mlx5_debug_cq_add+0x5c/0xc0 [mlx5_core]\n [\u003c000000002a12918f\u003e] mlx5_core_create_cq+0x1d0/0x2d0 [mlx5_core]\n [\u003c00000000cef0a696\u003e] mlx5e_create_cq+0x210/0x3f0 [mlx5_core]\n [\u003c000000009c642c26\u003e] mlx5e_open_cq+0xb4/0x130 [mlx5_core]\n [\u003c0000000058dfa578\u003e] mlx5e_ptp_open+0x7f4/0xe10 [mlx5_core]\n [\u003c0000000081839561\u003e] mlx5e_open_channels+0x9cc/0x13e0 [mlx5_core]\n [\u003c0000000009cf05d4\u003e] mlx5e_switch_priv_channels+0xa4/0x230\n[mlx5_core]\n [\u003c0000000042bbedd8\u003e] mlx5e_safe_switch_params+0x14c/0x300\n[mlx5_core]\n [\u003c0000000004bc9db8\u003e] set_pflag_tx_port_ts+0x9c/0x160 [mlx5_core]\n [\u003c00000000a0553443\u003e] mlx5e_set_priv_flags+0xd0/0x1b0 [mlx5_core]\n [\u003c00000000a8f3d84b\u003e] ethnl_set_privflags+0x234/0x2d0\n [\u003c00000000fd27f27c\u003e] genl_family_rcv_msg_doit+0x108/0x1d0\n [\u003c00000000f495e2bb\u003e] genl_family_rcv_msg+0xe4/0x1f0\n [\u003c00000000646c5c2c\u003e] genl_rcv_msg+0x78/0x120\n [\u003c00000000d53e384e\u003e] netlink_rcv_skb+0x74/0x1a0",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47438",
"url": "https://www.suse.com/security/cve/CVE-2021-47438"
},
{
"category": "external",
"summary": "SUSE Bug 1225229 for CVE-2021-47438",
"url": "https://bugzilla.suse.com/1225229"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-14T07:24:46Z",
"details": "moderate"
}
],
"title": "CVE-2021-47438"
},
{
"cve": "CVE-2021-47441",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47441"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmlxsw: thermal: Fix out-of-bounds memory accesses\n\nCurrently, mlxsw allows cooling states to be set above the maximum\ncooling state supported by the driver:\n\n # cat /sys/class/thermal/thermal_zone2/cdev0/type\n mlxsw_fan\n # cat /sys/class/thermal/thermal_zone2/cdev0/max_state\n 10\n # echo 18 \u003e /sys/class/thermal/thermal_zone2/cdev0/cur_state\n # echo $?\n 0\n\nThis results in out-of-bounds memory accesses when thermal state\ntransition statistics are enabled (CONFIG_THERMAL_STATISTICS=y), as the\ntransition table is accessed with a too large index (state) [1].\n\nAccording to the thermal maintainer, it is the responsibility of the\ndriver to reject such operations [2].\n\nTherefore, return an error when the state to be set exceeds the maximum\ncooling state supported by the driver.\n\nTo avoid dead code, as suggested by the thermal maintainer [3],\npartially revert commit a421ce088ac8 (\"mlxsw: core: Extend cooling\ndevice with cooling levels\") that tried to interpret these invalid\ncooling states (above the maximum) in a special way. The cooling levels\narray is not removed in order to prevent the fans going below 20% PWM,\nwhich would cause them to get stuck at 0% PWM.\n\n[1]\nBUG: KASAN: slab-out-of-bounds in thermal_cooling_device_stats_update+0x271/0x290\nRead of size 4 at addr ffff8881052f7bf8 by task kworker/0:0/5\n\nCPU: 0 PID: 5 Comm: kworker/0:0 Not tainted 5.15.0-rc3-custom-45935-gce1adf704b14 #122\nHardware name: Mellanox Technologies Ltd. \"MSN2410-CB2FO\"/\"SA000874\", BIOS 4.6.5 03/08/2016\nWorkqueue: events_freezable_power_ thermal_zone_device_check\nCall Trace:\n dump_stack_lvl+0x8b/0xb3\n print_address_description.constprop.0+0x1f/0x140\n kasan_report.cold+0x7f/0x11b\n thermal_cooling_device_stats_update+0x271/0x290\n __thermal_cdev_update+0x15e/0x4e0\n thermal_cdev_update+0x9f/0xe0\n step_wise_throttle+0x770/0xee0\n thermal_zone_device_update+0x3f6/0xdf0\n process_one_work+0xa42/0x1770\n worker_thread+0x62f/0x13e0\n kthread+0x3ee/0x4e0\n ret_from_fork+0x1f/0x30\n\nAllocated by task 1:\n kasan_save_stack+0x1b/0x40\n __kasan_kmalloc+0x7c/0x90\n thermal_cooling_device_setup_sysfs+0x153/0x2c0\n __thermal_cooling_device_register.part.0+0x25b/0x9c0\n thermal_cooling_device_register+0xb3/0x100\n mlxsw_thermal_init+0x5c5/0x7e0\n __mlxsw_core_bus_device_register+0xcb3/0x19c0\n mlxsw_core_bus_device_register+0x56/0xb0\n mlxsw_pci_probe+0x54f/0x710\n local_pci_probe+0xc6/0x170\n pci_device_probe+0x2b2/0x4d0\n really_probe+0x293/0xd10\n __driver_probe_device+0x2af/0x440\n driver_probe_device+0x51/0x1e0\n __driver_attach+0x21b/0x530\n bus_for_each_dev+0x14c/0x1d0\n bus_add_driver+0x3ac/0x650\n driver_register+0x241/0x3d0\n mlxsw_sp_module_init+0xa2/0x174\n do_one_initcall+0xee/0x5f0\n kernel_init_freeable+0x45a/0x4de\n kernel_init+0x1f/0x210\n ret_from_fork+0x1f/0x30\n\nThe buggy address belongs to the object at ffff8881052f7800\n which belongs to the cache kmalloc-1k of size 1024\nThe buggy address is located 1016 bytes inside of\n 1024-byte region [ffff8881052f7800, ffff8881052f7c00)\nThe buggy address belongs to the page:\npage:0000000052355272 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1052f0\nhead:0000000052355272 order:3 compound_mapcount:0 compound_pincount:0\nflags: 0x200000000010200(slab|head|node=0|zone=2)\nraw: 0200000000010200 ffffea0005034800 0000000300000003 ffff888100041dc0\nraw: 0000000000000000 0000000000100010 00000001ffffffff 0000000000000000\npage dumped because: kasan: bad access detected\n\nMemory state around the buggy address:\n ffff8881052f7a80: 00 00 00 00 00 00 04 fc fc fc fc fc fc fc fc fc\n ffff8881052f7b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n\u003effff8881052f7b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n ^\n ffff8881052f7c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n ffff8881052f7c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n\n[2] https://lore.kernel.org/linux-pm/9aca37cb-1629-5c67-\n---truncated---",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47441",
"url": "https://www.suse.com/security/cve/CVE-2021-47441"
},
{
"category": "external",
"summary": "SUSE Bug 1225224 for CVE-2021-47441",
"url": "https://bugzilla.suse.com/1225224"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-14T07:24:46Z",
"details": "moderate"
}
],
"title": "CVE-2021-47441"
},
{
"cve": "CVE-2021-47468",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47468"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nisdn: mISDN: Fix sleeping function called from invalid context\n\nThe driver can call card-\u003eisac.release() function from an atomic\ncontext.\n\nFix this by calling this function after releasing the lock.\n\nThe following log reveals it:\n\n[ 44.168226 ] BUG: sleeping function called from invalid context at kernel/workqueue.c:3018\n[ 44.168941 ] in_atomic(): 1, irqs_disabled(): 1, non_block: 0, pid: 5475, name: modprobe\n[ 44.169574 ] INFO: lockdep is turned off.\n[ 44.169899 ] irq event stamp: 0\n[ 44.170160 ] hardirqs last enabled at (0): [\u003c0000000000000000\u003e] 0x0\n[ 44.170627 ] hardirqs last disabled at (0): [\u003cffffffff814209ed\u003e] copy_process+0x132d/0x3e00\n[ 44.171240 ] softirqs last enabled at (0): [\u003cffffffff81420a1a\u003e] copy_process+0x135a/0x3e00\n[ 44.171852 ] softirqs last disabled at (0): [\u003c0000000000000000\u003e] 0x0\n[ 44.172318 ] Preemption disabled at:\n[ 44.172320 ] [\u003cffffffffa009b0a9\u003e] nj_release+0x69/0x500 [netjet]\n[ 44.174441 ] Call Trace:\n[ 44.174630 ] dump_stack_lvl+0xa8/0xd1\n[ 44.174912 ] dump_stack+0x15/0x17\n[ 44.175166 ] ___might_sleep+0x3a2/0x510\n[ 44.175459 ] ? nj_release+0x69/0x500 [netjet]\n[ 44.175791 ] __might_sleep+0x82/0xe0\n[ 44.176063 ] ? start_flush_work+0x20/0x7b0\n[ 44.176375 ] start_flush_work+0x33/0x7b0\n[ 44.176672 ] ? trace_irq_enable_rcuidle+0x85/0x170\n[ 44.177034 ] ? kasan_quarantine_put+0xaa/0x1f0\n[ 44.177372 ] ? kasan_quarantine_put+0xaa/0x1f0\n[ 44.177711 ] __flush_work+0x11a/0x1a0\n[ 44.177991 ] ? flush_work+0x20/0x20\n[ 44.178257 ] ? lock_release+0x13c/0x8f0\n[ 44.178550 ] ? __kasan_check_write+0x14/0x20\n[ 44.178872 ] ? do_raw_spin_lock+0x148/0x360\n[ 44.179187 ] ? read_lock_is_recursive+0x20/0x20\n[ 44.179530 ] ? __kasan_check_read+0x11/0x20\n[ 44.179846 ] ? do_raw_spin_unlock+0x55/0x900\n[ 44.180168 ] ? ____kasan_slab_free+0x116/0x140\n[ 44.180505 ] ? _raw_spin_unlock_irqrestore+0x41/0x60\n[ 44.180878 ] ? skb_queue_purge+0x1a3/0x1c0\n[ 44.181189 ] ? kfree+0x13e/0x290\n[ 44.181438 ] flush_work+0x17/0x20\n[ 44.181695 ] mISDN_freedchannel+0xe8/0x100\n[ 44.182006 ] isac_release+0x210/0x260 [mISDNipac]\n[ 44.182366 ] nj_release+0xf6/0x500 [netjet]\n[ 44.182685 ] nj_remove+0x48/0x70 [netjet]\n[ 44.182989 ] pci_device_remove+0xa9/0x250",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47468",
"url": "https://www.suse.com/security/cve/CVE-2021-47468"
},
{
"category": "external",
"summary": "SUSE Bug 1225346 for CVE-2021-47468",
"url": "https://bugzilla.suse.com/1225346"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-14T07:24:46Z",
"details": "moderate"
}
],
"title": "CVE-2021-47468"
},
{
"cve": "CVE-2021-47498",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47498"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndm rq: don\u0027t queue request to blk-mq during DM suspend\n\nDM uses blk-mq\u0027s quiesce/unquiesce to stop/start device mapper queue.\n\nBut blk-mq\u0027s unquiesce may come from outside events, such as elevator\nswitch, updating nr_requests or others, and request may come during\nsuspend, so simply ask for blk-mq to requeue it.\n\nFixes one kernel panic issue when running updating nr_requests and\ndm-mpath suspend/resume stress test.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47498",
"url": "https://www.suse.com/security/cve/CVE-2021-47498"
},
{
"category": "external",
"summary": "SUSE Bug 1225357 for CVE-2021-47498",
"url": "https://bugzilla.suse.com/1225357"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-14T07:24:46Z",
"details": "moderate"
}
],
"title": "CVE-2021-47498"
},
{
"cve": "CVE-2021-47501",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47501"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ni40e: Fix NULL pointer dereference in i40e_dbg_dump_desc\n\nWhen trying to dump VFs VSI RX/TX descriptors\nusing debugfs there was a crash\ndue to NULL pointer dereference in i40e_dbg_dump_desc.\nAdded a check to i40e_dbg_dump_desc that checks if\nVSI type is correct for dumping RX/TX descriptors.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47501",
"url": "https://www.suse.com/security/cve/CVE-2021-47501"
},
{
"category": "external",
"summary": "SUSE Bug 1225361 for CVE-2021-47501",
"url": "https://bugzilla.suse.com/1225361"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-14T07:24:46Z",
"details": "moderate"
}
],
"title": "CVE-2021-47501"
},
{
"cve": "CVE-2021-47516",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47516"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnfp: Fix memory leak in nfp_cpp_area_cache_add()\n\nIn line 800 (#1), nfp_cpp_area_alloc() allocates and initializes a\nCPP area structure. But in line 807 (#2), when the cache is allocated\nfailed, this CPP area structure is not freed, which will result in\nmemory leak.\n\nWe can fix it by freeing the CPP area when the cache is allocated\nfailed (#2).\n\n792 int nfp_cpp_area_cache_add(struct nfp_cpp *cpp, size_t size)\n793 {\n794 \tstruct nfp_cpp_area_cache *cache;\n795 \tstruct nfp_cpp_area *area;\n\n800\tarea = nfp_cpp_area_alloc(cpp, NFP_CPP_ID(7, NFP_CPP_ACTION_RW, 0),\n801 \t\t\t\t 0, size);\n\t// #1: allocates and initializes\n\n802 \tif (!area)\n803 \t\treturn -ENOMEM;\n\n805 \tcache = kzalloc(sizeof(*cache), GFP_KERNEL);\n806 \tif (!cache)\n807 \t\treturn -ENOMEM; // #2: missing free\n\n817\treturn 0;\n818 }",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47516",
"url": "https://www.suse.com/security/cve/CVE-2021-47516"
},
{
"category": "external",
"summary": "SUSE Bug 1225427 for CVE-2021-47516",
"url": "https://bugzilla.suse.com/1225427"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-14T07:24:46Z",
"details": "low"
}
],
"title": "CVE-2021-47516"
},
{
"cve": "CVE-2021-47520",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47520"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncan: pch_can: pch_can_rx_normal: fix use after free\n\nAfter calling netif_receive_skb(skb), dereferencing skb is unsafe.\nEspecially, the can_frame cf which aliases skb memory is dereferenced\njust after the call netif_receive_skb(skb).\n\nReordering the lines solves the issue.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47520",
"url": "https://www.suse.com/security/cve/CVE-2021-47520"
},
{
"category": "external",
"summary": "SUSE Bug 1225431 for CVE-2021-47520",
"url": "https://bugzilla.suse.com/1225431"
},
{
"category": "external",
"summary": "SUSE Bug 1227905 for CVE-2021-47520",
"url": "https://bugzilla.suse.com/1227905"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-14T07:24:46Z",
"details": "important"
}
],
"title": "CVE-2021-47520"
},
{
"cve": "CVE-2021-47542",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47542"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: qlogic: qlcnic: Fix a NULL pointer dereference in qlcnic_83xx_add_rings()\n\nIn qlcnic_83xx_add_rings(), the indirect function of\nahw-\u003ehw_ops-\u003ealloc_mbx_args will be called to allocate memory for\ncmd.req.arg, and there is a dereference of it in qlcnic_83xx_add_rings(),\nwhich could lead to a NULL pointer dereference on failure of the\nindirect function like qlcnic_83xx_alloc_mbx_args().\n\nFix this bug by adding a check of alloc_mbx_args(), this patch\nimitates the logic of mbx_cmd()\u0027s failure handling.\n\nThis bug was found by a static analyzer. The analysis employs\ndifferential checking to identify inconsistent security operations\n(e.g., checks or kfrees) between two code paths and confirms that the\ninconsistent operations are not recovered in the current function or\nthe callers, so they constitute bugs.\n\nNote that, as a bug found by static analysis, it can be a false\npositive or hard to trigger. Multiple researchers have cross-reviewed\nthe bug.\n\nBuilds with CONFIG_QLCNIC=m show no new warnings, and our\nstatic analyzer no longer warns about this code.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47542",
"url": "https://www.suse.com/security/cve/CVE-2021-47542"
},
{
"category": "external",
"summary": "SUSE Bug 1225455 for CVE-2021-47542",
"url": "https://bugzilla.suse.com/1225455"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-14T07:24:46Z",
"details": "moderate"
}
],
"title": "CVE-2021-47542"
},
{
"cve": "CVE-2021-47547",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47547"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: tulip: de4x5: fix the problem that the array \u0027lp-\u003ephy[8]\u0027 may be out of bound\n\nIn line 5001, if all id in the array \u0027lp-\u003ephy[8]\u0027 is not 0, when the\n\u0027for\u0027 end, the \u0027k\u0027 is 8.\n\nAt this time, the array \u0027lp-\u003ephy[8]\u0027 may be out of bound.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47547",
"url": "https://www.suse.com/security/cve/CVE-2021-47547"
},
{
"category": "external",
"summary": "SUSE Bug 1225505 for CVE-2021-47547",
"url": "https://bugzilla.suse.com/1225505"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-14T07:24:46Z",
"details": "moderate"
}
],
"title": "CVE-2021-47547"
},
{
"cve": "CVE-2021-47559",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47559"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/smc: Fix NULL pointer dereferencing in smc_vlan_by_tcpsk()\n\nCoverity reports a possible NULL dereferencing problem:\n\nin smc_vlan_by_tcpsk():\n6. returned_null: netdev_lower_get_next returns NULL (checked 29 out of 30 times).\n7. var_assigned: Assigning: ndev = NULL return value from netdev_lower_get_next.\n1623 ndev = (struct net_device *)netdev_lower_get_next(ndev, \u0026lower);\nCID 1468509 (#1 of 1): Dereference null return value (NULL_RETURNS)\n8. dereference: Dereferencing a pointer that might be NULL ndev when calling is_vlan_dev.\n1624 if (is_vlan_dev(ndev)) {\n\nRemove the manual implementation and use netdev_walk_all_lower_dev() to\niterate over the lower devices. While on it remove an obsolete function\nparameter comment.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47559",
"url": "https://www.suse.com/security/cve/CVE-2021-47559"
},
{
"category": "external",
"summary": "SUSE Bug 1225396 for CVE-2021-47559",
"url": "https://bugzilla.suse.com/1225396"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-14T07:24:46Z",
"details": "moderate"
}
],
"title": "CVE-2021-47559"
},
{
"cve": "CVE-2021-47580",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47580"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: scsi_debug: Fix type in min_t to avoid stack OOB\n\nChange min_t() to use type \"u32\" instead of type \"int\" to avoid stack out\nof bounds. With min_t() type \"int\" the values get sign extended and the\nlarger value gets used causing stack out of bounds.\n\nBUG: KASAN: stack-out-of-bounds in memcpy include/linux/fortify-string.h:191 [inline]\nBUG: KASAN: stack-out-of-bounds in sg_copy_buffer+0x1de/0x240 lib/scatterlist.c:976\nRead of size 127 at addr ffff888072607128 by task syz-executor.7/18707\n\nCPU: 1 PID: 18707 Comm: syz-executor.7 Not tainted 5.15.0-syzk #1\nHardware name: Red Hat KVM, BIOS 1.13.0-2\nCall Trace:\n __dump_stack lib/dump_stack.c:88 [inline]\n dump_stack_lvl+0x89/0xb5 lib/dump_stack.c:106\n print_address_description.constprop.9+0x28/0x160 mm/kasan/report.c:256\n __kasan_report mm/kasan/report.c:442 [inline]\n kasan_report.cold.14+0x7d/0x117 mm/kasan/report.c:459\n check_region_inline mm/kasan/generic.c:183 [inline]\n kasan_check_range+0x1a3/0x210 mm/kasan/generic.c:189\n memcpy+0x23/0x60 mm/kasan/shadow.c:65\n memcpy include/linux/fortify-string.h:191 [inline]\n sg_copy_buffer+0x1de/0x240 lib/scatterlist.c:976\n sg_copy_from_buffer+0x33/0x40 lib/scatterlist.c:1000\n fill_from_dev_buffer.part.34+0x82/0x130 drivers/scsi/scsi_debug.c:1162\n fill_from_dev_buffer drivers/scsi/scsi_debug.c:1888 [inline]\n resp_readcap16+0x365/0x3b0 drivers/scsi/scsi_debug.c:1887\n schedule_resp+0x4d8/0x1a70 drivers/scsi/scsi_debug.c:5478\n scsi_debug_queuecommand+0x8c9/0x1ec0 drivers/scsi/scsi_debug.c:7533\n scsi_dispatch_cmd drivers/scsi/scsi_lib.c:1520 [inline]\n scsi_queue_rq+0x16b0/0x2d40 drivers/scsi/scsi_lib.c:1699\n blk_mq_dispatch_rq_list+0xb9b/0x2700 block/blk-mq.c:1639\n __blk_mq_sched_dispatch_requests+0x28f/0x590 block/blk-mq-sched.c:325\n blk_mq_sched_dispatch_requests+0x105/0x190 block/blk-mq-sched.c:358\n __blk_mq_run_hw_queue+0xe5/0x150 block/blk-mq.c:1761\n __blk_mq_delay_run_hw_queue+0x4f8/0x5c0 block/blk-mq.c:1838\n blk_mq_run_hw_queue+0x18d/0x350 block/blk-mq.c:1891\n blk_mq_sched_insert_request+0x3db/0x4e0 block/blk-mq-sched.c:474\n blk_execute_rq_nowait+0x16b/0x1c0 block/blk-exec.c:62\n sg_common_write.isra.18+0xeb3/0x2000 drivers/scsi/sg.c:836\n sg_new_write.isra.19+0x570/0x8c0 drivers/scsi/sg.c:774\n sg_ioctl_common+0x14d6/0x2710 drivers/scsi/sg.c:939\n sg_ioctl+0xa2/0x180 drivers/scsi/sg.c:1165\n vfs_ioctl fs/ioctl.c:51 [inline]\n __do_sys_ioctl fs/ioctl.c:874 [inline]\n __se_sys_ioctl fs/ioctl.c:860 [inline]\n __x64_sys_ioctl+0x19d/0x220 fs/ioctl.c:860\n do_syscall_x64 arch/x86/entry/common.c:50 [inline]\n do_syscall_64+0x3a/0x80 arch/x86/entry/common.c:80\n entry_SYSCALL_64_after_hwframe+0x44/0xae",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47580",
"url": "https://www.suse.com/security/cve/CVE-2021-47580"
},
{
"category": "external",
"summary": "SUSE Bug 1226550 for CVE-2021-47580",
"url": "https://bugzilla.suse.com/1226550"
},
{
"category": "external",
"summary": "SUSE Bug 1227611 for CVE-2021-47580",
"url": "https://bugzilla.suse.com/1227611"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-14T07:24:46Z",
"details": "moderate"
}
],
"title": "CVE-2021-47580"
},
{
"cve": "CVE-2021-47582",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47582"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nUSB: core: Make do_proc_control() and do_proc_bulk() killable\n\nThe USBDEVFS_CONTROL and USBDEVFS_BULK ioctls invoke\nusb_start_wait_urb(), which contains an uninterruptible wait with a\nuser-specified timeout value. If timeout value is very large and the\ndevice being accessed does not respond in a reasonable amount of time,\nthe kernel will complain about \"Task X blocked for more than N\nseconds\", as found in testing by syzbot:\n\nINFO: task syz-executor.0:8700 blocked for more than 143 seconds.\n Not tainted 5.14.0-rc7-syzkaller #0\n\"echo 0 \u003e /proc/sys/kernel/hung_task_timeout_secs\" disables this message.\ntask:syz-executor.0 state:D stack:23192 pid: 8700 ppid: 8455 flags:0x00004004\nCall Trace:\n context_switch kernel/sched/core.c:4681 [inline]\n __schedule+0xc07/0x11f0 kernel/sched/core.c:5938\n schedule+0x14b/0x210 kernel/sched/core.c:6017\n schedule_timeout+0x98/0x2f0 kernel/time/timer.c:1857\n do_wait_for_common+0x2da/0x480 kernel/sched/completion.c:85\n __wait_for_common kernel/sched/completion.c:106 [inline]\n wait_for_common kernel/sched/completion.c:117 [inline]\n wait_for_completion_timeout+0x46/0x60 kernel/sched/completion.c:157\n usb_start_wait_urb+0x167/0x550 drivers/usb/core/message.c:63\n do_proc_bulk+0x978/0x1080 drivers/usb/core/devio.c:1236\n proc_bulk drivers/usb/core/devio.c:1273 [inline]\n usbdev_do_ioctl drivers/usb/core/devio.c:2547 [inline]\n usbdev_ioctl+0x3441/0x6b10 drivers/usb/core/devio.c:2713\n...\n\nTo fix this problem, this patch replaces usbfs\u0027s calls to\nusb_control_msg() and usb_bulk_msg() with special-purpose code that\ndoes essentially the same thing (as recommended in the comment for\nusb_start_wait_urb()), except that it always uses a killable wait and\nit uses GFP_KERNEL rather than GFP_NOIO.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47582",
"url": "https://www.suse.com/security/cve/CVE-2021-47582"
},
{
"category": "external",
"summary": "SUSE Bug 1226559 for CVE-2021-47582",
"url": "https://bugzilla.suse.com/1226559"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-14T07:24:46Z",
"details": "moderate"
}
],
"title": "CVE-2021-47582"
},
{
"cve": "CVE-2021-47588",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47588"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsit: do not call ipip6_dev_free() from sit_init_net()\n\nipip6_dev_free is sit dev-\u003epriv_destructor, already called\nby register_netdevice() if something goes wrong.\n\nAlternative would be to make ipip6_dev_free() robust against\nmultiple invocations, but other drivers do not implement this\nstrategy.\n\nsyzbot reported:\n\ndst_release underflow\nWARNING: CPU: 0 PID: 5059 at net/core/dst.c:173 dst_release+0xd8/0xe0 net/core/dst.c:173\nModules linked in:\nCPU: 1 PID: 5059 Comm: syz-executor.4 Not tainted 5.16.0-rc5-syzkaller #0\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011\nRIP: 0010:dst_release+0xd8/0xe0 net/core/dst.c:173\nCode: 4c 89 f2 89 d9 31 c0 5b 41 5e 5d e9 da d5 44 f9 e8 1d 90 5f f9 c6 05 87 48 c6 05 01 48 c7 c7 80 44 99 8b 31 c0 e8 e8 67 29 f9 \u003c0f\u003e 0b eb 85 0f 1f 40 00 53 48 89 fb e8 f7 8f 5f f9 48 83 c3 a8 48\nRSP: 0018:ffffc9000aa5faa0 EFLAGS: 00010246\nRAX: d6894a925dd15a00 RBX: 00000000ffffffff RCX: 0000000000040000\nRDX: ffffc90005e19000 RSI: 000000000003ffff RDI: 0000000000040000\nRBP: 0000000000000000 R08: ffffffff816a1f42 R09: ffffed1017344f2c\nR10: ffffed1017344f2c R11: 0000000000000000 R12: 0000607f462b1358\nR13: 1ffffffff1bfd305 R14: ffffe8ffffcb1358 R15: dffffc0000000000\nFS: 00007f66c71a2700(0000) GS:ffff8880b9a00000(0000) knlGS:0000000000000000\nCS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 00007f88aaed5058 CR3: 0000000023e0f000 CR4: 00000000003506f0\nDR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\nDR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\nCall Trace:\n \u003cTASK\u003e\n dst_cache_destroy+0x107/0x1e0 net/core/dst_cache.c:160\n ipip6_dev_free net/ipv6/sit.c:1414 [inline]\n sit_init_net+0x229/0x550 net/ipv6/sit.c:1936\n ops_init+0x313/0x430 net/core/net_namespace.c:140\n setup_net+0x35b/0x9d0 net/core/net_namespace.c:326\n copy_net_ns+0x359/0x5c0 net/core/net_namespace.c:470\n create_new_namespaces+0x4ce/0xa00 kernel/nsproxy.c:110\n unshare_nsproxy_namespaces+0x11e/0x180 kernel/nsproxy.c:226\n ksys_unshare+0x57d/0xb50 kernel/fork.c:3075\n __do_sys_unshare kernel/fork.c:3146 [inline]\n __se_sys_unshare kernel/fork.c:3144 [inline]\n __x64_sys_unshare+0x34/0x40 kernel/fork.c:3144\n do_syscall_x64 arch/x86/entry/common.c:50 [inline]\n do_syscall_64+0x44/0xd0 arch/x86/entry/common.c:80\n entry_SYSCALL_64_after_hwframe+0x44/0xae\nRIP: 0033:0x7f66c882ce99\nCode: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 \u003c48\u003e 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48\nRSP: 002b:00007f66c71a2168 EFLAGS: 00000246 ORIG_RAX: 0000000000000110\nRAX: ffffffffffffffda RBX: 00007f66c893ff60 RCX: 00007f66c882ce99\nRDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000048040200\nRBP: 00007f66c8886ff1 R08: 0000000000000000 R09: 0000000000000000\nR10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000\nR13: 00007fff6634832f R14: 00007f66c71a2300 R15: 0000000000022000\n \u003c/TASK\u003e",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47588",
"url": "https://www.suse.com/security/cve/CVE-2021-47588"
},
{
"category": "external",
"summary": "SUSE Bug 1226568 for CVE-2021-47588",
"url": "https://bugzilla.suse.com/1226568"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-14T07:24:46Z",
"details": "moderate"
}
],
"title": "CVE-2021-47588"
},
{
"cve": "CVE-2021-47597",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47597"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ninet_diag: fix kernel-infoleak for UDP sockets\n\nKMSAN reported a kernel-infoleak [1], that can exploited\nby unpriv users.\n\nAfter analysis it turned out UDP was not initializing\nr-\u003eidiag_expires. Other users of inet_sk_diag_fill()\nmight make the same mistake in the future, so fix this\nin inet_sk_diag_fill().\n\n[1]\nBUG: KMSAN: kernel-infoleak in instrument_copy_to_user include/linux/instrumented.h:121 [inline]\nBUG: KMSAN: kernel-infoleak in copyout lib/iov_iter.c:156 [inline]\nBUG: KMSAN: kernel-infoleak in _copy_to_iter+0x69d/0x25c0 lib/iov_iter.c:670\n instrument_copy_to_user include/linux/instrumented.h:121 [inline]\n copyout lib/iov_iter.c:156 [inline]\n _copy_to_iter+0x69d/0x25c0 lib/iov_iter.c:670\n copy_to_iter include/linux/uio.h:155 [inline]\n simple_copy_to_iter+0xf3/0x140 net/core/datagram.c:519\n __skb_datagram_iter+0x2cb/0x1280 net/core/datagram.c:425\n skb_copy_datagram_iter+0xdc/0x270 net/core/datagram.c:533\n skb_copy_datagram_msg include/linux/skbuff.h:3657 [inline]\n netlink_recvmsg+0x660/0x1c60 net/netlink/af_netlink.c:1974\n sock_recvmsg_nosec net/socket.c:944 [inline]\n sock_recvmsg net/socket.c:962 [inline]\n sock_read_iter+0x5a9/0x630 net/socket.c:1035\n call_read_iter include/linux/fs.h:2156 [inline]\n new_sync_read fs/read_write.c:400 [inline]\n vfs_read+0x1631/0x1980 fs/read_write.c:481\n ksys_read+0x28c/0x520 fs/read_write.c:619\n __do_sys_read fs/read_write.c:629 [inline]\n __se_sys_read fs/read_write.c:627 [inline]\n __x64_sys_read+0xdb/0x120 fs/read_write.c:627\n do_syscall_x64 arch/x86/entry/common.c:51 [inline]\n do_syscall_64+0x54/0xd0 arch/x86/entry/common.c:82\n entry_SYSCALL_64_after_hwframe+0x44/0xae\n\nUninit was created at:\n slab_post_alloc_hook mm/slab.h:524 [inline]\n slab_alloc_node mm/slub.c:3251 [inline]\n __kmalloc_node_track_caller+0xe0c/0x1510 mm/slub.c:4974\n kmalloc_reserve net/core/skbuff.c:354 [inline]\n __alloc_skb+0x545/0xf90 net/core/skbuff.c:426\n alloc_skb include/linux/skbuff.h:1126 [inline]\n netlink_dump+0x3d5/0x16a0 net/netlink/af_netlink.c:2245\n __netlink_dump_start+0xd1c/0xee0 net/netlink/af_netlink.c:2370\n netlink_dump_start include/linux/netlink.h:254 [inline]\n inet_diag_handler_cmd+0x2e7/0x400 net/ipv4/inet_diag.c:1343\n sock_diag_rcv_msg+0x24a/0x620\n netlink_rcv_skb+0x447/0x800 net/netlink/af_netlink.c:2491\n sock_diag_rcv+0x63/0x80 net/core/sock_diag.c:276\n netlink_unicast_kernel net/netlink/af_netlink.c:1319 [inline]\n netlink_unicast+0x1095/0x1360 net/netlink/af_netlink.c:1345\n netlink_sendmsg+0x16f3/0x1870 net/netlink/af_netlink.c:1916\n sock_sendmsg_nosec net/socket.c:704 [inline]\n sock_sendmsg net/socket.c:724 [inline]\n sock_write_iter+0x594/0x690 net/socket.c:1057\n do_iter_readv_writev+0xa7f/0xc70\n do_iter_write+0x52c/0x1500 fs/read_write.c:851\n vfs_writev fs/read_write.c:924 [inline]\n do_writev+0x63f/0xe30 fs/read_write.c:967\n __do_sys_writev fs/read_write.c:1040 [inline]\n __se_sys_writev fs/read_write.c:1037 [inline]\n __x64_sys_writev+0xe5/0x120 fs/read_write.c:1037\n do_syscall_x64 arch/x86/entry/common.c:51 [inline]\n do_syscall_64+0x54/0xd0 arch/x86/entry/common.c:82\n entry_SYSCALL_64_after_hwframe+0x44/0xae\n\nBytes 68-71 of 312 are uninitialized\nMemory access of size 312 starts at ffff88812ab54000\nData copied to user address 0000000020001440\n\nCPU: 1 PID: 6365 Comm: syz-executor801 Not tainted 5.16.0-rc3-syzkaller #0\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47597",
"url": "https://www.suse.com/security/cve/CVE-2021-47597"
},
{
"category": "external",
"summary": "SUSE Bug 1226553 for CVE-2021-47597",
"url": "https://bugzilla.suse.com/1226553"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-14T07:24:46Z",
"details": "low"
}
],
"title": "CVE-2021-47597"
},
{
"cve": "CVE-2021-47599",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47599"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbtrfs: use latest_dev in btrfs_show_devname\n\nThe test case btrfs/238 reports the warning below:\n\n WARNING: CPU: 3 PID: 481 at fs/btrfs/super.c:2509 btrfs_show_devname+0x104/0x1e8 [btrfs]\n CPU: 2 PID: 1 Comm: systemd Tainted: G W O 5.14.0-rc1-custom #72\n Hardware name: QEMU QEMU Virtual Machine, BIOS 0.0.0 02/06/2015\n Call trace:\n btrfs_show_devname+0x108/0x1b4 [btrfs]\n show_mountinfo+0x234/0x2c4\n m_show+0x28/0x34\n seq_read_iter+0x12c/0x3c4\n vfs_read+0x29c/0x2c8\n ksys_read+0x80/0xec\n __arm64_sys_read+0x28/0x34\n invoke_syscall+0x50/0xf8\n do_el0_svc+0x88/0x138\n el0_svc+0x2c/0x8c\n el0t_64_sync_handler+0x84/0xe4\n el0t_64_sync+0x198/0x19c\n\nReason:\nWhile btrfs_prepare_sprout() moves the fs_devices::devices into\nfs_devices::seed_list, the btrfs_show_devname() searches for the devices\nand found none, leading to the warning as in above.\n\nFix:\nlatest_dev is updated according to the changes to the device list.\nThat means we could use the latest_dev-\u003ename to show the device name in\n/proc/self/mounts, the pointer will be always valid as it\u0027s assigned\nbefore the device is deleted from the list in remove or replace.\nThe RCU protection is sufficient as the device structure is freed after\nsynchronization.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47599",
"url": "https://www.suse.com/security/cve/CVE-2021-47599"
},
{
"category": "external",
"summary": "SUSE Bug 1226571 for CVE-2021-47599",
"url": "https://bugzilla.suse.com/1226571"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-14T07:24:46Z",
"details": "moderate"
}
],
"title": "CVE-2021-47599"
},
{
"cve": "CVE-2021-47606",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47606"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: netlink: af_netlink: Prevent empty skb by adding a check on len.\n\nAdding a check on len parameter to avoid empty skb. This prevents a\ndivision error in netem_enqueue function which is caused when skb-\u003elen=0\nand skb-\u003edata_len=0 in the randomized corruption step as shown below.\n\nskb-\u003edata[prandom_u32() % skb_headlen(skb)] ^= 1\u003c\u003c(prandom_u32() % 8);\n\nCrash Report:\n[ 343.170349] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family\n0 port 6081 - 0\n[ 343.216110] netem: version 1.3\n[ 343.235841] divide error: 0000 [#1] PREEMPT SMP KASAN NOPTI\n[ 343.236680] CPU: 3 PID: 4288 Comm: reproducer Not tainted 5.16.0-rc1+\n[ 343.237569] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996),\nBIOS 1.11.0-2.el7 04/01/2014\n[ 343.238707] RIP: 0010:netem_enqueue+0x1590/0x33c0 [sch_netem]\n[ 343.239499] Code: 89 85 58 ff ff ff e8 5f 5d e9 d3 48 8b b5 48 ff ff\nff 8b 8d 50 ff ff ff 8b 85 58 ff ff ff 48 8b bd 70 ff ff ff 31 d2 2b 4f\n74 \u003cf7\u003e f1 48 b8 00 00 00 00 00 fc ff df 49 01 d5 4c 89 e9 48 c1 e9 03\n[ 343.241883] RSP: 0018:ffff88800bcd7368 EFLAGS: 00010246\n[ 343.242589] RAX: 00000000ba7c0a9c RBX: 0000000000000001 RCX:\n0000000000000000\n[ 343.243542] RDX: 0000000000000000 RSI: ffff88800f8edb10 RDI:\nffff88800f8eda40\n[ 343.244474] RBP: ffff88800bcd7458 R08: 0000000000000000 R09:\nffffffff94fb8445\n[ 343.245403] R10: ffffffff94fb8336 R11: ffffffff94fb8445 R12:\n0000000000000000\n[ 343.246355] R13: ffff88800a5a7000 R14: ffff88800a5b5800 R15:\n0000000000000020\n[ 343.247291] FS: 00007fdde2bd7700(0000) GS:ffff888109780000(0000)\nknlGS:0000000000000000\n[ 343.248350] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n[ 343.249120] CR2: 00000000200000c0 CR3: 000000000ef4c000 CR4:\n00000000000006e0\n[ 343.250076] Call Trace:\n[ 343.250423] \u003cTASK\u003e\n[ 343.250713] ? memcpy+0x4d/0x60\n[ 343.251162] ? netem_init+0xa0/0xa0 [sch_netem]\n[ 343.251795] ? __sanitizer_cov_trace_pc+0x21/0x60\n[ 343.252443] netem_enqueue+0xe28/0x33c0 [sch_netem]\n[ 343.253102] ? stack_trace_save+0x87/0xb0\n[ 343.253655] ? filter_irq_stacks+0xb0/0xb0\n[ 343.254220] ? netem_init+0xa0/0xa0 [sch_netem]\n[ 343.254837] ? __kasan_check_write+0x14/0x20\n[ 343.255418] ? _raw_spin_lock+0x88/0xd6\n[ 343.255953] dev_qdisc_enqueue+0x50/0x180\n[ 343.256508] __dev_queue_xmit+0x1a7e/0x3090\n[ 343.257083] ? netdev_core_pick_tx+0x300/0x300\n[ 343.257690] ? check_kcov_mode+0x10/0x40\n[ 343.258219] ? _raw_spin_unlock_irqrestore+0x29/0x40\n[ 343.258899] ? __kasan_init_slab_obj+0x24/0x30\n[ 343.259529] ? setup_object.isra.71+0x23/0x90\n[ 343.260121] ? new_slab+0x26e/0x4b0\n[ 343.260609] ? kasan_poison+0x3a/0x50\n[ 343.261118] ? kasan_unpoison+0x28/0x50\n[ 343.261637] ? __kasan_slab_alloc+0x71/0x90\n[ 343.262214] ? memcpy+0x4d/0x60\n[ 343.262674] ? write_comp_data+0x2f/0x90\n[ 343.263209] ? __kasan_check_write+0x14/0x20\n[ 343.263802] ? __skb_clone+0x5d6/0x840\n[ 343.264329] ? __sanitizer_cov_trace_pc+0x21/0x60\n[ 343.264958] dev_queue_xmit+0x1c/0x20\n[ 343.265470] netlink_deliver_tap+0x652/0x9c0\n[ 343.266067] netlink_unicast+0x5a0/0x7f0\n[ 343.266608] ? netlink_attachskb+0x860/0x860\n[ 343.267183] ? __sanitizer_cov_trace_pc+0x21/0x60\n[ 343.267820] ? write_comp_data+0x2f/0x90\n[ 343.268367] netlink_sendmsg+0x922/0xe80\n[ 343.268899] ? netlink_unicast+0x7f0/0x7f0\n[ 343.269472] ? __sanitizer_cov_trace_pc+0x21/0x60\n[ 343.270099] ? write_comp_data+0x2f/0x90\n[ 343.270644] ? netlink_unicast+0x7f0/0x7f0\n[ 343.271210] sock_sendmsg+0x155/0x190\n[ 343.271721] ____sys_sendmsg+0x75f/0x8f0\n[ 343.272262] ? kernel_sendmsg+0x60/0x60\n[ 343.272788] ? write_comp_data+0x2f/0x90\n[ 343.273332] ? write_comp_data+0x2f/0x90\n[ 343.273869] ___sys_sendmsg+0x10f/0x190\n[ 343.274405] ? sendmsg_copy_msghdr+0x80/0x80\n[ 343.274984] ? slab_post_alloc_hook+0x70/0x230\n[ 343.275597] ? futex_wait_setup+0x240/0x240\n[ 343.276175] ? security_file_alloc+0x3e/0x170\n[ 343.276779] ? write_comp_d\n---truncated---",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47606",
"url": "https://www.suse.com/security/cve/CVE-2021-47606"
},
{
"category": "external",
"summary": "SUSE Bug 1226555 for CVE-2021-47606",
"url": "https://bugzilla.suse.com/1226555"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-14T07:24:46Z",
"details": "moderate"
}
],
"title": "CVE-2021-47606"
},
{
"cve": "CVE-2021-47619",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47619"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ni40e: Fix queues reservation for XDP\n\nWhen XDP was configured on a system with large number of CPUs\nand X722 NIC there was a call trace with NULL pointer dereference.\n\ni40e 0000:87:00.0: failed to get tracking for 256 queues for VSI 0 err -12\ni40e 0000:87:00.0: setup of MAIN VSI failed\n\nBUG: kernel NULL pointer dereference, address: 0000000000000000\nRIP: 0010:i40e_xdp+0xea/0x1b0 [i40e]\nCall Trace:\n? i40e_reconfig_rss_queues+0x130/0x130 [i40e]\ndev_xdp_install+0x61/0xe0\ndev_xdp_attach+0x18a/0x4c0\ndev_change_xdp_fd+0x1e6/0x220\ndo_setlink+0x616/0x1030\n? ahci_port_stop+0x80/0x80\n? ata_qc_issue+0x107/0x1e0\n? lock_timer_base+0x61/0x80\n? __mod_timer+0x202/0x380\nrtnl_setlink+0xe5/0x170\n? bpf_lsm_binder_transaction+0x10/0x10\n? security_capable+0x36/0x50\nrtnetlink_rcv_msg+0x121/0x350\n? rtnl_calcit.isra.0+0x100/0x100\nnetlink_rcv_skb+0x50/0xf0\nnetlink_unicast+0x1d3/0x2a0\nnetlink_sendmsg+0x22a/0x440\nsock_sendmsg+0x5e/0x60\n__sys_sendto+0xf0/0x160\n? __sys_getsockname+0x7e/0xc0\n? _copy_from_user+0x3c/0x80\n? __sys_setsockopt+0xc8/0x1a0\n__x64_sys_sendto+0x20/0x30\ndo_syscall_64+0x33/0x40\nentry_SYSCALL_64_after_hwframe+0x44/0xae\nRIP: 0033:0x7f83fa7a39e0\n\nThis was caused by PF queue pile fragmentation due to\nflow director VSI queue being placed right after main VSI.\nBecause of this main VSI was not able to resize its\nqueue allocation for XDP resulting in no queues allocated\nfor main VSI when XDP was turned on.\n\nFix this by always allocating last queue in PF queue pile\nfor a flow director VSI.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47619",
"url": "https://www.suse.com/security/cve/CVE-2021-47619"
},
{
"category": "external",
"summary": "SUSE Bug 1226645 for CVE-2021-47619",
"url": "https://bugzilla.suse.com/1226645"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-14T07:24:46Z",
"details": "moderate"
}
],
"title": "CVE-2021-47619"
},
{
"cve": "CVE-2022-20368",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-20368"
}
],
"notes": [
{
"category": "general",
"text": "Product: AndroidVersions: Android kernelAndroid ID: A-224546354References: Upstream kernel",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-20368",
"url": "https://www.suse.com/security/cve/CVE-2022-20368"
},
{
"category": "external",
"summary": "SUSE Bug 1202346 for CVE-2022-20368",
"url": "https://bugzilla.suse.com/1202346"
},
{
"category": "external",
"summary": "SUSE Bug 1212311 for CVE-2022-20368",
"url": "https://bugzilla.suse.com/1212311"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-14T07:24:46Z",
"details": "moderate"
}
],
"title": "CVE-2022-20368"
},
{
"cve": "CVE-2022-28748",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-28748"
}
],
"notes": [
{
"category": "general",
"text": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2022-2964. Reason: This candidate is a reservation duplicate of CVE-2022-2964. Notes: All CVE users should reference CVE-2022-2964 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-28748",
"url": "https://www.suse.com/security/cve/CVE-2022-28748"
},
{
"category": "external",
"summary": "SUSE Bug 1196018 for CVE-2022-28748",
"url": "https://bugzilla.suse.com/1196018"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.7,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-14T07:24:46Z",
"details": "low"
}
],
"title": "CVE-2022-28748"
},
{
"cve": "CVE-2022-2964",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-2964"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the Linux kernel\u0027s driver for the ASIX AX88179_178A-based USB 2.0/3.0 Gigabit Ethernet Devices. The vulnerability contains multiple out-of-bounds reads and possible out-of-bounds writes.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-2964",
"url": "https://www.suse.com/security/cve/CVE-2022-2964"
},
{
"category": "external",
"summary": "SUSE Bug 1202686 for CVE-2022-2964",
"url": "https://bugzilla.suse.com/1202686"
},
{
"category": "external",
"summary": "SUSE Bug 1203008 for CVE-2022-2964",
"url": "https://bugzilla.suse.com/1203008"
},
{
"category": "external",
"summary": "SUSE Bug 1208044 for CVE-2022-2964",
"url": "https://bugzilla.suse.com/1208044"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-14T07:24:46Z",
"details": "important"
}
],
"title": "CVE-2022-2964"
},
{
"cve": "CVE-2022-48775",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-48775"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nDrivers: hv: vmbus: Fix memory leak in vmbus_add_channel_kobj\n\nkobject_init_and_add() takes reference even when it fails.\nAccording to the doc of kobject_init_and_add():\n\n If this function returns an error, kobject_put() must be called to\n properly clean up the memory associated with the object.\n\nFix memory leak by calling kobject_put().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-48775",
"url": "https://www.suse.com/security/cve/CVE-2022-48775"
},
{
"category": "external",
"summary": "SUSE Bug 1227924 for CVE-2022-48775",
"url": "https://bugzilla.suse.com/1227924"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-14T07:24:46Z",
"details": "low"
}
],
"title": "CVE-2022-48775"
},
{
"cve": "CVE-2022-48792",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-48792"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: pm8001: Fix use-after-free for aborted SSP/STP sas_task\n\nCurrently a use-after-free may occur if a sas_task is aborted by the upper\nlayer before we handle the I/O completion in mpi_ssp_completion() or\nmpi_sata_completion().\n\nIn this case, the following are the two steps in handling those I/O\ncompletions:\n\n - Call complete() to inform the upper layer handler of completion of\n the I/O.\n\n - Release driver resources associated with the sas_task in\n pm8001_ccb_task_free() call.\n\nWhen complete() is called, the upper layer may free the sas_task. As such,\nwe should not touch the associated sas_task afterwards, but we do so in the\npm8001_ccb_task_free() call.\n\nFix by swapping the complete() and pm8001_ccb_task_free() calls ordering.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-48792",
"url": "https://www.suse.com/security/cve/CVE-2022-48792"
},
{
"category": "external",
"summary": "SUSE Bug 1228013 for CVE-2022-48792",
"url": "https://bugzilla.suse.com/1228013"
},
{
"category": "external",
"summary": "SUSE Bug 1228017 for CVE-2022-48792",
"url": "https://bugzilla.suse.com/1228017"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-14T07:24:46Z",
"details": "moderate"
}
],
"title": "CVE-2022-48792"
},
{
"cve": "CVE-2022-48794",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-48794"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: ieee802154: at86rf230: Stop leaking skb\u0027s\n\nUpon error the ieee802154_xmit_complete() helper is not called. Only\nieee802154_wake_queue() is called manually. In the Tx case we then leak\nthe skb structure.\n\nFree the skb structure upon error before returning when appropriate.\n\nAs the \u0027is_tx = 0\u0027 cannot be moved in the complete handler because of a\npossible race between the delay in switching to STATE_RX_AACK_ON and a\nnew interrupt, we introduce an intermediate \u0027was_tx\u0027 boolean just for\nthis purpose.\n\nThere is no Fixes tag applying here, many changes have been made on this\narea and the issue kind of always existed.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-48794",
"url": "https://www.suse.com/security/cve/CVE-2022-48794"
},
{
"category": "external",
"summary": "SUSE Bug 1228025 for CVE-2022-48794",
"url": "https://bugzilla.suse.com/1228025"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-14T07:24:46Z",
"details": "low"
}
],
"title": "CVE-2022-48794"
},
{
"cve": "CVE-2022-48804",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-48804"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nvt_ioctl: fix array_index_nospec in vt_setactivate\n\narray_index_nospec ensures that an out-of-bounds value is set to zero\non the transient path. Decreasing the value by one afterwards causes\na transient integer underflow. vsa.console should be decreased first\nand then sanitized with array_index_nospec.\n\nKasper Acknowledgements: Jakob Koschel, Brian Johannesmeyer, Kaveh\nRazavi, Herbert Bos, Cristiano Giuffrida from the VUSec group at VU\nAmsterdam.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-48804",
"url": "https://www.suse.com/security/cve/CVE-2022-48804"
},
{
"category": "external",
"summary": "SUSE Bug 1227968 for CVE-2022-48804",
"url": "https://bugzilla.suse.com/1227968"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-14T07:24:46Z",
"details": "moderate"
}
],
"title": "CVE-2022-48804"
},
{
"cve": "CVE-2022-48805",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-48805"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: usb: ax88179_178a: Fix out-of-bounds accesses in RX fixup\n\nax88179_rx_fixup() contains several out-of-bounds accesses that can be\ntriggered by a malicious (or defective) USB device, in particular:\n\n - The metadata array (hdr_off..hdr_off+2*pkt_cnt) can be out of bounds,\n causing OOB reads and (on big-endian systems) OOB endianness flips.\n - A packet can overlap the metadata array, causing a later OOB\n endianness flip to corrupt data used by a cloned SKB that has already\n been handed off into the network stack.\n - A packet SKB can be constructed whose tail is far beyond its end,\n causing out-of-bounds heap data to be considered part of the SKB\u0027s\n data.\n\nI have tested that this can be used by a malicious USB device to send a\nbogus ICMPv6 Echo Request and receive an ICMPv6 Echo Reply in response\nthat contains random kernel heap data.\nIt\u0027s probably also possible to get OOB writes from this on a\nlittle-endian system somehow - maybe by triggering skb_cow() via IP\noptions processing -, but I haven\u0027t tested that.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-48805",
"url": "https://www.suse.com/security/cve/CVE-2022-48805"
},
{
"category": "external",
"summary": "SUSE Bug 1227969 for CVE-2022-48805",
"url": "https://bugzilla.suse.com/1227969"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-14T07:24:46Z",
"details": "moderate"
}
],
"title": "CVE-2022-48805"
},
{
"cve": "CVE-2022-48810",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-48810"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nipmr,ip6mr: acquire RTNL before calling ip[6]mr_free_table() on failure path\n\nip[6]mr_free_table() can only be called under RTNL lock.\n\nRTNL: assertion failed at net/core/dev.c (10367)\nWARNING: CPU: 1 PID: 5890 at net/core/dev.c:10367 unregister_netdevice_many+0x1246/0x1850 net/core/dev.c:10367\nModules linked in:\nCPU: 1 PID: 5890 Comm: syz-executor.2 Not tainted 5.16.0-syzkaller-11627-g422ee58dc0ef #0\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011\nRIP: 0010:unregister_netdevice_many+0x1246/0x1850 net/core/dev.c:10367\nCode: 0f 85 9b ee ff ff e8 69 07 4b fa ba 7f 28 00 00 48 c7 c6 00 90 ae 8a 48 c7 c7 40 90 ae 8a c6 05 6d b1 51 06 01 e8 8c 90 d8 01 \u003c0f\u003e 0b e9 70 ee ff ff e8 3e 07 4b fa 4c 89 e7 e8 86 2a 59 fa e9 ee\nRSP: 0018:ffffc900046ff6e0 EFLAGS: 00010286\nRAX: 0000000000000000 RBX: 0000000000000000 RCX: 0000000000000000\nRDX: ffff888050f51d00 RSI: ffffffff815fa008 RDI: fffff520008dfece\nRBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000\nR10: ffffffff815f3d6e R11: 0000000000000000 R12: 00000000fffffff4\nR13: dffffc0000000000 R14: ffffc900046ff750 R15: ffff88807b7dc000\nFS: 00007f4ab736e700(0000) GS:ffff8880b9d00000(0000) knlGS:0000000000000000\nCS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 00007fee0b4f8990 CR3: 000000001e7d2000 CR4: 00000000003506e0\nDR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\nDR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\nCall Trace:\n \u003cTASK\u003e\n mroute_clean_tables+0x244/0xb40 net/ipv6/ip6mr.c:1509\n ip6mr_free_table net/ipv6/ip6mr.c:389 [inline]\n ip6mr_rules_init net/ipv6/ip6mr.c:246 [inline]\n ip6mr_net_init net/ipv6/ip6mr.c:1306 [inline]\n ip6mr_net_init+0x3f0/0x4e0 net/ipv6/ip6mr.c:1298\n ops_init+0xaf/0x470 net/core/net_namespace.c:140\n setup_net+0x54f/0xbb0 net/core/net_namespace.c:331\n copy_net_ns+0x318/0x760 net/core/net_namespace.c:475\n create_new_namespaces+0x3f6/0xb20 kernel/nsproxy.c:110\n copy_namespaces+0x391/0x450 kernel/nsproxy.c:178\n copy_process+0x2e0c/0x7300 kernel/fork.c:2167\n kernel_clone+0xe7/0xab0 kernel/fork.c:2555\n __do_sys_clone+0xc8/0x110 kernel/fork.c:2672\n do_syscall_x64 arch/x86/entry/common.c:50 [inline]\n do_syscall_64+0x35/0xb0 arch/x86/entry/common.c:80\n entry_SYSCALL_64_after_hwframe+0x44/0xae\nRIP: 0033:0x7f4ab89f9059\nCode: Unable to access opcode bytes at RIP 0x7f4ab89f902f.\nRSP: 002b:00007f4ab736e118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038\nRAX: ffffffffffffffda RBX: 00007f4ab8b0bf60 RCX: 00007f4ab89f9059\nRDX: 0000000020000280 RSI: 0000000020000270 RDI: 0000000040200000\nRBP: 00007f4ab8a5308d R08: 0000000020000300 R09: 0000000020000300\nR10: 00000000200002c0 R11: 0000000000000206 R12: 0000000000000000\nR13: 00007ffc3977cc1f R14: 00007f4ab736e300 R15: 0000000000022000\n \u003c/TASK\u003e",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-48810",
"url": "https://www.suse.com/security/cve/CVE-2022-48810"
},
{
"category": "external",
"summary": "SUSE Bug 1227936 for CVE-2022-48810",
"url": "https://bugzilla.suse.com/1227936"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-14T07:24:46Z",
"details": "moderate"
}
],
"title": "CVE-2022-48810"
},
{
"cve": "CVE-2022-48811",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-48811"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nibmvnic: don\u0027t release napi in __ibmvnic_open()\n\nIf __ibmvnic_open() encounters an error such as when setting link state,\nit calls release_resources() which frees the napi structures needlessly.\nInstead, have __ibmvnic_open() only clean up the work it did so far (i.e.\ndisable napi and irqs) and leave the rest to the callers.\n\nIf caller of __ibmvnic_open() is ibmvnic_open(), it should release the\nresources immediately. If the caller is do_reset() or do_hard_reset(),\nthey will release the resources on the next reset.\n\nThis fixes following crash that occurred when running the drmgr command\nseveral times to add/remove a vnic interface:\n\n\t[102056] ibmvnic 30000003 env3: Disabling rx_scrq[6] irq\n\t[102056] ibmvnic 30000003 env3: Disabling rx_scrq[7] irq\n\t[102056] ibmvnic 30000003 env3: Replenished 8 pools\n\tKernel attempted to read user page (10) - exploit attempt? (uid: 0)\n\tBUG: Kernel NULL pointer dereference on read at 0x00000010\n\tFaulting instruction address: 0xc000000000a3c840\n\tOops: Kernel access of bad area, sig: 11 [#1]\n\tLE PAGE_SIZE=64K MMU=Radix SMP NR_CPUS=2048 NUMA pSeries\n\t...\n\tCPU: 9 PID: 102056 Comm: kworker/9:2 Kdump: loaded Not tainted 5.16.0-rc5-autotest-g6441998e2e37 #1\n\tWorkqueue: events_long __ibmvnic_reset [ibmvnic]\n\tNIP: c000000000a3c840 LR: c0080000029b5378 CTR: c000000000a3c820\n\tREGS: c0000000548e37e0 TRAP: 0300 Not tainted (5.16.0-rc5-autotest-g6441998e2e37)\n\tMSR: 8000000000009033 \u003cSF,EE,ME,IR,DR,RI,LE\u003e CR: 28248484 XER: 00000004\n\tCFAR: c0080000029bdd24 DAR: 0000000000000010 DSISR: 40000000 IRQMASK: 0\n\tGPR00: c0080000029b55d0 c0000000548e3a80 c0000000028f0200 0000000000000000\n\t...\n\tNIP [c000000000a3c840] napi_enable+0x20/0xc0\n\tLR [c0080000029b5378] __ibmvnic_open+0xf0/0x430 [ibmvnic]\n\tCall Trace:\n\t[c0000000548e3a80] [0000000000000006] 0x6 (unreliable)\n\t[c0000000548e3ab0] [c0080000029b55d0] __ibmvnic_open+0x348/0x430 [ibmvnic]\n\t[c0000000548e3b40] [c0080000029bcc28] __ibmvnic_reset+0x500/0xdf0 [ibmvnic]\n\t[c0000000548e3c60] [c000000000176228] process_one_work+0x288/0x570\n\t[c0000000548e3d00] [c000000000176588] worker_thread+0x78/0x660\n\t[c0000000548e3da0] [c0000000001822f0] kthread+0x1c0/0x1d0\n\t[c0000000548e3e10] [c00000000000cf64] ret_from_kernel_thread+0x5c/0x64\n\tInstruction dump:\n\t7d2948f8 792307e0 4e800020 60000000 3c4c01eb 384239e0 f821ffd1 39430010\n\t38a0fff6 e92d1100 f9210028 39200000 \u003ce9030010\u003e f9010020 60420000 e9210020\n\t---[ end trace 5f8033b08fd27706 ]---",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-48811",
"url": "https://www.suse.com/security/cve/CVE-2022-48811"
},
{
"category": "external",
"summary": "SUSE Bug 1227928 for CVE-2022-48811",
"url": "https://bugzilla.suse.com/1227928"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-14T07:24:46Z",
"details": "moderate"
}
],
"title": "CVE-2022-48811"
},
{
"cve": "CVE-2022-48823",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-48823"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: qedf: Fix refcount issue when LOGO is received during TMF\n\nHung task call trace was seen during LOGO processing.\n\n[ 974.309060] [0000:00:00.0]:[qedf_eh_device_reset:868]: 1:0:2:0: LUN RESET Issued...\n[ 974.309065] [0000:00:00.0]:[qedf_initiate_tmf:2422]: tm_flags 0x10 sc_cmd 00000000c16b930f op = 0x2a target_id = 0x2 lun=0\n[ 974.309178] [0000:00:00.0]:[qedf_initiate_tmf:2431]: portid=016900 tm_flags =LUN RESET\n[ 974.309222] [0000:00:00.0]:[qedf_initiate_tmf:2438]: orig io_req = 00000000ec78df8f xid = 0x180 ref_cnt = 1.\n[ 974.309625] host1: rport 016900: Received LOGO request while in state Ready\n[ 974.309627] host1: rport 016900: Delete port\n[ 974.309642] host1: rport 016900: work event 3\n[ 974.309644] host1: rport 016900: lld callback ev 3\n[ 974.313243] [0000:61:00.2]:[qedf_execute_tmf:2383]:1: fcport is uploading, not executing flush.\n[ 974.313295] [0000:61:00.2]:[qedf_execute_tmf:2400]:1: task mgmt command success...\n[ 984.031088] INFO: task jbd2/dm-15-8:7645 blocked for more than 120 seconds.\n[ 984.031136] Not tainted 4.18.0-305.el8.x86_64 #1\n\n[ 984.031166] \"echo 0 \u003e /proc/sys/kernel/hung_task_timeout_secs\" disables this message.\n[ 984.031209] jbd2/dm-15-8 D 0 7645 2 0x80004080\n[ 984.031212] Call Trace:\n[ 984.031222] __schedule+0x2c4/0x700\n[ 984.031230] ? unfreeze_partials.isra.83+0x16e/0x1a0\n[ 984.031233] ? bit_wait_timeout+0x90/0x90\n[ 984.031235] schedule+0x38/0xa0\n[ 984.031238] io_schedule+0x12/0x40\n[ 984.031240] bit_wait_io+0xd/0x50\n[ 984.031243] __wait_on_bit+0x6c/0x80\n[ 984.031248] ? free_buffer_head+0x21/0x50\n[ 984.031251] out_of_line_wait_on_bit+0x91/0xb0\n[ 984.031257] ? init_wait_var_entry+0x50/0x50\n[ 984.031268] jbd2_journal_commit_transaction+0x112e/0x19f0 [jbd2]\n[ 984.031280] kjournald2+0xbd/0x270 [jbd2]\n[ 984.031284] ? finish_wait+0x80/0x80\n[ 984.031291] ? commit_timeout+0x10/0x10 [jbd2]\n[ 984.031294] kthread+0x116/0x130\n[ 984.031300] ? kthread_flush_work_fn+0x10/0x10\n[ 984.031305] ret_from_fork+0x1f/0x40\n\nThere was a ref count issue when LOGO is received during TMF. This leads to\none of the I/Os hanging with the driver. Fix the ref count.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-48823",
"url": "https://www.suse.com/security/cve/CVE-2022-48823"
},
{
"category": "external",
"summary": "SUSE Bug 1228045 for CVE-2022-48823",
"url": "https://bugzilla.suse.com/1228045"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-14T07:24:46Z",
"details": "low"
}
],
"title": "CVE-2022-48823"
},
{
"cve": "CVE-2022-48826",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-48826"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/vc4: Fix deadlock on DSI device attach error\n\nDSI device attach to DSI host will be done with host device\u0027s lock\nheld.\n\nUn-registering host in \"device attach\" error path (ex: probe retry)\nwill result in deadlock with below call trace and non operational\nDSI display.\n\nStartup Call trace:\n[ 35.043036] rt_mutex_slowlock.constprop.21+0x184/0x1b8\n[ 35.043048] mutex_lock_nested+0x7c/0xc8\n[ 35.043060] device_del+0x4c/0x3e8\n[ 35.043075] device_unregister+0x20/0x40\n[ 35.043082] mipi_dsi_remove_device_fn+0x18/0x28\n[ 35.043093] device_for_each_child+0x68/0xb0\n[ 35.043105] mipi_dsi_host_unregister+0x40/0x90\n[ 35.043115] vc4_dsi_host_attach+0xf0/0x120 [vc4]\n[ 35.043199] mipi_dsi_attach+0x30/0x48\n[ 35.043209] tc358762_probe+0x128/0x164 [tc358762]\n[ 35.043225] mipi_dsi_drv_probe+0x28/0x38\n[ 35.043234] really_probe+0xc0/0x318\n[ 35.043244] __driver_probe_device+0x80/0xe8\n[ 35.043254] driver_probe_device+0xb8/0x118\n[ 35.043263] __device_attach_driver+0x98/0xe8\n[ 35.043273] bus_for_each_drv+0x84/0xd8\n[ 35.043281] __device_attach+0xf0/0x150\n[ 35.043290] device_initial_probe+0x1c/0x28\n[ 35.043300] bus_probe_device+0xa4/0xb0\n[ 35.043308] deferred_probe_work_func+0xa0/0xe0\n[ 35.043318] process_one_work+0x254/0x700\n[ 35.043330] worker_thread+0x4c/0x448\n[ 35.043339] kthread+0x19c/0x1a8\n[ 35.043348] ret_from_fork+0x10/0x20\n\nShutdown Call trace:\n[ 365.565417] Call trace:\n[ 365.565423] __switch_to+0x148/0x200\n[ 365.565452] __schedule+0x340/0x9c8\n[ 365.565467] schedule+0x48/0x110\n[ 365.565479] schedule_timeout+0x3b0/0x448\n[ 365.565496] wait_for_completion+0xac/0x138\n[ 365.565509] __flush_work+0x218/0x4e0\n[ 365.565523] flush_work+0x1c/0x28\n[ 365.565536] wait_for_device_probe+0x68/0x158\n[ 365.565550] device_shutdown+0x24/0x348\n[ 365.565561] kernel_restart_prepare+0x40/0x50\n[ 365.565578] kernel_restart+0x20/0x70\n[ 365.565591] __do_sys_reboot+0x10c/0x220\n[ 365.565605] __arm64_sys_reboot+0x2c/0x38\n[ 365.565619] invoke_syscall+0x4c/0x110\n[ 365.565634] el0_svc_common.constprop.3+0xfc/0x120\n[ 365.565648] do_el0_svc+0x2c/0x90\n[ 365.565661] el0_svc+0x4c/0xf0\n[ 365.565671] el0t_64_sync_handler+0x90/0xb8\n[ 365.565682] el0t_64_sync+0x180/0x184",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-48826",
"url": "https://www.suse.com/security/cve/CVE-2022-48826"
},
{
"category": "external",
"summary": "SUSE Bug 1227975 for CVE-2022-48826",
"url": "https://bugzilla.suse.com/1227975"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-14T07:24:46Z",
"details": "moderate"
}
],
"title": "CVE-2022-48826"
},
{
"cve": "CVE-2022-48827",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-48827"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nNFSD: Fix the behavior of READ near OFFSET_MAX\n\nDan Aloni reports:\n\u003e Due to commit 8cfb9015280d (\"NFS: Always provide aligned buffers to\n\u003e the RPC read layers\") on the client, a read of 0xfff is aligned up\n\u003e to server rsize of 0x1000.\n\u003e\n\u003e As a result, in a test where the server has a file of size\n\u003e 0x7fffffffffffffff, and the client tries to read from the offset\n\u003e 0x7ffffffffffff000, the read causes loff_t overflow in the server\n\u003e and it returns an NFS code of EINVAL to the client. The client as\n\u003e a result indefinitely retries the request.\n\nThe Linux NFS client does not handle NFS?ERR_INVAL, even though all\nNFS specifications permit servers to return that status code for a\nREAD.\n\nInstead of NFS?ERR_INVAL, have out-of-range READ requests succeed\nand return a short result. Set the EOF flag in the result to prevent\nthe client from retrying the READ request. This behavior appears to\nbe consistent with Solaris NFS servers.\n\nNote that NFSv3 and NFSv4 use u64 offset values on the wire. These\nmust be converted to loff_t internally before use -- an implicit\ntype cast is not adequate for this purpose. Otherwise VFS checks\nagainst sb-\u003es_maxbytes do not work properly.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-48827",
"url": "https://www.suse.com/security/cve/CVE-2022-48827"
},
{
"category": "external",
"summary": "SUSE Bug 1228037 for CVE-2022-48827",
"url": "https://bugzilla.suse.com/1228037"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-14T07:24:46Z",
"details": "moderate"
}
],
"title": "CVE-2022-48827"
},
{
"cve": "CVE-2022-48828",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-48828"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nNFSD: Fix ia_size underflow\n\niattr::ia_size is a loff_t, which is a signed 64-bit type. NFSv3 and\nNFSv4 both define file size as an unsigned 64-bit type. Thus there\nis a range of valid file size values an NFS client can send that is\nalready larger than Linux can handle.\n\nCurrently decode_fattr4() dumps a full u64 value into ia_size. If\nthat value happens to be larger than S64_MAX, then ia_size\nunderflows. I\u0027m about to fix up the NFSv3 behavior as well, so let\u0027s\ncatch the underflow in the common code path: nfsd_setattr().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-48828",
"url": "https://www.suse.com/security/cve/CVE-2022-48828"
},
{
"category": "external",
"summary": "SUSE Bug 1228054 for CVE-2022-48828",
"url": "https://bugzilla.suse.com/1228054"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-14T07:24:46Z",
"details": "moderate"
}
],
"title": "CVE-2022-48828"
},
{
"cve": "CVE-2022-48829",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-48829"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nNFSD: Fix NFSv3 SETATTR/CREATE\u0027s handling of large file sizes\n\niattr::ia_size is a loff_t, so these NFSv3 procedures must be\ncareful to deal with incoming client size values that are larger\nthan s64_max without corrupting the value.\n\nSilently capping the value results in storing a different value\nthan the client passed in which is unexpected behavior, so remove\nthe min_t() check in decode_sattr3().\n\nNote that RFC 1813 permits only the WRITE procedure to return\nNFS3ERR_FBIG. We believe that NFSv3 reference implementations\nalso return NFS3ERR_FBIG when ia_size is too large.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-48829",
"url": "https://www.suse.com/security/cve/CVE-2022-48829"
},
{
"category": "external",
"summary": "SUSE Bug 1228055 for CVE-2022-48829",
"url": "https://bugzilla.suse.com/1228055"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-14T07:24:46Z",
"details": "moderate"
}
],
"title": "CVE-2022-48829"
},
{
"cve": "CVE-2022-48836",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-48836"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nInput: aiptek - properly check endpoint type\n\nSyzbot reported warning in usb_submit_urb() which is caused by wrong\nendpoint type. There was a check for the number of endpoints, but not\nfor the type of endpoint.\n\nFix it by replacing old desc.bNumEndpoints check with\nusb_find_common_endpoints() helper for finding endpoints\n\nFail log:\n\nusb 5-1: BOGUS urb xfer, pipe 1 != type 3\nWARNING: CPU: 2 PID: 48 at drivers/usb/core/urb.c:502 usb_submit_urb+0xed2/0x18a0 drivers/usb/core/urb.c:502\nModules linked in:\nCPU: 2 PID: 48 Comm: kworker/2:2 Not tainted 5.17.0-rc6-syzkaller-00226-g07ebd38a0da2 #0\nHardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.14.0-2 04/01/2014\nWorkqueue: usb_hub_wq hub_event\n...\nCall Trace:\n \u003cTASK\u003e\n aiptek_open+0xd5/0x130 drivers/input/tablet/aiptek.c:830\n input_open_device+0x1bb/0x320 drivers/input/input.c:629\n kbd_connect+0xfe/0x160 drivers/tty/vt/keyboard.c:1593",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-48836",
"url": "https://www.suse.com/security/cve/CVE-2022-48836"
},
{
"category": "external",
"summary": "SUSE Bug 1227989 for CVE-2022-48836",
"url": "https://bugzilla.suse.com/1227989"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-14T07:24:46Z",
"details": "moderate"
}
],
"title": "CVE-2022-48836"
},
{
"cve": "CVE-2022-48839",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-48839"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/packet: fix slab-out-of-bounds access in packet_recvmsg()\n\nsyzbot found that when an AF_PACKET socket is using PACKET_COPY_THRESH\nand mmap operations, tpacket_rcv() is queueing skbs with\ngarbage in skb-\u003ecb[], triggering a too big copy [1]\n\nPresumably, users of af_packet using mmap() already gets correct\nmetadata from the mapped buffer, we can simply make sure\nto clear 12 bytes that might be copied to user space later.\n\nBUG: KASAN: stack-out-of-bounds in memcpy include/linux/fortify-string.h:225 [inline]\nBUG: KASAN: stack-out-of-bounds in packet_recvmsg+0x56c/0x1150 net/packet/af_packet.c:3489\nWrite of size 165 at addr ffffc9000385fb78 by task syz-executor233/3631\n\nCPU: 0 PID: 3631 Comm: syz-executor233 Not tainted 5.17.0-rc7-syzkaller-02396-g0b3660695e80 #0\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011\nCall Trace:\n \u003cTASK\u003e\n __dump_stack lib/dump_stack.c:88 [inline]\n dump_stack_lvl+0xcd/0x134 lib/dump_stack.c:106\n print_address_description.constprop.0.cold+0xf/0x336 mm/kasan/report.c:255\n __kasan_report mm/kasan/report.c:442 [inline]\n kasan_report.cold+0x83/0xdf mm/kasan/report.c:459\n check_region_inline mm/kasan/generic.c:183 [inline]\n kasan_check_range+0x13d/0x180 mm/kasan/generic.c:189\n memcpy+0x39/0x60 mm/kasan/shadow.c:66\n memcpy include/linux/fortify-string.h:225 [inline]\n packet_recvmsg+0x56c/0x1150 net/packet/af_packet.c:3489\n sock_recvmsg_nosec net/socket.c:948 [inline]\n sock_recvmsg net/socket.c:966 [inline]\n sock_recvmsg net/socket.c:962 [inline]\n ____sys_recvmsg+0x2c4/0x600 net/socket.c:2632\n ___sys_recvmsg+0x127/0x200 net/socket.c:2674\n __sys_recvmsg+0xe2/0x1a0 net/socket.c:2704\n do_syscall_x64 arch/x86/entry/common.c:50 [inline]\n do_syscall_64+0x35/0xb0 arch/x86/entry/common.c:80\n entry_SYSCALL_64_after_hwframe+0x44/0xae\nRIP: 0033:0x7fdfd5954c29\nCode: 28 00 00 00 75 05 48 83 c4 28 c3 e8 41 15 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 \u003c48\u003e 3d 01 f0 ff ff 73 01 c3 48 c7 c1 c0 ff ff ff f7 d8 64 89 01 48\nRSP: 002b:00007ffcf8e71e48 EFLAGS: 00000246 ORIG_RAX: 000000000000002f\nRAX: ffffffffffffffda RBX: 0000000000000003 RCX: 00007fdfd5954c29\nRDX: 0000000000000000 RSI: 0000000020000500 RDI: 0000000000000005\nRBP: 0000000000000000 R08: 000000000000000d R09: 000000000000000d\nR10: 0000000000000000 R11: 0000000000000246 R12: 00007ffcf8e71e60\nR13: 00000000000f4240 R14: 000000000000c1ff R15: 00007ffcf8e71e54\n \u003c/TASK\u003e\n\naddr ffffc9000385fb78 is located in stack of task syz-executor233/3631 at offset 32 in frame:\n ____sys_recvmsg+0x0/0x600 include/linux/uio.h:246\n\nthis frame has 1 object:\n [32, 160) \u0027addr\u0027\n\nMemory state around the buggy address:\n ffffc9000385fa80: 00 04 f3 f3 f3 f3 f3 00 00 00 00 00 00 00 00 00\n ffffc9000385fb00: 00 00 00 00 00 00 00 00 00 00 00 f1 f1 f1 f1 00\n\u003effffc9000385fb80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 f3\n ^\n ffffc9000385fc00: f3 f3 f3 00 00 00 00 00 00 00 00 00 00 00 00 f1\n ffffc9000385fc80: f1 f1 f1 00 f2 f2 f2 00 f2 f2 f2 00 00 00 00 00\n==================================================================",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-48839",
"url": "https://www.suse.com/security/cve/CVE-2022-48839"
},
{
"category": "external",
"summary": "SUSE Bug 1227985 for CVE-2022-48839",
"url": "https://bugzilla.suse.com/1227985"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-14T07:24:46Z",
"details": "moderate"
}
],
"title": "CVE-2022-48839"
},
{
"cve": "CVE-2022-48850",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-48850"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet-sysfs: add check for netdevice being present to speed_show\n\nWhen bringing down the netdevice or system shutdown, a panic can be\ntriggered while accessing the sysfs path because the device is already\nremoved.\n\n [ 755.549084] mlx5_core 0000:12:00.1: Shutdown was called\n [ 756.404455] mlx5_core 0000:12:00.0: Shutdown was called\n ...\n [ 757.937260] BUG: unable to handle kernel NULL pointer dereference at (null)\n [ 758.031397] IP: [\u003cffffffff8ee11acb\u003e] dma_pool_alloc+0x1ab/0x280\n\n crash\u003e bt\n ...\n PID: 12649 TASK: ffff8924108f2100 CPU: 1 COMMAND: \"amsd\"\n ...\n #9 [ffff89240e1a38b0] page_fault at ffffffff8f38c778\n [exception RIP: dma_pool_alloc+0x1ab]\n RIP: ffffffff8ee11acb RSP: ffff89240e1a3968 RFLAGS: 00010046\n RAX: 0000000000000246 RBX: ffff89243d874100 RCX: 0000000000001000\n RDX: 0000000000000000 RSI: 0000000000000246 RDI: ffff89243d874090\n RBP: ffff89240e1a39c0 R8: 000000000001f080 R9: ffff8905ffc03c00\n R10: ffffffffc04680d4 R11: ffffffff8edde9fd R12: 00000000000080d0\n R13: ffff89243d874090 R14: ffff89243d874080 R15: 0000000000000000\n ORIG_RAX: ffffffffffffffff CS: 0010 SS: 0018\n #10 [ffff89240e1a39c8] mlx5_alloc_cmd_msg at ffffffffc04680f3 [mlx5_core]\n #11 [ffff89240e1a3a18] cmd_exec at ffffffffc046ad62 [mlx5_core]\n #12 [ffff89240e1a3ab8] mlx5_cmd_exec at ffffffffc046b4fb [mlx5_core]\n #13 [ffff89240e1a3ae8] mlx5_core_access_reg at ffffffffc0475434 [mlx5_core]\n #14 [ffff89240e1a3b40] mlx5e_get_fec_caps at ffffffffc04a7348 [mlx5_core]\n #15 [ffff89240e1a3bb0] get_fec_supported_advertised at ffffffffc04992bf [mlx5_core]\n #16 [ffff89240e1a3c08] mlx5e_get_link_ksettings at ffffffffc049ab36 [mlx5_core]\n #17 [ffff89240e1a3ce8] __ethtool_get_link_ksettings at ffffffff8f25db46\n #18 [ffff89240e1a3d48] speed_show at ffffffff8f277208\n #19 [ffff89240e1a3dd8] dev_attr_show at ffffffff8f0b70e3\n #20 [ffff89240e1a3df8] sysfs_kf_seq_show at ffffffff8eedbedf\n #21 [ffff89240e1a3e18] kernfs_seq_show at ffffffff8eeda596\n #22 [ffff89240e1a3e28] seq_read at ffffffff8ee76d10\n #23 [ffff89240e1a3e98] kernfs_fop_read at ffffffff8eedaef5\n #24 [ffff89240e1a3ed8] vfs_read at ffffffff8ee4e3ff\n #25 [ffff89240e1a3f08] sys_read at ffffffff8ee4f27f\n #26 [ffff89240e1a3f50] system_call_fastpath at ffffffff8f395f92\n\n crash\u003e net_device.state ffff89443b0c0000\n state = 0x5 (__LINK_STATE_START| __LINK_STATE_NOCARRIER)\n\nTo prevent this scenario, we also make sure that the netdevice is present.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-48850",
"url": "https://www.suse.com/security/cve/CVE-2022-48850"
},
{
"category": "external",
"summary": "SUSE Bug 1228071 for CVE-2022-48850",
"url": "https://bugzilla.suse.com/1228071"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-14T07:24:46Z",
"details": "moderate"
}
],
"title": "CVE-2022-48850"
},
{
"cve": "CVE-2022-48855",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-48855"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsctp: fix kernel-infoleak for SCTP sockets\n\nsyzbot reported a kernel infoleak [1] of 4 bytes.\n\nAfter analysis, it turned out r-\u003eidiag_expires is not initialized\nif inet_sctp_diag_fill() calls inet_diag_msg_common_fill()\n\nMake sure to clear idiag_timer/idiag_retrans/idiag_expires\nand let inet_diag_msg_sctpasoc_fill() fill them again if needed.\n\n[1]\n\nBUG: KMSAN: kernel-infoleak in instrument_copy_to_user include/linux/instrumented.h:121 [inline]\nBUG: KMSAN: kernel-infoleak in copyout lib/iov_iter.c:154 [inline]\nBUG: KMSAN: kernel-infoleak in _copy_to_iter+0x6ef/0x25a0 lib/iov_iter.c:668\n instrument_copy_to_user include/linux/instrumented.h:121 [inline]\n copyout lib/iov_iter.c:154 [inline]\n _copy_to_iter+0x6ef/0x25a0 lib/iov_iter.c:668\n copy_to_iter include/linux/uio.h:162 [inline]\n simple_copy_to_iter+0xf3/0x140 net/core/datagram.c:519\n __skb_datagram_iter+0x2d5/0x11b0 net/core/datagram.c:425\n skb_copy_datagram_iter+0xdc/0x270 net/core/datagram.c:533\n skb_copy_datagram_msg include/linux/skbuff.h:3696 [inline]\n netlink_recvmsg+0x669/0x1c80 net/netlink/af_netlink.c:1977\n sock_recvmsg_nosec net/socket.c:948 [inline]\n sock_recvmsg net/socket.c:966 [inline]\n __sys_recvfrom+0x795/0xa10 net/socket.c:2097\n __do_sys_recvfrom net/socket.c:2115 [inline]\n __se_sys_recvfrom net/socket.c:2111 [inline]\n __x64_sys_recvfrom+0x19d/0x210 net/socket.c:2111\n do_syscall_x64 arch/x86/entry/common.c:51 [inline]\n do_syscall_64+0x54/0xd0 arch/x86/entry/common.c:82\n entry_SYSCALL_64_after_hwframe+0x44/0xae\n\nUninit was created at:\n slab_post_alloc_hook mm/slab.h:737 [inline]\n slab_alloc_node mm/slub.c:3247 [inline]\n __kmalloc_node_track_caller+0xe0c/0x1510 mm/slub.c:4975\n kmalloc_reserve net/core/skbuff.c:354 [inline]\n __alloc_skb+0x545/0xf90 net/core/skbuff.c:426\n alloc_skb include/linux/skbuff.h:1158 [inline]\n netlink_dump+0x3e5/0x16c0 net/netlink/af_netlink.c:2248\n __netlink_dump_start+0xcf8/0xe90 net/netlink/af_netlink.c:2373\n netlink_dump_start include/linux/netlink.h:254 [inline]\n inet_diag_handler_cmd+0x2e7/0x400 net/ipv4/inet_diag.c:1341\n sock_diag_rcv_msg+0x24a/0x620\n netlink_rcv_skb+0x40c/0x7e0 net/netlink/af_netlink.c:2494\n sock_diag_rcv+0x63/0x80 net/core/sock_diag.c:277\n netlink_unicast_kernel net/netlink/af_netlink.c:1317 [inline]\n netlink_unicast+0x1093/0x1360 net/netlink/af_netlink.c:1343\n netlink_sendmsg+0x14d9/0x1720 net/netlink/af_netlink.c:1919\n sock_sendmsg_nosec net/socket.c:705 [inline]\n sock_sendmsg net/socket.c:725 [inline]\n sock_write_iter+0x594/0x690 net/socket.c:1061\n do_iter_readv_writev+0xa7f/0xc70\n do_iter_write+0x52c/0x1500 fs/read_write.c:851\n vfs_writev fs/read_write.c:924 [inline]\n do_writev+0x645/0xe00 fs/read_write.c:967\n __do_sys_writev fs/read_write.c:1040 [inline]\n __se_sys_writev fs/read_write.c:1037 [inline]\n __x64_sys_writev+0xe5/0x120 fs/read_write.c:1037\n do_syscall_x64 arch/x86/entry/common.c:51 [inline]\n do_syscall_64+0x54/0xd0 arch/x86/entry/common.c:82\n entry_SYSCALL_64_after_hwframe+0x44/0xae\n\nBytes 68-71 of 2508 are uninitialized\nMemory access of size 2508 starts at ffff888114f9b000\nData copied to user address 00007f7fe09ff2e0\n\nCPU: 1 PID: 3478 Comm: syz-executor306 Not tainted 5.17.0-rc4-syzkaller #0\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-48855",
"url": "https://www.suse.com/security/cve/CVE-2022-48855"
},
{
"category": "external",
"summary": "SUSE Bug 1228003 for CVE-2022-48855",
"url": "https://bugzilla.suse.com/1228003"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-14T07:24:46Z",
"details": "moderate"
}
],
"title": "CVE-2022-48855"
},
{
"cve": "CVE-2022-48857",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-48857"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nNFC: port100: fix use-after-free in port100_send_complete\n\nSyzbot reported UAF in port100_send_complete(). The root case is in\nmissing usb_kill_urb() calls on error handling path of -\u003eprobe function.\n\nport100_send_complete() accesses devm allocated memory which will be\nfreed on probe failure. We should kill this urbs before returning an\nerror from probe function to prevent reported use-after-free\n\nFail log:\n\nBUG: KASAN: use-after-free in port100_send_complete+0x16e/0x1a0 drivers/nfc/port100.c:935\nRead of size 1 at addr ffff88801bb59540 by task ksoftirqd/2/26\n...\nCall Trace:\n \u003cTASK\u003e\n __dump_stack lib/dump_stack.c:88 [inline]\n dump_stack_lvl+0xcd/0x134 lib/dump_stack.c:106\n print_address_description.constprop.0.cold+0x8d/0x303 mm/kasan/report.c:255\n __kasan_report mm/kasan/report.c:442 [inline]\n kasan_report.cold+0x83/0xdf mm/kasan/report.c:459\n port100_send_complete+0x16e/0x1a0 drivers/nfc/port100.c:935\n __usb_hcd_giveback_urb+0x2b0/0x5c0 drivers/usb/core/hcd.c:1670\n\n...\n\nAllocated by task 1255:\n kasan_save_stack+0x1e/0x40 mm/kasan/common.c:38\n kasan_set_track mm/kasan/common.c:45 [inline]\n set_alloc_info mm/kasan/common.c:436 [inline]\n ____kasan_kmalloc mm/kasan/common.c:515 [inline]\n ____kasan_kmalloc mm/kasan/common.c:474 [inline]\n __kasan_kmalloc+0xa6/0xd0 mm/kasan/common.c:524\n alloc_dr drivers/base/devres.c:116 [inline]\n devm_kmalloc+0x96/0x1d0 drivers/base/devres.c:823\n devm_kzalloc include/linux/device.h:209 [inline]\n port100_probe+0x8a/0x1320 drivers/nfc/port100.c:1502\n\nFreed by task 1255:\n kasan_save_stack+0x1e/0x40 mm/kasan/common.c:38\n kasan_set_track+0x21/0x30 mm/kasan/common.c:45\n kasan_set_free_info+0x20/0x30 mm/kasan/generic.c:370\n ____kasan_slab_free mm/kasan/common.c:366 [inline]\n ____kasan_slab_free+0xff/0x140 mm/kasan/common.c:328\n kasan_slab_free include/linux/kasan.h:236 [inline]\n __cache_free mm/slab.c:3437 [inline]\n kfree+0xf8/0x2b0 mm/slab.c:3794\n release_nodes+0x112/0x1a0 drivers/base/devres.c:501\n devres_release_all+0x114/0x190 drivers/base/devres.c:530\n really_probe+0x626/0xcc0 drivers/base/dd.c:670",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-48857",
"url": "https://www.suse.com/security/cve/CVE-2022-48857"
},
{
"category": "external",
"summary": "SUSE Bug 1228005 for CVE-2022-48857",
"url": "https://bugzilla.suse.com/1228005"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-14T07:24:46Z",
"details": "moderate"
}
],
"title": "CVE-2022-48857"
},
{
"cve": "CVE-2022-48860",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-48860"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nethernet: Fix error handling in xemaclite_of_probe\n\nThis node pointer is returned by of_parse_phandle() with refcount\nincremented in this function. Calling of_node_put() to avoid the\nrefcount leak. As the remove function do.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-48860",
"url": "https://www.suse.com/security/cve/CVE-2022-48860"
},
{
"category": "external",
"summary": "SUSE Bug 1228008 for CVE-2022-48860",
"url": "https://bugzilla.suse.com/1228008"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-14T07:24:46Z",
"details": "moderate"
}
],
"title": "CVE-2022-48860"
},
{
"cve": "CVE-2022-48863",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-48863"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmISDN: Fix memory leak in dsp_pipeline_build()\n\ndsp_pipeline_build() allocates dup pointer by kstrdup(cfg),\nbut then it updates dup variable by strsep(\u0026dup, \"|\").\nAs a result when it calls kfree(dup), the dup variable contains NULL.\n\nFound by Linux Driver Verification project (linuxtesting.org) with SVACE.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-48863",
"url": "https://www.suse.com/security/cve/CVE-2022-48863"
},
{
"category": "external",
"summary": "SUSE Bug 1228063 for CVE-2022-48863",
"url": "https://bugzilla.suse.com/1228063"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-14T07:24:46Z",
"details": "moderate"
}
],
"title": "CVE-2022-48863"
},
{
"cve": "CVE-2023-4244",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-4244"
}
],
"notes": [
{
"category": "general",
"text": "A use-after-free vulnerability in the Linux kernel\u0027s netfilter: nf_tables component can be exploited to achieve local privilege escalation.\n\nDue to a race condition between nf_tables netlink control plane transaction and nft_set element garbage collection, it is possible to underflow the reference counter causing a use-after-free vulnerability.\n\nWe recommend upgrading past commit 3e91b0ebd994635df2346353322ac51ce84ce6d8.\n\n",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-4244",
"url": "https://www.suse.com/security/cve/CVE-2023-4244"
},
{
"category": "external",
"summary": "SUSE Bug 1215420 for CVE-2023-4244",
"url": "https://bugzilla.suse.com/1215420"
},
{
"category": "external",
"summary": "SUSE Bug 1215424 for CVE-2023-4244",
"url": "https://bugzilla.suse.com/1215424"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-14T07:24:46Z",
"details": "moderate"
}
],
"title": "CVE-2023-4244"
},
{
"cve": "CVE-2023-52435",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-52435"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: prevent mss overflow in skb_segment()\n\nOnce again syzbot is able to crash the kernel in skb_segment() [1]\n\nGSO_BY_FRAGS is a forbidden value, but unfortunately the following\ncomputation in skb_segment() can reach it quite easily :\n\n\tmss = mss * partial_segs;\n\n65535 = 3 * 5 * 17 * 257, so many initial values of mss can lead to\na bad final result.\n\nMake sure to limit segmentation so that the new mss value is smaller\nthan GSO_BY_FRAGS.\n\n[1]\n\ngeneral protection fault, probably for non-canonical address 0xdffffc000000000e: 0000 [#1] PREEMPT SMP KASAN\nKASAN: null-ptr-deref in range [0x0000000000000070-0x0000000000000077]\nCPU: 1 PID: 5079 Comm: syz-executor993 Not tainted 6.7.0-rc4-syzkaller-00141-g1ae4cd3cbdd0 #0\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/10/2023\nRIP: 0010:skb_segment+0x181d/0x3f30 net/core/skbuff.c:4551\nCode: 83 e3 02 e9 fb ed ff ff e8 90 68 1c f9 48 8b 84 24 f8 00 00 00 48 8d 78 70 48 b8 00 00 00 00 00 fc ff df 48 89 fa 48 c1 ea 03 \u003c0f\u003e b6 04 02 84 c0 74 08 3c 03 0f 8e 8a 21 00 00 48 8b 84 24 f8 00\nRSP: 0018:ffffc900043473d0 EFLAGS: 00010202\nRAX: dffffc0000000000 RBX: 0000000000010046 RCX: ffffffff886b1597\nRDX: 000000000000000e RSI: ffffffff886b2520 RDI: 0000000000000070\nRBP: ffffc90004347578 R08: 0000000000000005 R09: 000000000000ffff\nR10: 000000000000ffff R11: 0000000000000002 R12: ffff888063202ac0\nR13: 0000000000010000 R14: 000000000000ffff R15: 0000000000000046\nFS: 0000555556e7e380(0000) GS:ffff8880b9900000(0000) knlGS:0000000000000000\nCS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 0000000020010000 CR3: 0000000027ee2000 CR4: 00000000003506f0\nDR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\nDR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\nCall Trace:\n\u003cTASK\u003e\nudp6_ufo_fragment+0xa0e/0xd00 net/ipv6/udp_offload.c:109\nipv6_gso_segment+0x534/0x17e0 net/ipv6/ip6_offload.c:120\nskb_mac_gso_segment+0x290/0x610 net/core/gso.c:53\n__skb_gso_segment+0x339/0x710 net/core/gso.c:124\nskb_gso_segment include/net/gso.h:83 [inline]\nvalidate_xmit_skb+0x36c/0xeb0 net/core/dev.c:3626\n__dev_queue_xmit+0x6f3/0x3d60 net/core/dev.c:4338\ndev_queue_xmit include/linux/netdevice.h:3134 [inline]\npacket_xmit+0x257/0x380 net/packet/af_packet.c:276\npacket_snd net/packet/af_packet.c:3087 [inline]\npacket_sendmsg+0x24c6/0x5220 net/packet/af_packet.c:3119\nsock_sendmsg_nosec net/socket.c:730 [inline]\n__sock_sendmsg+0xd5/0x180 net/socket.c:745\n__sys_sendto+0x255/0x340 net/socket.c:2190\n__do_sys_sendto net/socket.c:2202 [inline]\n__se_sys_sendto net/socket.c:2198 [inline]\n__x64_sys_sendto+0xe0/0x1b0 net/socket.c:2198\ndo_syscall_x64 arch/x86/entry/common.c:52 [inline]\ndo_syscall_64+0x40/0x110 arch/x86/entry/common.c:83\nentry_SYSCALL_64_after_hwframe+0x63/0x6b\nRIP: 0033:0x7f8692032aa9\nCode: 28 00 00 00 75 05 48 83 c4 28 c3 e8 d1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 \u003c48\u003e 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48\nRSP: 002b:00007fff8d685418 EFLAGS: 00000246 ORIG_RAX: 000000000000002c\nRAX: ffffffffffffffda RBX: 0000000000000003 RCX: 00007f8692032aa9\nRDX: 0000000000010048 RSI: 00000000200000c0 RDI: 0000000000000003\nRBP: 00000000000f4240 R08: 0000000020000540 R09: 0000000000000014\nR10: 0000000000000000 R11: 0000000000000246 R12: 00007fff8d685480\nR13: 0000000000000001 R14: 00007fff8d685480 R15: 0000000000000003\n\u003c/TASK\u003e\nModules linked in:\n---[ end trace 0000000000000000 ]---\nRIP: 0010:skb_segment+0x181d/0x3f30 net/core/skbuff.c:4551\nCode: 83 e3 02 e9 fb ed ff ff e8 90 68 1c f9 48 8b 84 24 f8 00 00 00 48 8d 78 70 48 b8 00 00 00 00 00 fc ff df 48 89 fa 48 c1 ea 03 \u003c0f\u003e b6 04 02 84 c0 74 08 3c 03 0f 8e 8a 21 00 00 48 8b 84 24 f8 00\nRSP: 0018:ffffc900043473d0 EFLAGS: 00010202\nRAX: dffffc0000000000 RBX: 0000000000010046 RCX: ffffffff886b1597\nRDX: 000000000000000e RSI: ffffffff886b2520 RDI: 0000000000000070\nRBP: ffffc90004347578 R0\n---truncated---",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-52435",
"url": "https://www.suse.com/security/cve/CVE-2023-52435"
},
{
"category": "external",
"summary": "SUSE Bug 1220138 for CVE-2023-52435",
"url": "https://bugzilla.suse.com/1220138"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-14T07:24:46Z",
"details": "moderate"
}
],
"title": "CVE-2023-52435"
},
{
"cve": "CVE-2023-52507",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-52507"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnfc: nci: assert requested protocol is valid\n\nThe protocol is used in a bit mask to determine if the protocol is\nsupported. Assert the provided protocol is less than the maximum\ndefined so it doesn\u0027t potentially perform a shift-out-of-bounds and\nprovide a clearer error for undefined protocols vs unsupported ones.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-52507",
"url": "https://www.suse.com/security/cve/CVE-2023-52507"
},
{
"category": "external",
"summary": "SUSE Bug 1220833 for CVE-2023-52507",
"url": "https://bugzilla.suse.com/1220833"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-14T07:24:46Z",
"details": "moderate"
}
],
"title": "CVE-2023-52507"
},
{
"cve": "CVE-2023-52594",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-52594"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: ath9k: Fix potential array-index-out-of-bounds read in ath9k_htc_txstatus()\n\nFix an array-index-out-of-bounds read in ath9k_htc_txstatus(). The bug\noccurs when txs-\u003ecnt, data from a URB provided by a USB device, is\nbigger than the size of the array txs-\u003etxstatus, which is\nHTC_MAX_TX_STATUS. WARN_ON() already checks it, but there is no bug\nhandling code after the check. Make the function return if that is the\ncase.\n\nFound by a modified version of syzkaller.\n\nUBSAN: array-index-out-of-bounds in htc_drv_txrx.c\nindex 13 is out of range for type \u0027__wmi_event_txstatus [12]\u0027\nCall Trace:\n ath9k_htc_txstatus\n ath9k_wmi_event_tasklet\n tasklet_action_common\n __do_softirq\n irq_exit_rxu\n sysvec_apic_timer_interrupt",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-52594",
"url": "https://www.suse.com/security/cve/CVE-2023-52594"
},
{
"category": "external",
"summary": "SUSE Bug 1221045 for CVE-2023-52594",
"url": "https://bugzilla.suse.com/1221045"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-14T07:24:46Z",
"details": "moderate"
}
],
"title": "CVE-2023-52594"
},
{
"cve": "CVE-2023-52612",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-52612"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncrypto: scomp - fix req-\u003edst buffer overflow\n\nThe req-\u003edst buffer size should be checked before copying from the\nscomp_scratch-\u003edst to avoid req-\u003edst buffer overflow problem.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-52612",
"url": "https://www.suse.com/security/cve/CVE-2023-52612"
},
{
"category": "external",
"summary": "SUSE Bug 1221616 for CVE-2023-52612",
"url": "https://bugzilla.suse.com/1221616"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-14T07:24:46Z",
"details": "important"
}
],
"title": "CVE-2023-52612"
},
{
"cve": "CVE-2023-52615",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-52615"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nhwrng: core - Fix page fault dead lock on mmap-ed hwrng\n\nThere is a dead-lock in the hwrng device read path. This triggers\nwhen the user reads from /dev/hwrng into memory also mmap-ed from\n/dev/hwrng. The resulting page fault triggers a recursive read\nwhich then dead-locks.\n\nFix this by using a stack buffer when calling copy_to_user.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-52615",
"url": "https://www.suse.com/security/cve/CVE-2023-52615"
},
{
"category": "external",
"summary": "SUSE Bug 1221614 for CVE-2023-52615",
"url": "https://bugzilla.suse.com/1221614"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-14T07:24:46Z",
"details": "moderate"
}
],
"title": "CVE-2023-52615"
},
{
"cve": "CVE-2023-52619",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-52619"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\npstore/ram: Fix crash when setting number of cpus to an odd number\n\nWhen the number of cpu cores is adjusted to 7 or other odd numbers,\nthe zone size will become an odd number.\nThe address of the zone will become:\n addr of zone0 = BASE\n addr of zone1 = BASE + zone_size\n addr of zone2 = BASE + zone_size*2\n ...\nThe address of zone1/3/5/7 will be mapped to non-alignment va.\nEventually crashes will occur when accessing these va.\n\nSo, use ALIGN_DOWN() to make sure the zone size is even\nto avoid this bug.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-52619",
"url": "https://www.suse.com/security/cve/CVE-2023-52619"
},
{
"category": "external",
"summary": "SUSE Bug 1221618 for CVE-2023-52619",
"url": "https://bugzilla.suse.com/1221618"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-14T07:24:46Z",
"details": "moderate"
}
],
"title": "CVE-2023-52619"
},
{
"cve": "CVE-2023-52623",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-52623"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nSUNRPC: Fix a suspicious RCU usage warning\n\nI received the following warning while running cthon against an ontap\nserver running pNFS:\n\n[ 57.202521] =============================\n[ 57.202522] WARNING: suspicious RCU usage\n[ 57.202523] 6.7.0-rc3-g2cc14f52aeb7 #41492 Not tainted\n[ 57.202525] -----------------------------\n[ 57.202525] net/sunrpc/xprtmultipath.c:349 RCU-list traversed in non-reader section!!\n[ 57.202527]\n other info that might help us debug this:\n\n[ 57.202528]\n rcu_scheduler_active = 2, debug_locks = 1\n[ 57.202529] no locks held by test5/3567.\n[ 57.202530]\n stack backtrace:\n[ 57.202532] CPU: 0 PID: 3567 Comm: test5 Not tainted 6.7.0-rc3-g2cc14f52aeb7 #41492 5b09971b4965c0aceba19f3eea324a4a806e227e\n[ 57.202534] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS unknown 2/2/2022\n[ 57.202536] Call Trace:\n[ 57.202537] \u003cTASK\u003e\n[ 57.202540] dump_stack_lvl+0x77/0xb0\n[ 57.202551] lockdep_rcu_suspicious+0x154/0x1a0\n[ 57.202556] rpc_xprt_switch_has_addr+0x17c/0x190 [sunrpc ebe02571b9a8ceebf7d98e71675af20c19bdb1f6]\n[ 57.202596] rpc_clnt_setup_test_and_add_xprt+0x50/0x180 [sunrpc ebe02571b9a8ceebf7d98e71675af20c19bdb1f6]\n[ 57.202621] ? rpc_clnt_add_xprt+0x254/0x300 [sunrpc ebe02571b9a8ceebf7d98e71675af20c19bdb1f6]\n[ 57.202646] rpc_clnt_add_xprt+0x27a/0x300 [sunrpc ebe02571b9a8ceebf7d98e71675af20c19bdb1f6]\n[ 57.202671] ? __pfx_rpc_clnt_setup_test_and_add_xprt+0x10/0x10 [sunrpc ebe02571b9a8ceebf7d98e71675af20c19bdb1f6]\n[ 57.202696] nfs4_pnfs_ds_connect+0x345/0x760 [nfsv4 c716d88496ded0ea6d289bbea684fa996f9b57a9]\n[ 57.202728] ? __pfx_nfs4_test_session_trunk+0x10/0x10 [nfsv4 c716d88496ded0ea6d289bbea684fa996f9b57a9]\n[ 57.202754] nfs4_fl_prepare_ds+0x75/0xc0 [nfs_layout_nfsv41_files e3a4187f18ae8a27b630f9feae6831b584a9360a]\n[ 57.202760] filelayout_write_pagelist+0x4a/0x200 [nfs_layout_nfsv41_files e3a4187f18ae8a27b630f9feae6831b584a9360a]\n[ 57.202765] pnfs_generic_pg_writepages+0xbe/0x230 [nfsv4 c716d88496ded0ea6d289bbea684fa996f9b57a9]\n[ 57.202788] __nfs_pageio_add_request+0x3fd/0x520 [nfs 6c976fa593a7c2976f5a0aeb4965514a828e6902]\n[ 57.202813] nfs_pageio_add_request+0x18b/0x390 [nfs 6c976fa593a7c2976f5a0aeb4965514a828e6902]\n[ 57.202831] nfs_do_writepage+0x116/0x1e0 [nfs 6c976fa593a7c2976f5a0aeb4965514a828e6902]\n[ 57.202849] nfs_writepages_callback+0x13/0x30 [nfs 6c976fa593a7c2976f5a0aeb4965514a828e6902]\n[ 57.202866] write_cache_pages+0x265/0x450\n[ 57.202870] ? __pfx_nfs_writepages_callback+0x10/0x10 [nfs 6c976fa593a7c2976f5a0aeb4965514a828e6902]\n[ 57.202891] nfs_writepages+0x141/0x230 [nfs 6c976fa593a7c2976f5a0aeb4965514a828e6902]\n[ 57.202913] do_writepages+0xd2/0x230\n[ 57.202917] ? filemap_fdatawrite_wbc+0x5c/0x80\n[ 57.202921] filemap_fdatawrite_wbc+0x67/0x80\n[ 57.202924] filemap_write_and_wait_range+0xd9/0x170\n[ 57.202930] nfs_wb_all+0x49/0x180 [nfs 6c976fa593a7c2976f5a0aeb4965514a828e6902]\n[ 57.202947] nfs4_file_flush+0x72/0xb0 [nfsv4 c716d88496ded0ea6d289bbea684fa996f9b57a9]\n[ 57.202969] __se_sys_close+0x46/0xd0\n[ 57.202972] do_syscall_64+0x68/0x100\n[ 57.202975] ? do_syscall_64+0x77/0x100\n[ 57.202976] ? do_syscall_64+0x77/0x100\n[ 57.202979] entry_SYSCALL_64_after_hwframe+0x6e/0x76\n[ 57.202982] RIP: 0033:0x7fe2b12e4a94\n[ 57.202985] Code: 00 f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e fa 80 3d d5 18 0e 00 00 74 13 b8 03 00 00 00 0f 05 \u003c48\u003e 3d 00 f0 ff ff 77 44 c3 0f 1f 00 48 83 ec 18 89 7c 24 0c e8 c3\n[ 57.202987] RSP: 002b:00007ffe857ddb38 EFLAGS: 00000202 ORIG_RAX: 0000000000000003\n[ 57.202989] RAX: ffffffffffffffda RBX: 00007ffe857dfd68 RCX: 00007fe2b12e4a94\n[ 57.202991] RDX: 0000000000002000 RSI: 00007ffe857ddc40 RDI: 0000000000000003\n[ 57.202992] RBP: 00007ffe857dfc50 R08: 7fffffffffffffff R09: 0000000065650f49\n[ 57.202993] R10: 00007f\n---truncated---",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-52623",
"url": "https://www.suse.com/security/cve/CVE-2023-52623"
},
{
"category": "external",
"summary": "SUSE Bug 1222060 for CVE-2023-52623",
"url": "https://bugzilla.suse.com/1222060"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-14T07:24:46Z",
"details": "moderate"
}
],
"title": "CVE-2023-52623"
},
{
"cve": "CVE-2023-52669",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-52669"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncrypto: s390/aes - Fix buffer overread in CTR mode\n\nWhen processing the last block, the s390 ctr code will always read\na whole block, even if there isn\u0027t a whole block of data left. Fix\nthis by using the actual length left and copy it into a buffer first\nfor processing.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-52669",
"url": "https://www.suse.com/security/cve/CVE-2023-52669"
},
{
"category": "external",
"summary": "SUSE Bug 1224637 for CVE-2023-52669",
"url": "https://bugzilla.suse.com/1224637"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-14T07:24:46Z",
"details": "moderate"
}
],
"title": "CVE-2023-52669"
},
{
"cve": "CVE-2023-52683",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-52683"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nACPI: LPIT: Avoid u32 multiplication overflow\n\nIn lpit_update_residency() there is a possibility of overflow\nin multiplication, if tsc_khz is large enough (\u003e UINT_MAX/1000).\n\nChange multiplication to mul_u32_u32().\n\nFound by Linux Verification Center (linuxtesting.org) with SVACE.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-52683",
"url": "https://www.suse.com/security/cve/CVE-2023-52683"
},
{
"category": "external",
"summary": "SUSE Bug 1224627 for CVE-2023-52683",
"url": "https://bugzilla.suse.com/1224627"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-14T07:24:46Z",
"details": "moderate"
}
],
"title": "CVE-2023-52683"
},
{
"cve": "CVE-2023-52693",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-52693"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nACPI: video: check for error while searching for backlight device parent\n\nIf acpi_get_parent() called in acpi_video_dev_register_backlight()\nfails, for example, because acpi_ut_acquire_mutex() fails inside\nacpi_get_parent), this can lead to incorrect (uninitialized)\nacpi_parent handle being passed to acpi_get_pci_dev() for detecting\nthe parent pci device.\n\nCheck acpi_get_parent() result and set parent device only in case of success.\n\nFound by Linux Verification Center (linuxtesting.org) with SVACE.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-52693",
"url": "https://www.suse.com/security/cve/CVE-2023-52693"
},
{
"category": "external",
"summary": "SUSE Bug 1224686 for CVE-2023-52693",
"url": "https://bugzilla.suse.com/1224686"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-14T07:24:46Z",
"details": "moderate"
}
],
"title": "CVE-2023-52693"
},
{
"cve": "CVE-2023-52743",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-52743"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nice: Do not use WQ_MEM_RECLAIM flag for workqueue\n\nWhen both ice and the irdma driver are loaded, a warning in\ncheck_flush_dependency is being triggered. This is due to ice driver\nworkqueue being allocated with the WQ_MEM_RECLAIM flag and the irdma one\nis not.\n\nAccording to kernel documentation, this flag should be set if the\nworkqueue will be involved in the kernel\u0027s memory reclamation flow.\nSince it is not, there is no need for the ice driver\u0027s WQ to have this\nflag set so remove it.\n\nExample trace:\n\n[ +0.000004] workqueue: WQ_MEM_RECLAIM ice:ice_service_task [ice] is flushing !WQ_MEM_RECLAIM infiniband:0x0\n[ +0.000139] WARNING: CPU: 0 PID: 728 at kernel/workqueue.c:2632 check_flush_dependency+0x178/0x1a0\n[ +0.000011] Modules linked in: bonding tls xt_CHECKSUM xt_MASQUERADE xt_conntrack ipt_REJECT nf_reject_ipv4 nft_compat nft_cha\nin_nat nf_nat nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 nf_tables nfnetlink bridge stp llc rfkill vfat fat intel_rapl_msr intel\n_rapl_common isst_if_common skx_edac nfit libnvdimm x86_pkg_temp_thermal intel_powerclamp coretemp kvm_intel kvm irqbypass crct1\n0dif_pclmul crc32_pclmul ghash_clmulni_intel rapl intel_cstate rpcrdma sunrpc rdma_ucm ib_srpt ib_isert iscsi_target_mod target_\ncore_mod ib_iser libiscsi scsi_transport_iscsi rdma_cm ib_cm iw_cm iTCO_wdt iTCO_vendor_support ipmi_ssif irdma mei_me ib_uverbs\nib_core intel_uncore joydev pcspkr i2c_i801 acpi_ipmi mei lpc_ich i2c_smbus intel_pch_thermal ioatdma ipmi_si acpi_power_meter\nacpi_pad xfs libcrc32c sd_mod t10_pi crc64_rocksoft crc64 sg ahci ixgbe libahci ice i40e igb crc32c_intel mdio i2c_algo_bit liba\nta dca wmi dm_mirror dm_region_hash dm_log dm_mod ipmi_devintf ipmi_msghandler fuse\n[ +0.000161] [last unloaded: bonding]\n[ +0.000006] CPU: 0 PID: 728 Comm: kworker/0:2 Tainted: G S 6.2.0-rc2_next-queue-13jan-00458-gc20aabd57164 #1\n[ +0.000006] Hardware name: Intel Corporation S2600WFT/S2600WFT, BIOS SE5C620.86B.02.01.0010.010620200716 01/06/2020\n[ +0.000003] Workqueue: ice ice_service_task [ice]\n[ +0.000127] RIP: 0010:check_flush_dependency+0x178/0x1a0\n[ +0.000005] Code: 89 8e 02 01 e8 49 3d 40 00 49 8b 55 18 48 8d 8d d0 00 00 00 48 8d b3 d0 00 00 00 4d 89 e0 48 c7 c7 e0 3b 08\n9f e8 bb d3 07 01 \u003c0f\u003e 0b e9 be fe ff ff 80 3d 24 89 8e 02 00 0f 85 6b ff ff ff e9 06\n[ +0.000004] RSP: 0018:ffff88810a39f990 EFLAGS: 00010282\n[ +0.000005] RAX: 0000000000000000 RBX: ffff888141bc2400 RCX: 0000000000000000\n[ +0.000004] RDX: 0000000000000001 RSI: dffffc0000000000 RDI: ffffffffa1213a80\n[ +0.000003] RBP: ffff888194bf3400 R08: ffffed117b306112 R09: ffffed117b306112\n[ +0.000003] R10: ffff888bd983088b R11: ffffed117b306111 R12: 0000000000000000\n[ +0.000003] R13: ffff888111f84d00 R14: ffff88810a3943ac R15: ffff888194bf3400\n[ +0.000004] FS: 0000000000000000(0000) GS:ffff888bd9800000(0000) knlGS:0000000000000000\n[ +0.000003] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n[ +0.000003] CR2: 000056035b208b60 CR3: 000000017795e005 CR4: 00000000007706f0\n[ +0.000003] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\n[ +0.000003] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\n[ +0.000002] PKRU: 55555554\n[ +0.000003] Call Trace:\n[ +0.000002] \u003cTASK\u003e\n[ +0.000003] __flush_workqueue+0x203/0x840\n[ +0.000006] ? mutex_unlock+0x84/0xd0\n[ +0.000008] ? __pfx_mutex_unlock+0x10/0x10\n[ +0.000004] ? __pfx___flush_workqueue+0x10/0x10\n[ +0.000006] ? mutex_lock+0xa3/0xf0\n[ +0.000005] ib_cache_cleanup_one+0x39/0x190 [ib_core]\n[ +0.000174] __ib_unregister_device+0x84/0xf0 [ib_core]\n[ +0.000094] ib_unregister_device+0x25/0x30 [ib_core]\n[ +0.000093] irdma_ib_unregister_device+0x97/0xc0 [irdma]\n[ +0.000064] ? __pfx_irdma_ib_unregister_device+0x10/0x10 [irdma]\n[ +0.000059] ? up_write+0x5c/0x90\n[ +0.000005] irdma_remove+0x36/0x90 [irdma]\n[ +0.000062] auxiliary_bus_remove+0x32/0x50\n[ +0.000007] device_r\n---truncated---",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-52743",
"url": "https://www.suse.com/security/cve/CVE-2023-52743"
},
{
"category": "external",
"summary": "SUSE Bug 1225003 for CVE-2023-52743",
"url": "https://bugzilla.suse.com/1225003"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-14T07:24:46Z",
"details": "low"
}
],
"title": "CVE-2023-52743"
},
{
"cve": "CVE-2023-52753",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-52753"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amd/display: Avoid NULL dereference of timing generator\n\n[Why \u0026 How]\nCheck whether assigned timing generator is NULL or not before\naccessing its funcs to prevent NULL dereference.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-52753",
"url": "https://www.suse.com/security/cve/CVE-2023-52753"
},
{
"category": "external",
"summary": "SUSE Bug 1225478 for CVE-2023-52753",
"url": "https://bugzilla.suse.com/1225478"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-14T07:24:46Z",
"details": "moderate"
}
],
"title": "CVE-2023-52753"
},
{
"cve": "CVE-2023-52817",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-52817"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amdgpu: Fix a null pointer access when the smc_rreg pointer is NULL\n\nIn certain types of chips, such as VEGA20, reading the amdgpu_regs_smc file could result in an abnormal null pointer access when the smc_rreg pointer is NULL. Below are the steps to reproduce this issue and the corresponding exception log:\n\n1. Navigate to the directory: /sys/kernel/debug/dri/0\n2. Execute command: cat amdgpu_regs_smc\n3. Exception Log::\n[4005007.702554] BUG: kernel NULL pointer dereference, address: 0000000000000000\n[4005007.702562] #PF: supervisor instruction fetch in kernel mode\n[4005007.702567] #PF: error_code(0x0010) - not-present page\n[4005007.702570] PGD 0 P4D 0\n[4005007.702576] Oops: 0010 [#1] SMP NOPTI\n[4005007.702581] CPU: 4 PID: 62563 Comm: cat Tainted: G OE 5.15.0-43-generic #46-Ubunt u\n[4005007.702590] RIP: 0010:0x0\n[4005007.702598] Code: Unable to access opcode bytes at RIP 0xffffffffffffffd6.\n[4005007.702600] RSP: 0018:ffffa82b46d27da0 EFLAGS: 00010206\n[4005007.702605] RAX: 0000000000000000 RBX: 0000000000000000 RCX: ffffa82b46d27e68\n[4005007.702609] RDX: 0000000000000001 RSI: 0000000000000000 RDI: ffff9940656e0000\n[4005007.702612] RBP: ffffa82b46d27dd8 R08: 0000000000000000 R09: ffff994060c07980\n[4005007.702615] R10: 0000000000020000 R11: 0000000000000000 R12: 00007f5e06753000\n[4005007.702618] R13: ffff9940656e0000 R14: ffffa82b46d27e68 R15: 00007f5e06753000\n[4005007.702622] FS: 00007f5e0755b740(0000) GS:ffff99479d300000(0000) knlGS:0000000000000000\n[4005007.702626] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n[4005007.702629] CR2: ffffffffffffffd6 CR3: 00000003253fc000 CR4: 00000000003506e0\n[4005007.702633] Call Trace:\n[4005007.702636] \u003cTASK\u003e\n[4005007.702640] amdgpu_debugfs_regs_smc_read+0xb0/0x120 [amdgpu]\n[4005007.703002] full_proxy_read+0x5c/0x80\n[4005007.703011] vfs_read+0x9f/0x1a0\n[4005007.703019] ksys_read+0x67/0xe0\n[4005007.703023] __x64_sys_read+0x19/0x20\n[4005007.703028] do_syscall_64+0x5c/0xc0\n[4005007.703034] ? do_user_addr_fault+0x1e3/0x670\n[4005007.703040] ? exit_to_user_mode_prepare+0x37/0xb0\n[4005007.703047] ? irqentry_exit_to_user_mode+0x9/0x20\n[4005007.703052] ? irqentry_exit+0x19/0x30\n[4005007.703057] ? exc_page_fault+0x89/0x160\n[4005007.703062] ? asm_exc_page_fault+0x8/0x30\n[4005007.703068] entry_SYSCALL_64_after_hwframe+0x44/0xae\n[4005007.703075] RIP: 0033:0x7f5e07672992\n[4005007.703079] Code: c0 e9 b2 fe ff ff 50 48 8d 3d fa b2 0c 00 e8 c5 1d 02 00 0f 1f 44 00 00 f3 0f 1e fa 64 8b 04 25 18 00 00 00 85 c0 75 10 0f 05 \u003c48\u003e 3d 00 f0 ff ff 77 56 c3 0f 1f 44 00 00 48 83 e c 28 48 89 54 24\n[4005007.703083] RSP: 002b:00007ffe03097898 EFLAGS: 00000246 ORIG_RAX: 0000000000000000\n[4005007.703088] RAX: ffffffffffffffda RBX: 0000000000020000 RCX: 00007f5e07672992\n[4005007.703091] RDX: 0000000000020000 RSI: 00007f5e06753000 RDI: 0000000000000003\n[4005007.703094] RBP: 00007f5e06753000 R08: 00007f5e06752010 R09: 00007f5e06752010\n[4005007.703096] R10: 0000000000000022 R11: 0000000000000246 R12: 0000000000022000\n[4005007.703099] R13: 0000000000000003 R14: 0000000000020000 R15: 0000000000020000\n[4005007.703105] \u003c/TASK\u003e\n[4005007.703107] Modules linked in: nf_tables libcrc32c nfnetlink algif_hash af_alg binfmt_misc nls_ iso8859_1 ipmi_ssif ast intel_rapl_msr intel_rapl_common drm_vram_helper drm_ttm_helper amd64_edac t tm edac_mce_amd kvm_amd ccp mac_hid k10temp kvm acpi_ipmi ipmi_si rapl sch_fq_codel ipmi_devintf ipm i_msghandler msr parport_pc ppdev lp parport mtd pstore_blk efi_pstore ramoops pstore_zone reed_solo mon ip_tables x_tables autofs4 ib_uverbs ib_core amdgpu(OE) amddrm_ttm_helper(OE) amdttm(OE) iommu_v 2 amd_sched(OE) amdkcl(OE) drm_kms_helper syscopyarea sysfillrect sysimgblt fb_sys_fops cec rc_core drm igb ahci xhci_pci libahci i2c_piix4 i2c_algo_bit xhci_pci_renesas dca\n[4005007.703184] CR2: 0000000000000000\n[4005007.703188] ---[ en\n---truncated---",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-52817",
"url": "https://www.suse.com/security/cve/CVE-2023-52817"
},
{
"category": "external",
"summary": "SUSE Bug 1225569 for CVE-2023-52817",
"url": "https://bugzilla.suse.com/1225569"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-14T07:24:46Z",
"details": "moderate"
}
],
"title": "CVE-2023-52817"
},
{
"cve": "CVE-2023-52818",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-52818"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amd: Fix UBSAN array-index-out-of-bounds for SMU7\n\nFor pptable structs that use flexible array sizes, use flexible arrays.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-52818",
"url": "https://www.suse.com/security/cve/CVE-2023-52818"
},
{
"category": "external",
"summary": "SUSE Bug 1225530 for CVE-2023-52818",
"url": "https://bugzilla.suse.com/1225530"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-14T07:24:46Z",
"details": "moderate"
}
],
"title": "CVE-2023-52818"
},
{
"cve": "CVE-2023-52819",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-52819"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amd: Fix UBSAN array-index-out-of-bounds for Polaris and Tonga\n\nFor pptable structs that use flexible array sizes, use flexible arrays.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-52819",
"url": "https://www.suse.com/security/cve/CVE-2023-52819"
},
{
"category": "external",
"summary": "SUSE Bug 1225532 for CVE-2023-52819",
"url": "https://bugzilla.suse.com/1225532"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-14T07:24:46Z",
"details": "moderate"
}
],
"title": "CVE-2023-52819"
},
{
"cve": "CVE-2023-52885",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-52885"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nSUNRPC: Fix UAF in svc_tcp_listen_data_ready()\n\nAfter the listener svc_sock is freed, and before invoking svc_tcp_accept()\nfor the established child sock, there is a window that the newsock\nretaining a freed listener svc_sock in sk_user_data which cloning from\nparent. In the race window, if data is received on the newsock, we will\nobserve use-after-free report in svc_tcp_listen_data_ready().\n\nReproduce by two tasks:\n\n1. while :; do rpc.nfsd 0 ; rpc.nfsd; done\n2. while :; do echo \"\" | ncat -4 127.0.0.1 2049 ; done\n\nKASAN report:\n\n ==================================================================\n BUG: KASAN: slab-use-after-free in svc_tcp_listen_data_ready+0x1cf/0x1f0 [sunrpc]\n Read of size 8 at addr ffff888139d96228 by task nc/102553\n CPU: 7 PID: 102553 Comm: nc Not tainted 6.3.0+ #18\n Hardware name: VMware, Inc. VMware Virtual Platform/440BX Desktop Reference Platform, BIOS 6.00 11/12/2020\n Call Trace:\n \u003cIRQ\u003e\n dump_stack_lvl+0x33/0x50\n print_address_description.constprop.0+0x27/0x310\n print_report+0x3e/0x70\n kasan_report+0xae/0xe0\n svc_tcp_listen_data_ready+0x1cf/0x1f0 [sunrpc]\n tcp_data_queue+0x9f4/0x20e0\n tcp_rcv_established+0x666/0x1f60\n tcp_v4_do_rcv+0x51c/0x850\n tcp_v4_rcv+0x23fc/0x2e80\n ip_protocol_deliver_rcu+0x62/0x300\n ip_local_deliver_finish+0x267/0x350\n ip_local_deliver+0x18b/0x2d0\n ip_rcv+0x2fb/0x370\n __netif_receive_skb_one_core+0x166/0x1b0\n process_backlog+0x24c/0x5e0\n __napi_poll+0xa2/0x500\n net_rx_action+0x854/0xc90\n __do_softirq+0x1bb/0x5de\n do_softirq+0xcb/0x100\n \u003c/IRQ\u003e\n \u003cTASK\u003e\n ...\n \u003c/TASK\u003e\n\n Allocated by task 102371:\n kasan_save_stack+0x1e/0x40\n kasan_set_track+0x21/0x30\n __kasan_kmalloc+0x7b/0x90\n svc_setup_socket+0x52/0x4f0 [sunrpc]\n svc_addsock+0x20d/0x400 [sunrpc]\n __write_ports_addfd+0x209/0x390 [nfsd]\n write_ports+0x239/0x2c0 [nfsd]\n nfsctl_transaction_write+0xac/0x110 [nfsd]\n vfs_write+0x1c3/0xae0\n ksys_write+0xed/0x1c0\n do_syscall_64+0x38/0x90\n entry_SYSCALL_64_after_hwframe+0x72/0xdc\n\n Freed by task 102551:\n kasan_save_stack+0x1e/0x40\n kasan_set_track+0x21/0x30\n kasan_save_free_info+0x2a/0x50\n __kasan_slab_free+0x106/0x190\n __kmem_cache_free+0x133/0x270\n svc_xprt_free+0x1e2/0x350 [sunrpc]\n svc_xprt_destroy_all+0x25a/0x440 [sunrpc]\n nfsd_put+0x125/0x240 [nfsd]\n nfsd_svc+0x2cb/0x3c0 [nfsd]\n write_threads+0x1ac/0x2a0 [nfsd]\n nfsctl_transaction_write+0xac/0x110 [nfsd]\n vfs_write+0x1c3/0xae0\n ksys_write+0xed/0x1c0\n do_syscall_64+0x38/0x90\n entry_SYSCALL_64_after_hwframe+0x72/0xdc\n\nFix the UAF by simply doing nothing in svc_tcp_listen_data_ready()\nif state != TCP_LISTEN, that will avoid dereferencing svsk for all\nchild socket.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-52885",
"url": "https://www.suse.com/security/cve/CVE-2023-52885"
},
{
"category": "external",
"summary": "SUSE Bug 1227750 for CVE-2023-52885",
"url": "https://bugzilla.suse.com/1227750"
},
{
"category": "external",
"summary": "SUSE Bug 1227753 for CVE-2023-52885",
"url": "https://bugzilla.suse.com/1227753"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-14T07:24:46Z",
"details": "important"
}
],
"title": "CVE-2023-52885"
},
{
"cve": "CVE-2024-26615",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-26615"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/smc: fix illegal rmb_desc access in SMC-D connection dump\n\nA crash was found when dumping SMC-D connections. It can be reproduced\nby following steps:\n\n- run nginx/wrk test:\n smc_run nginx\n smc_run wrk -t 16 -c 1000 -d \u003cduration\u003e -H \u0027Connection: Close\u0027 \u003cURL\u003e\n\n- continuously dump SMC-D connections in parallel:\n watch -n 1 \u0027smcss -D\u0027\n\n BUG: kernel NULL pointer dereference, address: 0000000000000030\n CPU: 2 PID: 7204 Comm: smcss Kdump: loaded Tainted: G\tE 6.7.0+ #55\n RIP: 0010:__smc_diag_dump.constprop.0+0x5e5/0x620 [smc_diag]\n Call Trace:\n \u003cTASK\u003e\n ? __die+0x24/0x70\n ? page_fault_oops+0x66/0x150\n ? exc_page_fault+0x69/0x140\n ? asm_exc_page_fault+0x26/0x30\n ? __smc_diag_dump.constprop.0+0x5e5/0x620 [smc_diag]\n ? __kmalloc_node_track_caller+0x35d/0x430\n ? __alloc_skb+0x77/0x170\n smc_diag_dump_proto+0xd0/0xf0 [smc_diag]\n smc_diag_dump+0x26/0x60 [smc_diag]\n netlink_dump+0x19f/0x320\n __netlink_dump_start+0x1dc/0x300\n smc_diag_handler_dump+0x6a/0x80 [smc_diag]\n ? __pfx_smc_diag_dump+0x10/0x10 [smc_diag]\n sock_diag_rcv_msg+0x121/0x140\n ? __pfx_sock_diag_rcv_msg+0x10/0x10\n netlink_rcv_skb+0x5a/0x110\n sock_diag_rcv+0x28/0x40\n netlink_unicast+0x22a/0x330\n netlink_sendmsg+0x1f8/0x420\n __sock_sendmsg+0xb0/0xc0\n ____sys_sendmsg+0x24e/0x300\n ? copy_msghdr_from_user+0x62/0x80\n ___sys_sendmsg+0x7c/0xd0\n ? __do_fault+0x34/0x160\n ? do_read_fault+0x5f/0x100\n ? do_fault+0xb0/0x110\n ? __handle_mm_fault+0x2b0/0x6c0\n __sys_sendmsg+0x4d/0x80\n do_syscall_64+0x69/0x180\n entry_SYSCALL_64_after_hwframe+0x6e/0x76\n\nIt is possible that the connection is in process of being established\nwhen we dump it. Assumed that the connection has been registered in a\nlink group by smc_conn_create() but the rmb_desc has not yet been\ninitialized by smc_buf_create(), thus causing the illegal access to\nconn-\u003ermb_desc. So fix it by checking before dump.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-26615",
"url": "https://www.suse.com/security/cve/CVE-2024-26615"
},
{
"category": "external",
"summary": "SUSE Bug 1220942 for CVE-2024-26615",
"url": "https://bugzilla.suse.com/1220942"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-14T07:24:46Z",
"details": "moderate"
}
],
"title": "CVE-2024-26615"
},
{
"cve": "CVE-2024-26635",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-26635"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nllc: Drop support for ETH_P_TR_802_2.\n\nsyzbot reported an uninit-value bug below. [0]\n\nllc supports ETH_P_802_2 (0x0004) and used to support ETH_P_TR_802_2\n(0x0011), and syzbot abused the latter to trigger the bug.\n\n write$tun(r0, \u0026(0x7f0000000040)={@val={0x0, 0x11}, @val, @mpls={[], @llc={@snap={0xaa, 0x1, \u0027)\u0027, \"90e5dd\"}}}}, 0x16)\n\nllc_conn_handler() initialises local variables {saddr,daddr}.mac\nbased on skb in llc_pdu_decode_sa()/llc_pdu_decode_da() and passes\nthem to __llc_lookup().\n\nHowever, the initialisation is done only when skb-\u003eprotocol is\nhtons(ETH_P_802_2), otherwise, __llc_lookup_established() and\n__llc_lookup_listener() will read garbage.\n\nThe missing initialisation existed prior to commit 211ed865108e\n(\"net: delete all instances of special processing for token ring\").\n\nIt removed the part to kick out the token ring stuff but forgot to\nclose the door allowing ETH_P_TR_802_2 packets to sneak into llc_rcv().\n\nLet\u0027s remove llc_tr_packet_type and complete the deprecation.\n\n[0]:\nBUG: KMSAN: uninit-value in __llc_lookup_established+0xe9d/0xf90\n __llc_lookup_established+0xe9d/0xf90\n __llc_lookup net/llc/llc_conn.c:611 [inline]\n llc_conn_handler+0x4bd/0x1360 net/llc/llc_conn.c:791\n llc_rcv+0xfbb/0x14a0 net/llc/llc_input.c:206\n __netif_receive_skb_one_core net/core/dev.c:5527 [inline]\n __netif_receive_skb+0x1a6/0x5a0 net/core/dev.c:5641\n netif_receive_skb_internal net/core/dev.c:5727 [inline]\n netif_receive_skb+0x58/0x660 net/core/dev.c:5786\n tun_rx_batched+0x3ee/0x980 drivers/net/tun.c:1555\n tun_get_user+0x53af/0x66d0 drivers/net/tun.c:2002\n tun_chr_write_iter+0x3af/0x5d0 drivers/net/tun.c:2048\n call_write_iter include/linux/fs.h:2020 [inline]\n new_sync_write fs/read_write.c:491 [inline]\n vfs_write+0x8ef/0x1490 fs/read_write.c:584\n ksys_write+0x20f/0x4c0 fs/read_write.c:637\n __do_sys_write fs/read_write.c:649 [inline]\n __se_sys_write fs/read_write.c:646 [inline]\n __x64_sys_write+0x93/0xd0 fs/read_write.c:646\n do_syscall_x64 arch/x86/entry/common.c:51 [inline]\n do_syscall_64+0x44/0x110 arch/x86/entry/common.c:82\n entry_SYSCALL_64_after_hwframe+0x63/0x6b\n\nLocal variable daddr created at:\n llc_conn_handler+0x53/0x1360 net/llc/llc_conn.c:783\n llc_rcv+0xfbb/0x14a0 net/llc/llc_input.c:206\n\nCPU: 1 PID: 5004 Comm: syz-executor994 Not tainted 6.6.0-syzkaller-14500-g1c41041124bd #0\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/09/2023",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-26635",
"url": "https://www.suse.com/security/cve/CVE-2024-26635"
},
{
"category": "external",
"summary": "SUSE Bug 1221656 for CVE-2024-26635",
"url": "https://bugzilla.suse.com/1221656"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-14T07:24:46Z",
"details": "moderate"
}
],
"title": "CVE-2024-26635"
},
{
"cve": "CVE-2024-26636",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-26636"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nllc: make llc_ui_sendmsg() more robust against bonding changes\n\nsyzbot was able to trick llc_ui_sendmsg(), allocating an skb with no\nheadroom, but subsequently trying to push 14 bytes of Ethernet header [1]\n\nLike some others, llc_ui_sendmsg() releases the socket lock before\ncalling sock_alloc_send_skb().\nThen it acquires it again, but does not redo all the sanity checks\nthat were performed.\n\nThis fix:\n\n- Uses LL_RESERVED_SPACE() to reserve space.\n- Check all conditions again after socket lock is held again.\n- Do not account Ethernet header for mtu limitation.\n\n[1]\n\nskbuff: skb_under_panic: text:ffff800088baa334 len:1514 put:14 head:ffff0000c9c37000 data:ffff0000c9c36ff2 tail:0x5dc end:0x6c0 dev:bond0\n\n kernel BUG at net/core/skbuff.c:193 !\nInternal error: Oops - BUG: 00000000f2000800 [#1] PREEMPT SMP\nModules linked in:\nCPU: 0 PID: 6875 Comm: syz-executor.0 Not tainted 6.7.0-rc8-syzkaller-00101-g0802e17d9aca-dirty #0\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/17/2023\npstate: 60400005 (nZCv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)\n pc : skb_panic net/core/skbuff.c:189 [inline]\n pc : skb_under_panic+0x13c/0x140 net/core/skbuff.c:203\n lr : skb_panic net/core/skbuff.c:189 [inline]\n lr : skb_under_panic+0x13c/0x140 net/core/skbuff.c:203\nsp : ffff800096f97000\nx29: ffff800096f97010 x28: ffff80008cc8d668 x27: dfff800000000000\nx26: ffff0000cb970c90 x25: 00000000000005dc x24: ffff0000c9c36ff2\nx23: ffff0000c9c37000 x22: 00000000000005ea x21: 00000000000006c0\nx20: 000000000000000e x19: ffff800088baa334 x18: 1fffe000368261ce\nx17: ffff80008e4ed000 x16: ffff80008a8310f8 x15: 0000000000000001\nx14: 1ffff00012df2d58 x13: 0000000000000000 x12: 0000000000000000\nx11: 0000000000000001 x10: 0000000000ff0100 x9 : e28a51f1087e8400\nx8 : e28a51f1087e8400 x7 : ffff80008028f8d0 x6 : 0000000000000000\nx5 : 0000000000000001 x4 : 0000000000000001 x3 : ffff800082b78714\nx2 : 0000000000000001 x1 : 0000000100000000 x0 : 0000000000000089\nCall trace:\n skb_panic net/core/skbuff.c:189 [inline]\n skb_under_panic+0x13c/0x140 net/core/skbuff.c:203\n skb_push+0xf0/0x108 net/core/skbuff.c:2451\n eth_header+0x44/0x1f8 net/ethernet/eth.c:83\n dev_hard_header include/linux/netdevice.h:3188 [inline]\n llc_mac_hdr_init+0x110/0x17c net/llc/llc_output.c:33\n llc_sap_action_send_xid_c+0x170/0x344 net/llc/llc_s_ac.c:85\n llc_exec_sap_trans_actions net/llc/llc_sap.c:153 [inline]\n llc_sap_next_state net/llc/llc_sap.c:182 [inline]\n llc_sap_state_process+0x1ec/0x774 net/llc/llc_sap.c:209\n llc_build_and_send_xid_pkt+0x12c/0x1c0 net/llc/llc_sap.c:270\n llc_ui_sendmsg+0x7bc/0xb1c net/llc/af_llc.c:997\n sock_sendmsg_nosec net/socket.c:730 [inline]\n __sock_sendmsg net/socket.c:745 [inline]\n sock_sendmsg+0x194/0x274 net/socket.c:767\n splice_to_socket+0x7cc/0xd58 fs/splice.c:881\n do_splice_from fs/splice.c:933 [inline]\n direct_splice_actor+0xe4/0x1c0 fs/splice.c:1142\n splice_direct_to_actor+0x2a0/0x7e4 fs/splice.c:1088\n do_splice_direct+0x20c/0x348 fs/splice.c:1194\n do_sendfile+0x4bc/0xc70 fs/read_write.c:1254\n __do_sys_sendfile64 fs/read_write.c:1322 [inline]\n __se_sys_sendfile64 fs/read_write.c:1308 [inline]\n __arm64_sys_sendfile64+0x160/0x3b4 fs/read_write.c:1308\n __invoke_syscall arch/arm64/kernel/syscall.c:37 [inline]\n invoke_syscall+0x98/0x2b8 arch/arm64/kernel/syscall.c:51\n el0_svc_common+0x130/0x23c arch/arm64/kernel/syscall.c:136\n do_el0_svc+0x48/0x58 arch/arm64/kernel/syscall.c:155\n el0_svc+0x54/0x158 arch/arm64/kernel/entry-common.c:678\n el0t_64_sync_handler+0x84/0xfc arch/arm64/kernel/entry-common.c:696\n el0t_64_sync+0x190/0x194 arch/arm64/kernel/entry.S:595\nCode: aa1803e6 aa1903e7 a90023f5 94792f6a (d4210000)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-26636",
"url": "https://www.suse.com/security/cve/CVE-2024-26636"
},
{
"category": "external",
"summary": "SUSE Bug 1221659 for CVE-2024-26636",
"url": "https://bugzilla.suse.com/1221659"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-14T07:24:46Z",
"details": "moderate"
}
],
"title": "CVE-2024-26636"
},
{
"cve": "CVE-2024-26659",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-26659"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nxhci: handle isoc Babble and Buffer Overrun events properly\n\nxHCI 4.9 explicitly forbids assuming that the xHC has released its\nownership of a multi-TRB TD when it reports an error on one of the\nearly TRBs. Yet the driver makes such assumption and releases the TD,\nallowing the remaining TRBs to be freed or overwritten by new TDs.\n\nThe xHC should also report completion of the final TRB due to its IOC\nflag being set by us, regardless of prior errors. This event cannot\nbe recognized if the TD has already been freed earlier, resulting in\n\"Transfer event TRB DMA ptr not part of current TD\" error message.\n\nFix this by reusing the logic for processing isoc Transaction Errors.\nThis also handles hosts which fail to report the final completion.\n\nFix transfer length reporting on Babble errors. They may be caused by\ndevice malfunction, no guarantee that the buffer has been filled.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-26659",
"url": "https://www.suse.com/security/cve/CVE-2024-26659"
},
{
"category": "external",
"summary": "SUSE Bug 1222317 for CVE-2024-26659",
"url": "https://bugzilla.suse.com/1222317"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-14T07:24:46Z",
"details": "moderate"
}
],
"title": "CVE-2024-26659"
},
{
"cve": "CVE-2024-26663",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-26663"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntipc: Check the bearer type before calling tipc_udp_nl_bearer_add()\n\nsyzbot reported the following general protection fault [1]:\n\ngeneral protection fault, probably for non-canonical address 0xdffffc0000000010: 0000 [#1] PREEMPT SMP KASAN\nKASAN: null-ptr-deref in range [0x0000000000000080-0x0000000000000087]\n...\nRIP: 0010:tipc_udp_is_known_peer+0x9c/0x250 net/tipc/udp_media.c:291\n...\nCall Trace:\n \u003cTASK\u003e\n tipc_udp_nl_bearer_add+0x212/0x2f0 net/tipc/udp_media.c:646\n tipc_nl_bearer_add+0x21e/0x360 net/tipc/bearer.c:1089\n genl_family_rcv_msg_doit+0x1fc/0x2e0 net/netlink/genetlink.c:972\n genl_family_rcv_msg net/netlink/genetlink.c:1052 [inline]\n genl_rcv_msg+0x561/0x800 net/netlink/genetlink.c:1067\n netlink_rcv_skb+0x16b/0x440 net/netlink/af_netlink.c:2544\n genl_rcv+0x28/0x40 net/netlink/genetlink.c:1076\n netlink_unicast_kernel net/netlink/af_netlink.c:1341 [inline]\n netlink_unicast+0x53b/0x810 net/netlink/af_netlink.c:1367\n netlink_sendmsg+0x8b7/0xd70 net/netlink/af_netlink.c:1909\n sock_sendmsg_nosec net/socket.c:730 [inline]\n __sock_sendmsg+0xd5/0x180 net/socket.c:745\n ____sys_sendmsg+0x6ac/0x940 net/socket.c:2584\n ___sys_sendmsg+0x135/0x1d0 net/socket.c:2638\n __sys_sendmsg+0x117/0x1e0 net/socket.c:2667\n do_syscall_x64 arch/x86/entry/common.c:52 [inline]\n do_syscall_64+0x40/0x110 arch/x86/entry/common.c:83\n entry_SYSCALL_64_after_hwframe+0x63/0x6b\n\nThe cause of this issue is that when tipc_nl_bearer_add() is called with\nthe TIPC_NLA_BEARER_UDP_OPTS attribute, tipc_udp_nl_bearer_add() is called\neven if the bearer is not UDP.\n\ntipc_udp_is_known_peer() called by tipc_udp_nl_bearer_add() assumes that\nthe media_ptr field of the tipc_bearer has an udp_bearer type object, so\nthe function goes crazy for non-UDP bearers.\n\nThis patch fixes the issue by checking the bearer type before calling\ntipc_udp_nl_bearer_add() in tipc_nl_bearer_add().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-26663",
"url": "https://www.suse.com/security/cve/CVE-2024-26663"
},
{
"category": "external",
"summary": "SUSE Bug 1222326 for CVE-2024-26663",
"url": "https://bugzilla.suse.com/1222326"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-14T07:24:46Z",
"details": "moderate"
}
],
"title": "CVE-2024-26663"
},
{
"cve": "CVE-2024-26735",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-26735"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nipv6: sr: fix possible use-after-free and null-ptr-deref\n\nThe pernet operations structure for the subsystem must be registered\nbefore registering the generic netlink family.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-26735",
"url": "https://www.suse.com/security/cve/CVE-2024-26735"
},
{
"category": "external",
"summary": "SUSE Bug 1222372 for CVE-2024-26735",
"url": "https://bugzilla.suse.com/1222372"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-14T07:24:46Z",
"details": "moderate"
}
],
"title": "CVE-2024-26735"
},
{
"cve": "CVE-2024-26830",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-26830"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ni40e: Do not allow untrusted VF to remove administratively set MAC\n\nCurrently when PF administratively sets VF\u0027s MAC address and the VF\nis put down (VF tries to delete all MACs) then the MAC is removed\nfrom MAC filters and primary VF MAC is zeroed.\n\nDo not allow untrusted VF to remove primary MAC when it was set\nadministratively by PF.\n\nReproducer:\n1) Create VF\n2) Set VF interface up\n3) Administratively set the VF\u0027s MAC\n4) Put VF interface down\n\n[root@host ~]# echo 1 \u003e /sys/class/net/enp2s0f0/device/sriov_numvfs\n[root@host ~]# ip link set enp2s0f0v0 up\n[root@host ~]# ip link set enp2s0f0 vf 0 mac fe:6c:b5:da:c7:7d\n[root@host ~]# ip link show enp2s0f0\n23: enp2s0f0: \u003cBROADCAST,MULTICAST,UP,LOWER_UP\u003e mtu 1500 qdisc mq state UP mode DEFAULT group default qlen 1000\n link/ether 3c:ec:ef:b7:dd:04 brd ff:ff:ff:ff:ff:ff\n vf 0 link/ether fe:6c:b5:da:c7:7d brd ff:ff:ff:ff:ff:ff, spoof checking on, link-state auto, trust off\n[root@host ~]# ip link set enp2s0f0v0 down\n[root@host ~]# ip link show enp2s0f0\n23: enp2s0f0: \u003cBROADCAST,MULTICAST,UP,LOWER_UP\u003e mtu 1500 qdisc mq state UP mode DEFAULT group default qlen 1000\n link/ether 3c:ec:ef:b7:dd:04 brd ff:ff:ff:ff:ff:ff\n vf 0 link/ether 00:00:00:00:00:00 brd ff:ff:ff:ff:ff:ff, spoof checking on, link-state auto, trust off",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-26830",
"url": "https://www.suse.com/security/cve/CVE-2024-26830"
},
{
"category": "external",
"summary": "SUSE Bug 1223012 for CVE-2024-26830",
"url": "https://bugzilla.suse.com/1223012"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-14T07:24:46Z",
"details": "moderate"
}
],
"title": "CVE-2024-26830"
},
{
"cve": "CVE-2024-26863",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-26863"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nhsr: Fix uninit-value access in hsr_get_node()\n\nKMSAN reported the following uninit-value access issue [1]:\n\n=====================================================\nBUG: KMSAN: uninit-value in hsr_get_node+0xa2e/0xa40 net/hsr/hsr_framereg.c:246\n hsr_get_node+0xa2e/0xa40 net/hsr/hsr_framereg.c:246\n fill_frame_info net/hsr/hsr_forward.c:577 [inline]\n hsr_forward_skb+0xe12/0x30e0 net/hsr/hsr_forward.c:615\n hsr_dev_xmit+0x1a1/0x270 net/hsr/hsr_device.c:223\n __netdev_start_xmit include/linux/netdevice.h:4940 [inline]\n netdev_start_xmit include/linux/netdevice.h:4954 [inline]\n xmit_one net/core/dev.c:3548 [inline]\n dev_hard_start_xmit+0x247/0xa10 net/core/dev.c:3564\n __dev_queue_xmit+0x33b8/0x5130 net/core/dev.c:4349\n dev_queue_xmit include/linux/netdevice.h:3134 [inline]\n packet_xmit+0x9c/0x6b0 net/packet/af_packet.c:276\n packet_snd net/packet/af_packet.c:3087 [inline]\n packet_sendmsg+0x8b1d/0x9f30 net/packet/af_packet.c:3119\n sock_sendmsg_nosec net/socket.c:730 [inline]\n __sock_sendmsg net/socket.c:745 [inline]\n __sys_sendto+0x735/0xa10 net/socket.c:2191\n __do_sys_sendto net/socket.c:2203 [inline]\n __se_sys_sendto net/socket.c:2199 [inline]\n __x64_sys_sendto+0x125/0x1c0 net/socket.c:2199\n do_syscall_x64 arch/x86/entry/common.c:52 [inline]\n do_syscall_64+0x6d/0x140 arch/x86/entry/common.c:83\n entry_SYSCALL_64_after_hwframe+0x63/0x6b\n\nUninit was created at:\n slab_post_alloc_hook+0x129/0xa70 mm/slab.h:768\n slab_alloc_node mm/slub.c:3478 [inline]\n kmem_cache_alloc_node+0x5e9/0xb10 mm/slub.c:3523\n kmalloc_reserve+0x13d/0x4a0 net/core/skbuff.c:560\n __alloc_skb+0x318/0x740 net/core/skbuff.c:651\n alloc_skb include/linux/skbuff.h:1286 [inline]\n alloc_skb_with_frags+0xc8/0xbd0 net/core/skbuff.c:6334\n sock_alloc_send_pskb+0xa80/0xbf0 net/core/sock.c:2787\n packet_alloc_skb net/packet/af_packet.c:2936 [inline]\n packet_snd net/packet/af_packet.c:3030 [inline]\n packet_sendmsg+0x70e8/0x9f30 net/packet/af_packet.c:3119\n sock_sendmsg_nosec net/socket.c:730 [inline]\n __sock_sendmsg net/socket.c:745 [inline]\n __sys_sendto+0x735/0xa10 net/socket.c:2191\n __do_sys_sendto net/socket.c:2203 [inline]\n __se_sys_sendto net/socket.c:2199 [inline]\n __x64_sys_sendto+0x125/0x1c0 net/socket.c:2199\n do_syscall_x64 arch/x86/entry/common.c:52 [inline]\n do_syscall_64+0x6d/0x140 arch/x86/entry/common.c:83\n entry_SYSCALL_64_after_hwframe+0x63/0x6b\n\nCPU: 1 PID: 5033 Comm: syz-executor334 Not tainted 6.7.0-syzkaller-00562-g9f8413c4a66f #0\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/17/2023\n=====================================================\n\nIf the packet type ID field in the Ethernet header is either ETH_P_PRP or\nETH_P_HSR, but it is not followed by an HSR tag, hsr_get_skb_sequence_nr()\nreads an invalid value as a sequence number. This causes the above issue.\n\nThis patch fixes the issue by returning NULL if the Ethernet header is not\nfollowed by an HSR tag.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-26863",
"url": "https://www.suse.com/security/cve/CVE-2024-26863"
},
{
"category": "external",
"summary": "SUSE Bug 1223021 for CVE-2024-26863",
"url": "https://bugzilla.suse.com/1223021"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-14T07:24:46Z",
"details": "moderate"
}
],
"title": "CVE-2024-26863"
},
{
"cve": "CVE-2024-26880",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-26880"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndm: call the resume method on internal suspend\n\nThere is this reported crash when experimenting with the lvm2 testsuite.\nThe list corruption is caused by the fact that the postsuspend and resume\nmethods were not paired correctly; there were two consecutive calls to the\norigin_postsuspend function. The second call attempts to remove the\n\"hash_list\" entry from a list, while it was already removed by the first\ncall.\n\nFix __dm_internal_resume so that it calls the preresume and resume\nmethods of the table\u0027s targets.\n\nIf a preresume method of some target fails, we are in a tricky situation.\nWe can\u0027t return an error because dm_internal_resume isn\u0027t supposed to\nreturn errors. We can\u0027t return success, because then the \"resume\" and\n\"postsuspend\" methods would not be paired correctly. So, we set the\nDMF_SUSPENDED flag and we fake normal suspend - it may confuse userspace\ntools, but it won\u0027t cause a kernel crash.\n\n------------[ cut here ]------------\nkernel BUG at lib/list_debug.c:56!\ninvalid opcode: 0000 [#1] PREEMPT SMP\nCPU: 1 PID: 8343 Comm: dmsetup Not tainted 6.8.0-rc6 #4\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.14.0-2 04/01/2014\nRIP: 0010:__list_del_entry_valid_or_report+0x77/0xc0\n\u003csnip\u003e\nRSP: 0018:ffff8881b831bcc0 EFLAGS: 00010282\nRAX: 000000000000004e RBX: ffff888143b6eb80 RCX: 0000000000000000\nRDX: 0000000000000001 RSI: ffffffff819053d0 RDI: 00000000ffffffff\nRBP: ffff8881b83a3400 R08: 00000000fffeffff R09: 0000000000000058\nR10: 0000000000000000 R11: ffffffff81a24080 R12: 0000000000000001\nR13: ffff88814538e000 R14: ffff888143bc6dc0 R15: ffffffffa02e4bb0\nFS: 00000000f7c0f780(0000) GS:ffff8893f0a40000(0000) knlGS:0000000000000000\nCS: 0010 DS: 002b ES: 002b CR0: 0000000080050033\nCR2: 0000000057fb5000 CR3: 0000000143474000 CR4: 00000000000006b0\nCall Trace:\n \u003cTASK\u003e\n ? die+0x2d/0x80\n ? do_trap+0xeb/0xf0\n ? __list_del_entry_valid_or_report+0x77/0xc0\n ? do_error_trap+0x60/0x80\n ? __list_del_entry_valid_or_report+0x77/0xc0\n ? exc_invalid_op+0x49/0x60\n ? __list_del_entry_valid_or_report+0x77/0xc0\n ? asm_exc_invalid_op+0x16/0x20\n ? table_deps+0x1b0/0x1b0 [dm_mod]\n ? __list_del_entry_valid_or_report+0x77/0xc0\n origin_postsuspend+0x1a/0x50 [dm_snapshot]\n dm_table_postsuspend_targets+0x34/0x50 [dm_mod]\n dm_suspend+0xd8/0xf0 [dm_mod]\n dev_suspend+0x1f2/0x2f0 [dm_mod]\n ? table_deps+0x1b0/0x1b0 [dm_mod]\n ctl_ioctl+0x300/0x5f0 [dm_mod]\n dm_compat_ctl_ioctl+0x7/0x10 [dm_mod]\n __x64_compat_sys_ioctl+0x104/0x170\n do_syscall_64+0x184/0x1b0\n entry_SYSCALL_64_after_hwframe+0x46/0x4e\nRIP: 0033:0xf7e6aead\n\u003csnip\u003e\n---[ end trace 0000000000000000 ]---",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-26880",
"url": "https://www.suse.com/security/cve/CVE-2024-26880"
},
{
"category": "external",
"summary": "SUSE Bug 1223188 for CVE-2024-26880",
"url": "https://bugzilla.suse.com/1223188"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-14T07:24:46Z",
"details": "low"
}
],
"title": "CVE-2024-26880"
},
{
"cve": "CVE-2024-26920",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-26920"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntracing/trigger: Fix to return error if failed to alloc snapshot\n\nFix register_snapshot_trigger() to return error code if it failed to\nallocate a snapshot instead of 0 (success). Unless that, it will register\nsnapshot trigger without an error.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-26920",
"url": "https://www.suse.com/security/cve/CVE-2024-26920"
},
{
"category": "external",
"summary": "SUSE Bug 1228237 for CVE-2024-26920",
"url": "https://bugzilla.suse.com/1228237"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-14T07:24:46Z",
"details": "moderate"
}
],
"title": "CVE-2024-26920"
},
{
"cve": "CVE-2024-26924",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-26924"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnetfilter: nft_set_pipapo: do not free live element\n\nPablo reports a crash with large batches of elements with a\nback-to-back add/remove pattern. Quoting Pablo:\n\n add_elem(\"00000000\") timeout 100 ms\n ...\n add_elem(\"0000000X\") timeout 100 ms\n del_elem(\"0000000X\") \u003c---------------- delete one that was just added\n ...\n add_elem(\"00005000\") timeout 100 ms\n\n 1) nft_pipapo_remove() removes element 0000000X\n Then, KASAN shows a splat.\n\nLooking at the remove function there is a chance that we will drop a\nrule that maps to a non-deactivated element.\n\nRemoval happens in two steps, first we do a lookup for key k and return the\nto-be-removed element and mark it as inactive in the next generation.\nThen, in a second step, the element gets removed from the set/map.\n\nThe _remove function does not work correctly if we have more than one\nelement that share the same key.\n\nThis can happen if we insert an element into a set when the set already\nholds an element with same key, but the element mapping to the existing\nkey has timed out or is not active in the next generation.\n\nIn such case its possible that removal will unmap the wrong element.\nIf this happens, we will leak the non-deactivated element, it becomes\nunreachable.\n\nThe element that got deactivated (and will be freed later) will\nremain reachable in the set data structure, this can result in\na crash when such an element is retrieved during lookup (stale\npointer).\n\nAdd a check that the fully matching key does in fact map to the element\nthat we have marked as inactive in the deactivation step.\nIf not, we need to continue searching.\n\nAdd a bug/warn trap at the end of the function as well, the remove\nfunction must not ever be called with an invisible/unreachable/non-existent\nelement.\n\nv2: avoid uneeded temporary variable (Stefano)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-26924",
"url": "https://www.suse.com/security/cve/CVE-2024-26924"
},
{
"category": "external",
"summary": "SUSE Bug 1223387 for CVE-2024-26924",
"url": "https://bugzilla.suse.com/1223387"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-14T07:24:46Z",
"details": "moderate"
}
],
"title": "CVE-2024-26924"
},
{
"cve": "CVE-2024-27019",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-27019"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnetfilter: nf_tables: Fix potential data-race in __nft_obj_type_get()\n\nnft_unregister_obj() can concurrent with __nft_obj_type_get(),\nand there is not any protection when iterate over nf_tables_objects\nlist in __nft_obj_type_get(). Therefore, there is potential data-race\nof nf_tables_objects list entry.\n\nUse list_for_each_entry_rcu() to iterate over nf_tables_objects\nlist in __nft_obj_type_get(), and use rcu_read_lock() in the caller\nnft_obj_type_get() to protect the entire type query process.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-27019",
"url": "https://www.suse.com/security/cve/CVE-2024-27019"
},
{
"category": "external",
"summary": "SUSE Bug 1223813 for CVE-2024-27019",
"url": "https://bugzilla.suse.com/1223813"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-14T07:24:46Z",
"details": "moderate"
}
],
"title": "CVE-2024-27019"
},
{
"cve": "CVE-2024-27020",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-27020"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnetfilter: nf_tables: Fix potential data-race in __nft_expr_type_get()\n\nnft_unregister_expr() can concurrent with __nft_expr_type_get(),\nand there is not any protection when iterate over nf_tables_expressions\nlist in __nft_expr_type_get(). Therefore, there is potential data-race\nof nf_tables_expressions list entry.\n\nUse list_for_each_entry_rcu() to iterate over nf_tables_expressions\nlist in __nft_expr_type_get(), and use rcu_read_lock() in the caller\nnft_expr_type_get() to protect the entire type query process.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-27020",
"url": "https://www.suse.com/security/cve/CVE-2024-27020"
},
{
"category": "external",
"summary": "SUSE Bug 1223815 for CVE-2024-27020",
"url": "https://bugzilla.suse.com/1223815"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-14T07:24:46Z",
"details": "moderate"
}
],
"title": "CVE-2024-27020"
},
{
"cve": "CVE-2024-27025",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-27025"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnbd: null check for nla_nest_start\n\nnla_nest_start() may fail and return NULL. Insert a check and set errno\nbased on other call sites within the same source code.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-27025",
"url": "https://www.suse.com/security/cve/CVE-2024-27025"
},
{
"category": "external",
"summary": "SUSE Bug 1223778 for CVE-2024-27025",
"url": "https://bugzilla.suse.com/1223778"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-14T07:24:46Z",
"details": "moderate"
}
],
"title": "CVE-2024-27025"
},
{
"cve": "CVE-2024-27437",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-27437"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nvfio/pci: Disable auto-enable of exclusive INTx IRQ\n\nCurrently for devices requiring masking at the irqchip for INTx, ie.\ndevices without DisINTx support, the IRQ is enabled in request_irq()\nand subsequently disabled as necessary to align with the masked status\nflag. This presents a window where the interrupt could fire between\nthese events, resulting in the IRQ incrementing the disable depth twice.\nThis would be unrecoverable for a user since the masked flag prevents\nnested enables through vfio.\n\nInstead, invert the logic using IRQF_NO_AUTOEN such that exclusive INTx\nis never auto-enabled, then unmask as required.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-27437",
"url": "https://www.suse.com/security/cve/CVE-2024-27437"
},
{
"category": "external",
"summary": "SUSE Bug 1222625 for CVE-2024-27437",
"url": "https://bugzilla.suse.com/1222625"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-14T07:24:46Z",
"details": "moderate"
}
],
"title": "CVE-2024-27437"
},
{
"cve": "CVE-2024-35805",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-35805"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndm snapshot: fix lockup in dm_exception_table_exit\n\nThere was reported lockup when we exit a snapshot with many exceptions.\nFix this by adding \"cond_resched\" to the loop that frees the exceptions.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-35805",
"url": "https://www.suse.com/security/cve/CVE-2024-35805"
},
{
"category": "external",
"summary": "SUSE Bug 1224743 for CVE-2024-35805",
"url": "https://bugzilla.suse.com/1224743"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-14T07:24:46Z",
"details": "moderate"
}
],
"title": "CVE-2024-35805"
},
{
"cve": "CVE-2024-35806",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-35806"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsoc: fsl: qbman: Always disable interrupts when taking cgr_lock\n\nsmp_call_function_single disables IRQs when executing the callback. To\nprevent deadlocks, we must disable IRQs when taking cgr_lock elsewhere.\nThis is already done by qman_update_cgr and qman_delete_cgr; fix the\nother lockers.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-35806",
"url": "https://www.suse.com/security/cve/CVE-2024-35806"
},
{
"category": "external",
"summary": "SUSE Bug 1224699 for CVE-2024-35806",
"url": "https://bugzilla.suse.com/1224699"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-14T07:24:46Z",
"details": "moderate"
}
],
"title": "CVE-2024-35806"
},
{
"cve": "CVE-2024-35819",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-35819"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsoc: fsl: qbman: Use raw spinlock for cgr_lock\n\nsmp_call_function always runs its callback in hard IRQ context, even on\nPREEMPT_RT, where spinlocks can sleep. So we need to use a raw spinlock\nfor cgr_lock to ensure we aren\u0027t waiting on a sleeping task.\n\nAlthough this bug has existed for a while, it was not apparent until\ncommit ef2a8d5478b9 (\"net: dpaa: Adjust queue depth on rate change\")\nwhich invokes smp_call_function_single via qman_update_cgr_safe every\ntime a link goes up or down.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-35819",
"url": "https://www.suse.com/security/cve/CVE-2024-35819"
},
{
"category": "external",
"summary": "SUSE Bug 1224683 for CVE-2024-35819",
"url": "https://bugzilla.suse.com/1224683"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-14T07:24:46Z",
"details": "moderate"
}
],
"title": "CVE-2024-35819"
},
{
"cve": "CVE-2024-35828",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-35828"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: libertas: fix some memleaks in lbs_allocate_cmd_buffer()\n\nIn the for statement of lbs_allocate_cmd_buffer(), if the allocation of\ncmdarray[i].cmdbuf fails, both cmdarray and cmdarray[i].cmdbuf needs to\nbe freed. Otherwise, there will be memleaks in lbs_allocate_cmd_buffer().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-35828",
"url": "https://www.suse.com/security/cve/CVE-2024-35828"
},
{
"category": "external",
"summary": "SUSE Bug 1224622 for CVE-2024-35828",
"url": "https://bugzilla.suse.com/1224622"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-14T07:24:46Z",
"details": "moderate"
}
],
"title": "CVE-2024-35828"
},
{
"cve": "CVE-2024-35837",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-35837"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: mvpp2: clear BM pool before initialization\n\nRegister value persist after booting the kernel using\nkexec which results in kernel panic. Thus clear the\nBM pool registers before initialisation to fix the issue.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-35837",
"url": "https://www.suse.com/security/cve/CVE-2024-35837"
},
{
"category": "external",
"summary": "SUSE Bug 1224500 for CVE-2024-35837",
"url": "https://bugzilla.suse.com/1224500"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-14T07:24:46Z",
"details": "moderate"
}
],
"title": "CVE-2024-35837"
},
{
"cve": "CVE-2024-35887",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-35887"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nax25: fix use-after-free bugs caused by ax25_ds_del_timer\n\nWhen the ax25 device is detaching, the ax25_dev_device_down()\ncalls ax25_ds_del_timer() to cleanup the slave_timer. When\nthe timer handler is running, the ax25_ds_del_timer() that\ncalls del_timer() in it will return directly. As a result,\nthe use-after-free bugs could happen, one of the scenarios\nis shown below:\n\n (Thread 1) | (Thread 2)\n | ax25_ds_timeout()\nax25_dev_device_down() |\n ax25_ds_del_timer() |\n del_timer() |\n ax25_dev_put() //FREE |\n | ax25_dev-\u003e //USE\n\nIn order to mitigate bugs, when the device is detaching, use\ntimer_shutdown_sync() to stop the timer.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-35887",
"url": "https://www.suse.com/security/cve/CVE-2024-35887"
},
{
"category": "external",
"summary": "SUSE Bug 1224663 for CVE-2024-35887",
"url": "https://bugzilla.suse.com/1224663"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-14T07:24:46Z",
"details": "moderate"
}
],
"title": "CVE-2024-35887"
},
{
"cve": "CVE-2024-35893",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-35893"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/sched: act_skbmod: prevent kernel-infoleak\n\nsyzbot found that tcf_skbmod_dump() was copying four bytes\nfrom kernel stack to user space [1].\n\nThe issue here is that \u0027struct tc_skbmod\u0027 has a four bytes hole.\n\nWe need to clear the structure before filling fields.\n\n[1]\nBUG: KMSAN: kernel-infoleak in instrument_copy_to_user include/linux/instrumented.h:114 [inline]\n BUG: KMSAN: kernel-infoleak in copy_to_user_iter lib/iov_iter.c:24 [inline]\n BUG: KMSAN: kernel-infoleak in iterate_ubuf include/linux/iov_iter.h:29 [inline]\n BUG: KMSAN: kernel-infoleak in iterate_and_advance2 include/linux/iov_iter.h:245 [inline]\n BUG: KMSAN: kernel-infoleak in iterate_and_advance include/linux/iov_iter.h:271 [inline]\n BUG: KMSAN: kernel-infoleak in _copy_to_iter+0x366/0x2520 lib/iov_iter.c:185\n instrument_copy_to_user include/linux/instrumented.h:114 [inline]\n copy_to_user_iter lib/iov_iter.c:24 [inline]\n iterate_ubuf include/linux/iov_iter.h:29 [inline]\n iterate_and_advance2 include/linux/iov_iter.h:245 [inline]\n iterate_and_advance include/linux/iov_iter.h:271 [inline]\n _copy_to_iter+0x366/0x2520 lib/iov_iter.c:185\n copy_to_iter include/linux/uio.h:196 [inline]\n simple_copy_to_iter net/core/datagram.c:532 [inline]\n __skb_datagram_iter+0x185/0x1000 net/core/datagram.c:420\n skb_copy_datagram_iter+0x5c/0x200 net/core/datagram.c:546\n skb_copy_datagram_msg include/linux/skbuff.h:4050 [inline]\n netlink_recvmsg+0x432/0x1610 net/netlink/af_netlink.c:1962\n sock_recvmsg_nosec net/socket.c:1046 [inline]\n sock_recvmsg+0x2c4/0x340 net/socket.c:1068\n __sys_recvfrom+0x35a/0x5f0 net/socket.c:2242\n __do_sys_recvfrom net/socket.c:2260 [inline]\n __se_sys_recvfrom net/socket.c:2256 [inline]\n __x64_sys_recvfrom+0x126/0x1d0 net/socket.c:2256\n do_syscall_64+0xd5/0x1f0\n entry_SYSCALL_64_after_hwframe+0x6d/0x75\n\nUninit was stored to memory at:\n pskb_expand_head+0x30f/0x19d0 net/core/skbuff.c:2253\n netlink_trim+0x2c2/0x330 net/netlink/af_netlink.c:1317\n netlink_unicast+0x9f/0x1260 net/netlink/af_netlink.c:1351\n nlmsg_unicast include/net/netlink.h:1144 [inline]\n nlmsg_notify+0x21d/0x2f0 net/netlink/af_netlink.c:2610\n rtnetlink_send+0x73/0x90 net/core/rtnetlink.c:741\n rtnetlink_maybe_send include/linux/rtnetlink.h:17 [inline]\n tcf_add_notify net/sched/act_api.c:2048 [inline]\n tcf_action_add net/sched/act_api.c:2071 [inline]\n tc_ctl_action+0x146e/0x19d0 net/sched/act_api.c:2119\n rtnetlink_rcv_msg+0x1737/0x1900 net/core/rtnetlink.c:6595\n netlink_rcv_skb+0x375/0x650 net/netlink/af_netlink.c:2559\n rtnetlink_rcv+0x34/0x40 net/core/rtnetlink.c:6613\n netlink_unicast_kernel net/netlink/af_netlink.c:1335 [inline]\n netlink_unicast+0xf4c/0x1260 net/netlink/af_netlink.c:1361\n netlink_sendmsg+0x10df/0x11f0 net/netlink/af_netlink.c:1905\n sock_sendmsg_nosec net/socket.c:730 [inline]\n __sock_sendmsg+0x30f/0x380 net/socket.c:745\n ____sys_sendmsg+0x877/0xb60 net/socket.c:2584\n ___sys_sendmsg+0x28d/0x3c0 net/socket.c:2638\n __sys_sendmsg net/socket.c:2667 [inline]\n __do_sys_sendmsg net/socket.c:2676 [inline]\n __se_sys_sendmsg net/socket.c:2674 [inline]\n __x64_sys_sendmsg+0x307/0x4a0 net/socket.c:2674\n do_syscall_64+0xd5/0x1f0\n entry_SYSCALL_64_after_hwframe+0x6d/0x75\n\nUninit was stored to memory at:\n __nla_put lib/nlattr.c:1041 [inline]\n nla_put+0x1c6/0x230 lib/nlattr.c:1099\n tcf_skbmod_dump+0x23f/0xc20 net/sched/act_skbmod.c:256\n tcf_action_dump_old net/sched/act_api.c:1191 [inline]\n tcf_action_dump_1+0x85e/0x970 net/sched/act_api.c:1227\n tcf_action_dump+0x1fd/0x460 net/sched/act_api.c:1251\n tca_get_fill+0x519/0x7a0 net/sched/act_api.c:1628\n tcf_add_notify_msg net/sched/act_api.c:2023 [inline]\n tcf_add_notify net/sched/act_api.c:2042 [inline]\n tcf_action_add net/sched/act_api.c:2071 [inline]\n tc_ctl_action+0x1365/0x19d0 net/sched/act_api.c:2119\n rtnetlink_rcv_msg+0x1737/0x1900 net/core/rtnetlink.c:6595\n netlink_rcv_skb+0x375/0x650 net/netlink/af_netli\n---truncated---",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-35893",
"url": "https://www.suse.com/security/cve/CVE-2024-35893"
},
{
"category": "external",
"summary": "SUSE Bug 1224512 for CVE-2024-35893",
"url": "https://bugzilla.suse.com/1224512"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-14T07:24:46Z",
"details": "moderate"
}
],
"title": "CVE-2024-35893"
},
{
"cve": "CVE-2024-35934",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-35934"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/smc: reduce rtnl pressure in smc_pnet_create_pnetids_list()\n\nMany syzbot reports show extreme rtnl pressure, and many of them hint\nthat smc acquires rtnl in netns creation for no good reason [1]\n\nThis patch returns early from smc_pnet_net_init()\nif there is no netdevice yet.\n\nI am not even sure why smc_pnet_create_pnetids_list() even exists,\nbecause smc_pnet_netdev_event() is also calling\nsmc_pnet_add_base_pnetid() when handling NETDEV_UP event.\n\n[1] extract of typical syzbot reports\n\n2 locks held by syz-executor.3/12252:\n #0: ffffffff8f369610 (pernet_ops_rwsem){++++}-{3:3}, at: copy_net_ns+0x4c7/0x7b0 net/core/net_namespace.c:491\n #1: ffffffff8f375b88 (rtnl_mutex){+.+.}-{3:3}, at: smc_pnet_create_pnetids_list net/smc/smc_pnet.c:809 [inline]\n #1: ffffffff8f375b88 (rtnl_mutex){+.+.}-{3:3}, at: smc_pnet_net_init+0x10a/0x1e0 net/smc/smc_pnet.c:878\n2 locks held by syz-executor.4/12253:\n #0: ffffffff8f369610 (pernet_ops_rwsem){++++}-{3:3}, at: copy_net_ns+0x4c7/0x7b0 net/core/net_namespace.c:491\n #1: ffffffff8f375b88 (rtnl_mutex){+.+.}-{3:3}, at: smc_pnet_create_pnetids_list net/smc/smc_pnet.c:809 [inline]\n #1: ffffffff8f375b88 (rtnl_mutex){+.+.}-{3:3}, at: smc_pnet_net_init+0x10a/0x1e0 net/smc/smc_pnet.c:878\n2 locks held by syz-executor.1/12257:\n #0: ffffffff8f369610 (pernet_ops_rwsem){++++}-{3:3}, at: copy_net_ns+0x4c7/0x7b0 net/core/net_namespace.c:491\n #1: ffffffff8f375b88 (rtnl_mutex){+.+.}-{3:3}, at: smc_pnet_create_pnetids_list net/smc/smc_pnet.c:809 [inline]\n #1: ffffffff8f375b88 (rtnl_mutex){+.+.}-{3:3}, at: smc_pnet_net_init+0x10a/0x1e0 net/smc/smc_pnet.c:878\n2 locks held by syz-executor.2/12261:\n #0: ffffffff8f369610 (pernet_ops_rwsem){++++}-{3:3}, at: copy_net_ns+0x4c7/0x7b0 net/core/net_namespace.c:491\n #1: ffffffff8f375b88 (rtnl_mutex){+.+.}-{3:3}, at: smc_pnet_create_pnetids_list net/smc/smc_pnet.c:809 [inline]\n #1: ffffffff8f375b88 (rtnl_mutex){+.+.}-{3:3}, at: smc_pnet_net_init+0x10a/0x1e0 net/smc/smc_pnet.c:878\n2 locks held by syz-executor.0/12265:\n #0: ffffffff8f369610 (pernet_ops_rwsem){++++}-{3:3}, at: copy_net_ns+0x4c7/0x7b0 net/core/net_namespace.c:491\n #1: ffffffff8f375b88 (rtnl_mutex){+.+.}-{3:3}, at: smc_pnet_create_pnetids_list net/smc/smc_pnet.c:809 [inline]\n #1: ffffffff8f375b88 (rtnl_mutex){+.+.}-{3:3}, at: smc_pnet_net_init+0x10a/0x1e0 net/smc/smc_pnet.c:878\n2 locks held by syz-executor.3/12268:\n #0: ffffffff8f369610 (pernet_ops_rwsem){++++}-{3:3}, at: copy_net_ns+0x4c7/0x7b0 net/core/net_namespace.c:491\n #1: ffffffff8f375b88 (rtnl_mutex){+.+.}-{3:3}, at: smc_pnet_create_pnetids_list net/smc/smc_pnet.c:809 [inline]\n #1: ffffffff8f375b88 (rtnl_mutex){+.+.}-{3:3}, at: smc_pnet_net_init+0x10a/0x1e0 net/smc/smc_pnet.c:878\n2 locks held by syz-executor.4/12271:\n #0: ffffffff8f369610 (pernet_ops_rwsem){++++}-{3:3}, at: copy_net_ns+0x4c7/0x7b0 net/core/net_namespace.c:491\n #1: ffffffff8f375b88 (rtnl_mutex){+.+.}-{3:3}, at: smc_pnet_create_pnetids_list net/smc/smc_pnet.c:809 [inline]\n #1: ffffffff8f375b88 (rtnl_mutex){+.+.}-{3:3}, at: smc_pnet_net_init+0x10a/0x1e0 net/smc/smc_pnet.c:878\n2 locks held by syz-executor.1/12274:\n #0: ffffffff8f369610 (pernet_ops_rwsem){++++}-{3:3}, at: copy_net_ns+0x4c7/0x7b0 net/core/net_namespace.c:491\n #1: ffffffff8f375b88 (rtnl_mutex){+.+.}-{3:3}, at: smc_pnet_create_pnetids_list net/smc/smc_pnet.c:809 [inline]\n #1: ffffffff8f375b88 (rtnl_mutex){+.+.}-{3:3}, at: smc_pnet_net_init+0x10a/0x1e0 net/smc/smc_pnet.c:878\n2 locks held by syz-executor.2/12280:\n #0: ffffffff8f369610 (pernet_ops_rwsem){++++}-{3:3}, at: copy_net_ns+0x4c7/0x7b0 net/core/net_namespace.c:491\n #1: ffffffff8f375b88 (rtnl_mutex){+.+.}-{3:3}, at: smc_pnet_create_pnetids_list net/smc/smc_pnet.c:809 [inline]\n #1: ffffffff8f375b88 (rtnl_mutex){+.+.}-{3:3}, at: smc_pnet_net_init+0x10a/0x1e0 net/smc/smc_pnet.c:878",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-35934",
"url": "https://www.suse.com/security/cve/CVE-2024-35934"
},
{
"category": "external",
"summary": "SUSE Bug 1224641 for CVE-2024-35934",
"url": "https://bugzilla.suse.com/1224641"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 2.5,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-14T07:24:46Z",
"details": "low"
}
],
"title": "CVE-2024-35934"
},
{
"cve": "CVE-2024-35947",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-35947"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndyndbg: fix old BUG_ON in \u003econtrol parser\n\nFix a BUG_ON from 2009. Even if it looks \"unreachable\" (I didn\u0027t\nreally look), lets make sure by removing it, doing pr_err and return\n-EINVAL instead.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-35947",
"url": "https://www.suse.com/security/cve/CVE-2024-35947"
},
{
"category": "external",
"summary": "SUSE Bug 1224647 for CVE-2024-35947",
"url": "https://bugzilla.suse.com/1224647"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-14T07:24:46Z",
"details": "moderate"
}
],
"title": "CVE-2024-35947"
},
{
"cve": "CVE-2024-35949",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-35949"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbtrfs: make sure that WRITTEN is set on all metadata blocks\n\nWe previously would call btrfs_check_leaf() if we had the check\nintegrity code enabled, which meant that we could only run the extended\nleaf checks if we had WRITTEN set on the header flags.\n\nThis leaves a gap in our checking, because we could end up with\ncorruption on disk where WRITTEN isn\u0027t set on the leaf, and then the\nextended leaf checks don\u0027t get run which we rely on to validate all of\nthe item pointers to make sure we don\u0027t access memory outside of the\nextent buffer.\n\nHowever, since 732fab95abe2 (\"btrfs: check-integrity: remove\nCONFIG_BTRFS_FS_CHECK_INTEGRITY option\") we no longer call\nbtrfs_check_leaf() from btrfs_mark_buffer_dirty(), which means we only\never call it on blocks that are being written out, and thus have WRITTEN\nset, or that are being read in, which should have WRITTEN set.\n\nAdd checks to make sure we have WRITTEN set appropriately, and then make\nsure __btrfs_check_leaf() always does the item checking. This will\nprotect us from file systems that have been corrupted and no longer have\nWRITTEN set on some of the blocks.\n\nThis was hit on a crafted image tweaking the WRITTEN bit and reported by\nKASAN as out-of-bound access in the eb accessors. The example is a dir\nitem at the end of an eb.\n\n [2.042] BTRFS warning (device loop1): bad eb member start: ptr 0x3fff start 30572544 member offset 16410 size 2\n [2.040] general protection fault, probably for non-canonical address 0xe0009d1000000003: 0000 [#1] PREEMPT SMP KASAN NOPTI\n [2.537] KASAN: maybe wild-memory-access in range [0x0005088000000018-0x000508800000001f]\n [2.729] CPU: 0 PID: 2587 Comm: mount Not tainted 6.8.2 #1\n [2.729] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.15.0-1 04/01/2014\n [2.621] RIP: 0010:btrfs_get_16+0x34b/0x6d0\n [2.621] RSP: 0018:ffff88810871fab8 EFLAGS: 00000206\n [2.621] RAX: 0000a11000000003 RBX: ffff888104ff8720 RCX: ffff88811b2288c0\n [2.621] RDX: dffffc0000000000 RSI: ffffffff81dd8aca RDI: ffff88810871f748\n [2.621] RBP: 000000000000401a R08: 0000000000000001 R09: ffffed10210e3ee9\n [2.621] R10: ffff88810871f74f R11: 205d323430333737 R12: 000000000000001a\n [2.621] R13: 000508800000001a R14: 1ffff110210e3f5d R15: ffffffff850011e8\n [2.621] FS: 00007f56ea275840(0000) GS:ffff88811b200000(0000) knlGS:0000000000000000\n [2.621] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n [2.621] CR2: 00007febd13b75c0 CR3: 000000010bb50000 CR4: 00000000000006f0\n [2.621] Call Trace:\n [2.621] \u003cTASK\u003e\n [2.621] ? show_regs+0x74/0x80\n [2.621] ? die_addr+0x46/0xc0\n [2.621] ? exc_general_protection+0x161/0x2a0\n [2.621] ? asm_exc_general_protection+0x26/0x30\n [2.621] ? btrfs_get_16+0x33a/0x6d0\n [2.621] ? btrfs_get_16+0x34b/0x6d0\n [2.621] ? btrfs_get_16+0x33a/0x6d0\n [2.621] ? __pfx_btrfs_get_16+0x10/0x10\n [2.621] ? __pfx_mutex_unlock+0x10/0x10\n [2.621] btrfs_match_dir_item_name+0x101/0x1a0\n [2.621] btrfs_lookup_dir_item+0x1f3/0x280\n [2.621] ? __pfx_btrfs_lookup_dir_item+0x10/0x10\n [2.621] btrfs_get_tree+0xd25/0x1910\n\n[ copy more details from report ]",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-35949",
"url": "https://www.suse.com/security/cve/CVE-2024-35949"
},
{
"category": "external",
"summary": "SUSE Bug 1224700 for CVE-2024-35949",
"url": "https://bugzilla.suse.com/1224700"
},
{
"category": "external",
"summary": "SUSE Bug 1229273 for CVE-2024-35949",
"url": "https://bugzilla.suse.com/1229273"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-14T07:24:46Z",
"details": "moderate"
}
],
"title": "CVE-2024-35949"
},
{
"cve": "CVE-2024-35966",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-35966"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nBluetooth: RFCOMM: Fix not validating setsockopt user input\n\nsyzbot reported rfcomm_sock_setsockopt_old() is copying data without\nchecking user input length.\n\nBUG: KASAN: slab-out-of-bounds in copy_from_sockptr_offset\ninclude/linux/sockptr.h:49 [inline]\nBUG: KASAN: slab-out-of-bounds in copy_from_sockptr\ninclude/linux/sockptr.h:55 [inline]\nBUG: KASAN: slab-out-of-bounds in rfcomm_sock_setsockopt_old\nnet/bluetooth/rfcomm/sock.c:632 [inline]\nBUG: KASAN: slab-out-of-bounds in rfcomm_sock_setsockopt+0x893/0xa70\nnet/bluetooth/rfcomm/sock.c:673\nRead of size 4 at addr ffff8880209a8bc3 by task syz-executor632/5064",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-35966",
"url": "https://www.suse.com/security/cve/CVE-2024-35966"
},
{
"category": "external",
"summary": "SUSE Bug 1224576 for CVE-2024-35966",
"url": "https://bugzilla.suse.com/1224576"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-14T07:24:46Z",
"details": "moderate"
}
],
"title": "CVE-2024-35966"
},
{
"cve": "CVE-2024-35967",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-35967"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nBluetooth: SCO: Fix not validating setsockopt user input\n\nsyzbot reported sco_sock_setsockopt() is copying data without\nchecking user input length.\n\nBUG: KASAN: slab-out-of-bounds in copy_from_sockptr_offset\ninclude/linux/sockptr.h:49 [inline]\nBUG: KASAN: slab-out-of-bounds in copy_from_sockptr\ninclude/linux/sockptr.h:55 [inline]\nBUG: KASAN: slab-out-of-bounds in sco_sock_setsockopt+0xc0b/0xf90\nnet/bluetooth/sco.c:893\nRead of size 4 at addr ffff88805f7b15a3 by task syz-executor.5/12578",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-35967",
"url": "https://www.suse.com/security/cve/CVE-2024-35967"
},
{
"category": "external",
"summary": "SUSE Bug 1224587 for CVE-2024-35967",
"url": "https://bugzilla.suse.com/1224587"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-14T07:24:46Z",
"details": "moderate"
}
],
"title": "CVE-2024-35967"
},
{
"cve": "CVE-2024-35978",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-35978"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nBluetooth: Fix memory leak in hci_req_sync_complete()\n\nIn \u0027hci_req_sync_complete()\u0027, always free the previous sync\nrequest state before assigning reference to a new one.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-35978",
"url": "https://www.suse.com/security/cve/CVE-2024-35978"
},
{
"category": "external",
"summary": "SUSE Bug 1224571 for CVE-2024-35978",
"url": "https://bugzilla.suse.com/1224571"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-14T07:24:46Z",
"details": "moderate"
}
],
"title": "CVE-2024-35978"
},
{
"cve": "CVE-2024-35995",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-35995"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nACPI: CPPC: Use access_width over bit_width for system memory accesses\n\nTo align with ACPI 6.3+, since bit_width can be any 8-bit value, it\ncannot be depended on to be always on a clean 8b boundary. This was\nuncovered on the Cobalt 100 platform.\n\nSError Interrupt on CPU26, code 0xbe000011 -- SError\n CPU: 26 PID: 1510 Comm: systemd-udevd Not tainted 5.15.2.1-13 #1\n Hardware name: MICROSOFT CORPORATION, BIOS MICROSOFT CORPORATION\n pstate: 62400009 (nZCv daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--)\n pc : cppc_get_perf_caps+0xec/0x410\n lr : cppc_get_perf_caps+0xe8/0x410\n sp : ffff8000155ab730\n x29: ffff8000155ab730 x28: ffff0080139d0038 x27: ffff0080139d0078\n x26: 0000000000000000 x25: ffff0080139d0058 x24: 00000000ffffffff\n x23: ffff0080139d0298 x22: ffff0080139d0278 x21: 0000000000000000\n x20: ffff00802b251910 x19: ffff0080139d0000 x18: ffffffffffffffff\n x17: 0000000000000000 x16: ffffdc7e111bad04 x15: ffff00802b251008\n x14: ffffffffffffffff x13: ffff013f1fd63300 x12: 0000000000000006\n x11: ffffdc7e128f4420 x10: 0000000000000000 x9 : ffffdc7e111badec\n x8 : ffff00802b251980 x7 : 0000000000000000 x6 : ffff0080139d0028\n x5 : 0000000000000000 x4 : ffff0080139d0018 x3 : 00000000ffffffff\n x2 : 0000000000000008 x1 : ffff8000155ab7a0 x0 : 0000000000000000\n Kernel panic - not syncing: Asynchronous SError Interrupt\n CPU: 26 PID: 1510 Comm: systemd-udevd Not tainted\n5.15.2.1-13 #1\n Hardware name: MICROSOFT CORPORATION, BIOS MICROSOFT CORPORATION\n Call trace:\n dump_backtrace+0x0/0x1e0\n show_stack+0x24/0x30\n dump_stack_lvl+0x8c/0xb8\n dump_stack+0x18/0x34\n panic+0x16c/0x384\n add_taint+0x0/0xc0\n arm64_serror_panic+0x7c/0x90\n arm64_is_fatal_ras_serror+0x34/0xa4\n do_serror+0x50/0x6c\n el1h_64_error_handler+0x40/0x74\n el1h_64_error+0x7c/0x80\n cppc_get_perf_caps+0xec/0x410\n cppc_cpufreq_cpu_init+0x74/0x400 [cppc_cpufreq]\n cpufreq_online+0x2dc/0xa30\n cpufreq_add_dev+0xc0/0xd4\n subsys_interface_register+0x134/0x14c\n cpufreq_register_driver+0x1b0/0x354\n cppc_cpufreq_init+0x1a8/0x1000 [cppc_cpufreq]\n do_one_initcall+0x50/0x250\n do_init_module+0x60/0x27c\n load_module+0x2300/0x2570\n __do_sys_finit_module+0xa8/0x114\n __arm64_sys_finit_module+0x2c/0x3c\n invoke_syscall+0x78/0x100\n el0_svc_common.constprop.0+0x180/0x1a0\n do_el0_svc+0x84/0xa0\n el0_svc+0x2c/0xc0\n el0t_64_sync_handler+0xa4/0x12c\n el0t_64_sync+0x1a4/0x1a8\n\nInstead, use access_width to determine the size and use the offset and\nwidth to shift and mask the bits to read/write out. Make sure to add a\ncheck for system memory since pcc redefines the access_width to\nsubspace id.\n\nIf access_width is not set, then fall back to using bit_width.\n\n[ rjw: Subject and changelog edits, comment adjustments ]",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-35995",
"url": "https://www.suse.com/security/cve/CVE-2024-35995"
},
{
"category": "external",
"summary": "SUSE Bug 1224557 for CVE-2024-35995",
"url": "https://bugzilla.suse.com/1224557"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-14T07:24:46Z",
"details": "moderate"
}
],
"title": "CVE-2024-35995"
},
{
"cve": "CVE-2024-36004",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-36004"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ni40e: Do not use WQ_MEM_RECLAIM flag for workqueue\n\nIssue reported by customer during SRIOV testing, call trace:\nWhen both i40e and the i40iw driver are loaded, a warning\nin check_flush_dependency is being triggered. This seems\nto be because of the i40e driver workqueue is allocated with\nthe WQ_MEM_RECLAIM flag, and the i40iw one is not.\n\nSimilar error was encountered on ice too and it was fixed by\nremoving the flag. Do the same for i40e too.\n\n[Feb 9 09:08] ------------[ cut here ]------------\n[ +0.000004] workqueue: WQ_MEM_RECLAIM i40e:i40e_service_task [i40e] is\nflushing !WQ_MEM_RECLAIM infiniband:0x0\n[ +0.000060] WARNING: CPU: 0 PID: 937 at kernel/workqueue.c:2966\ncheck_flush_dependency+0x10b/0x120\n[ +0.000007] Modules linked in: snd_seq_dummy snd_hrtimer snd_seq\nsnd_timer snd_seq_device snd soundcore nls_utf8 cifs cifs_arc4\nnls_ucs2_utils rdma_cm iw_cm ib_cm cifs_md4 dns_resolver netfs qrtr\nrfkill sunrpc vfat fat intel_rapl_msr intel_rapl_common irdma\nintel_uncore_frequency intel_uncore_frequency_common ice ipmi_ssif\nisst_if_common skx_edac nfit libnvdimm x86_pkg_temp_thermal\nintel_powerclamp gnss coretemp ib_uverbs rapl intel_cstate ib_core\niTCO_wdt iTCO_vendor_support acpi_ipmi mei_me ipmi_si intel_uncore\nioatdma i2c_i801 joydev pcspkr mei ipmi_devintf lpc_ich\nintel_pch_thermal i2c_smbus ipmi_msghandler acpi_power_meter acpi_pad\nxfs libcrc32c ast sd_mod drm_shmem_helper t10_pi drm_kms_helper sg ixgbe\ndrm i40e ahci crct10dif_pclmul libahci crc32_pclmul igb crc32c_intel\nlibata ghash_clmulni_intel i2c_algo_bit mdio dca wmi dm_mirror\ndm_region_hash dm_log dm_mod fuse\n[ +0.000050] CPU: 0 PID: 937 Comm: kworker/0:3 Kdump: loaded Not\ntainted 6.8.0-rc2-Feb-net_dev-Qiueue-00279-gbd43c5687e05 #1\n[ +0.000003] Hardware name: Intel Corporation S2600BPB/S2600BPB, BIOS\nSE5C620.86B.02.01.0013.121520200651 12/15/2020\n[ +0.000001] Workqueue: i40e i40e_service_task [i40e]\n[ +0.000024] RIP: 0010:check_flush_dependency+0x10b/0x120\n[ +0.000003] Code: ff 49 8b 54 24 18 48 8d 8b b0 00 00 00 49 89 e8 48\n81 c6 b0 00 00 00 48 c7 c7 b0 97 fa 9f c6 05 8a cc 1f 02 01 e8 35 b3 fd\nff \u003c0f\u003e 0b e9 10 ff ff ff 80 3d 78 cc 1f 02 00 75 94 e9 46 ff ff ff 90\n[ +0.000002] RSP: 0018:ffffbd294976bcf8 EFLAGS: 00010282\n[ +0.000002] RAX: 0000000000000000 RBX: ffff94d4c483c000 RCX:\n0000000000000027\n[ +0.000001] RDX: ffff94d47f620bc8 RSI: 0000000000000001 RDI:\nffff94d47f620bc0\n[ +0.000001] RBP: 0000000000000000 R08: 0000000000000000 R09:\n00000000ffff7fff\n[ +0.000001] R10: ffffbd294976bb98 R11: ffffffffa0be65e8 R12:\nffff94c5451ea180\n[ +0.000001] R13: ffff94c5ab5e8000 R14: ffff94c5c20b6e05 R15:\nffff94c5f1330ab0\n[ +0.000001] FS: 0000000000000000(0000) GS:ffff94d47f600000(0000)\nknlGS:0000000000000000\n[ +0.000002] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n[ +0.000001] CR2: 00007f9e6f1fca70 CR3: 0000000038e20004 CR4:\n00000000007706f0\n[ +0.000000] DR0: 0000000000000000 DR1: 0000000000000000 DR2:\n0000000000000000\n[ +0.000001] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7:\n0000000000000400\n[ +0.000001] PKRU: 55555554\n[ +0.000001] Call Trace:\n[ +0.000001] \u003cTASK\u003e\n[ +0.000002] ? __warn+0x80/0x130\n[ +0.000003] ? check_flush_dependency+0x10b/0x120\n[ +0.000002] ? report_bug+0x195/0x1a0\n[ +0.000005] ? handle_bug+0x3c/0x70\n[ +0.000003] ? exc_invalid_op+0x14/0x70\n[ +0.000002] ? asm_exc_invalid_op+0x16/0x20\n[ +0.000006] ? check_flush_dependency+0x10b/0x120\n[ +0.000002] ? check_flush_dependency+0x10b/0x120\n[ +0.000002] __flush_workqueue+0x126/0x3f0\n[ +0.000015] ib_cache_cleanup_one+0x1c/0xe0 [ib_core]\n[ +0.000056] __ib_unregister_device+0x6a/0xb0 [ib_core]\n[ +0.000023] ib_unregister_device_and_put+0x34/0x50 [ib_core]\n[ +0.000020] i40iw_close+0x4b/0x90 [irdma]\n[ +0.000022] i40e_notify_client_of_netdev_close+0x54/0xc0 [i40e]\n[ +0.000035] i40e_service_task+0x126/0x190 [i40e]\n[ +0.000024] process_one_work+0x174/0x340\n[ +0.000003] worker_th\n---truncated---",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-36004",
"url": "https://www.suse.com/security/cve/CVE-2024-36004"
},
{
"category": "external",
"summary": "SUSE Bug 1224545 for CVE-2024-36004",
"url": "https://bugzilla.suse.com/1224545"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-14T07:24:46Z",
"details": "moderate"
}
],
"title": "CVE-2024-36004"
},
{
"cve": "CVE-2024-36014",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-36014"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/arm/malidp: fix a possible null pointer dereference\n\nIn malidp_mw_connector_reset, new memory is allocated with kzalloc, but\nno check is performed. In order to prevent null pointer dereferencing,\nensure that mw_state is checked before calling\n__drm_atomic_helper_connector_reset.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-36014",
"url": "https://www.suse.com/security/cve/CVE-2024-36014"
},
{
"category": "external",
"summary": "SUSE Bug 1225593 for CVE-2024-36014",
"url": "https://bugzilla.suse.com/1225593"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-14T07:24:46Z",
"details": "moderate"
}
],
"title": "CVE-2024-36014"
},
{
"cve": "CVE-2024-36288",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-36288"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nSUNRPC: Fix loop termination condition in gss_free_in_token_pages()\n\nThe in_token-\u003epages[] array is not NULL terminated. This results in\nthe following KASAN splat:\n\n KASAN: maybe wild-memory-access in range [0x04a2013400000008-0x04a201340000000f]",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-36288",
"url": "https://www.suse.com/security/cve/CVE-2024-36288"
},
{
"category": "external",
"summary": "SUSE Bug 1226834 for CVE-2024-36288",
"url": "https://bugzilla.suse.com/1226834"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-14T07:24:46Z",
"details": "moderate"
}
],
"title": "CVE-2024-36288"
},
{
"cve": "CVE-2024-36592",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-36592"
}
],
"notes": [
{
"category": "general",
"text": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-36592",
"url": "https://www.suse.com/security/cve/CVE-2024-36592"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-14T07:24:46Z",
"details": "important"
}
],
"title": "CVE-2024-36592"
},
{
"cve": "CVE-2024-36901",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-36901"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nipv6: prevent NULL dereference in ip6_output()\n\nAccording to syzbot, there is a chance that ip6_dst_idev()\nreturns NULL in ip6_output(). Most places in IPv6 stack\ndeal with a NULL idev just fine, but not here.\n\nsyzbot reported:\n\ngeneral protection fault, probably for non-canonical address 0xdffffc00000000bc: 0000 [#1] PREEMPT SMP KASAN PTI\nKASAN: null-ptr-deref in range [0x00000000000005e0-0x00000000000005e7]\nCPU: 0 PID: 9775 Comm: syz-executor.4 Not tainted 6.9.0-rc5-syzkaller-00157-g6a30653b604a #0\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/27/2024\n RIP: 0010:ip6_output+0x231/0x3f0 net/ipv6/ip6_output.c:237\nCode: 3c 1e 00 49 89 df 74 08 4c 89 ef e8 19 58 db f7 48 8b 44 24 20 49 89 45 00 49 89 c5 48 8d 9d e0 05 00 00 48 89 d8 48 c1 e8 03 \u003c42\u003e 0f b6 04 38 84 c0 4c 8b 74 24 28 0f 85 61 01 00 00 8b 1b 31 ff\nRSP: 0018:ffffc9000927f0d8 EFLAGS: 00010202\nRAX: 00000000000000bc RBX: 00000000000005e0 RCX: 0000000000040000\nRDX: ffffc900131f9000 RSI: 0000000000004f47 RDI: 0000000000004f48\nRBP: 0000000000000000 R08: ffffffff8a1f0b9a R09: 1ffffffff1f51fad\nR10: dffffc0000000000 R11: fffffbfff1f51fae R12: ffff8880293ec8c0\nR13: ffff88805d7fc000 R14: 1ffff1100527d91a R15: dffffc0000000000\nFS: 00007f135c6856c0(0000) GS:ffff8880b9400000(0000) knlGS:0000000000000000\nCS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 0000000020000080 CR3: 0000000064096000 CR4: 00000000003506f0\nDR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\nDR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\nCall Trace:\n \u003cTASK\u003e\n NF_HOOK include/linux/netfilter.h:314 [inline]\n ip6_xmit+0xefe/0x17f0 net/ipv6/ip6_output.c:358\n sctp_v6_xmit+0x9f2/0x13f0 net/sctp/ipv6.c:248\n sctp_packet_transmit+0x26ad/0x2ca0 net/sctp/output.c:653\n sctp_packet_singleton+0x22c/0x320 net/sctp/outqueue.c:783\n sctp_outq_flush_ctrl net/sctp/outqueue.c:914 [inline]\n sctp_outq_flush+0x6d5/0x3e20 net/sctp/outqueue.c:1212\n sctp_side_effects net/sctp/sm_sideeffect.c:1198 [inline]\n sctp_do_sm+0x59cc/0x60c0 net/sctp/sm_sideeffect.c:1169\n sctp_primitive_ASSOCIATE+0x95/0xc0 net/sctp/primitive.c:73\n __sctp_connect+0x9cd/0xe30 net/sctp/socket.c:1234\n sctp_connect net/sctp/socket.c:4819 [inline]\n sctp_inet_connect+0x149/0x1f0 net/sctp/socket.c:4834\n __sys_connect_file net/socket.c:2048 [inline]\n __sys_connect+0x2df/0x310 net/socket.c:2065\n __do_sys_connect net/socket.c:2075 [inline]\n __se_sys_connect net/socket.c:2072 [inline]\n __x64_sys_connect+0x7a/0x90 net/socket.c:2072\n do_syscall_x64 arch/x86/entry/common.c:52 [inline]\n do_syscall_64+0xf5/0x240 arch/x86/entry/common.c:83\n entry_SYSCALL_64_after_hwframe+0x77/0x7f",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-36901",
"url": "https://www.suse.com/security/cve/CVE-2024-36901"
},
{
"category": "external",
"summary": "SUSE Bug 1225711 for CVE-2024-36901",
"url": "https://bugzilla.suse.com/1225711"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-14T07:24:46Z",
"details": "moderate"
}
],
"title": "CVE-2024-36901"
},
{
"cve": "CVE-2024-36902",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-36902"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nipv6: fib6_rules: avoid possible NULL dereference in fib6_rule_action()\n\nsyzbot is able to trigger the following crash [1],\ncaused by unsafe ip6_dst_idev() use.\n\nIndeed ip6_dst_idev() can return NULL, and must always be checked.\n\n[1]\n\nOops: general protection fault, probably for non-canonical address 0xdffffc0000000000: 0000 [#1] PREEMPT SMP KASAN PTI\nKASAN: null-ptr-deref in range [0x0000000000000000-0x0000000000000007]\nCPU: 0 PID: 31648 Comm: syz-executor.0 Not tainted 6.9.0-rc4-next-20240417-syzkaller #0\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/27/2024\n RIP: 0010:__fib6_rule_action net/ipv6/fib6_rules.c:237 [inline]\n RIP: 0010:fib6_rule_action+0x241/0x7b0 net/ipv6/fib6_rules.c:267\nCode: 02 00 00 49 8d 9f d8 00 00 00 48 89 d8 48 c1 e8 03 42 80 3c 20 00 74 08 48 89 df e8 f9 32 bf f7 48 8b 1b 48 89 d8 48 c1 e8 03 \u003c42\u003e 80 3c 20 00 74 08 48 89 df e8 e0 32 bf f7 4c 8b 03 48 89 ef 4c\nRSP: 0018:ffffc9000fc1f2f0 EFLAGS: 00010246\nRAX: 0000000000000000 RBX: 0000000000000000 RCX: 1a772f98c8186700\nRDX: 0000000000000003 RSI: ffffffff8bcac4e0 RDI: ffffffff8c1f9760\nRBP: ffff8880673fb980 R08: ffffffff8fac15ef R09: 1ffffffff1f582bd\nR10: dffffc0000000000 R11: fffffbfff1f582be R12: dffffc0000000000\nR13: 0000000000000080 R14: ffff888076509000 R15: ffff88807a029a00\nFS: 00007f55e82ca6c0(0000) GS:ffff8880b9400000(0000) knlGS:0000000000000000\nCS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 0000001b31d23000 CR3: 0000000022b66000 CR4: 00000000003506f0\nDR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\nDR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\nCall Trace:\n \u003cTASK\u003e\n fib_rules_lookup+0x62c/0xdb0 net/core/fib_rules.c:317\n fib6_rule_lookup+0x1fd/0x790 net/ipv6/fib6_rules.c:108\n ip6_route_output_flags_noref net/ipv6/route.c:2637 [inline]\n ip6_route_output_flags+0x38e/0x610 net/ipv6/route.c:2649\n ip6_route_output include/net/ip6_route.h:93 [inline]\n ip6_dst_lookup_tail+0x189/0x11a0 net/ipv6/ip6_output.c:1120\n ip6_dst_lookup_flow+0xb9/0x180 net/ipv6/ip6_output.c:1250\n sctp_v6_get_dst+0x792/0x1e20 net/sctp/ipv6.c:326\n sctp_transport_route+0x12c/0x2e0 net/sctp/transport.c:455\n sctp_assoc_add_peer+0x614/0x15c0 net/sctp/associola.c:662\n sctp_connect_new_asoc+0x31d/0x6c0 net/sctp/socket.c:1099\n __sctp_connect+0x66d/0xe30 net/sctp/socket.c:1197\n sctp_connect net/sctp/socket.c:4819 [inline]\n sctp_inet_connect+0x149/0x1f0 net/sctp/socket.c:4834\n __sys_connect_file net/socket.c:2048 [inline]\n __sys_connect+0x2df/0x310 net/socket.c:2065\n __do_sys_connect net/socket.c:2075 [inline]\n __se_sys_connect net/socket.c:2072 [inline]\n __x64_sys_connect+0x7a/0x90 net/socket.c:2072\n do_syscall_x64 arch/x86/entry/common.c:52 [inline]\n do_syscall_64+0xf5/0x240 arch/x86/entry/common.c:83\n entry_SYSCALL_64_after_hwframe+0x77/0x7f",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-36902",
"url": "https://www.suse.com/security/cve/CVE-2024-36902"
},
{
"category": "external",
"summary": "SUSE Bug 1225719 for CVE-2024-36902",
"url": "https://bugzilla.suse.com/1225719"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-14T07:24:46Z",
"details": "moderate"
}
],
"title": "CVE-2024-36902"
},
{
"cve": "CVE-2024-36919",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-36919"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: bnx2fc: Remove spin_lock_bh while releasing resources after upload\n\nThe session resources are used by FW and driver when session is offloaded,\nonce session is uploaded these resources are not used. The lock is not\nrequired as these fields won\u0027t be used any longer. The offload and upload\ncalls are sequential, hence lock is not required.\n\nThis will suppress following BUG_ON():\n\n[ 449.843143] ------------[ cut here ]------------\n[ 449.848302] kernel BUG at mm/vmalloc.c:2727!\n[ 449.853072] invalid opcode: 0000 [#1] PREEMPT SMP PTI\n[ 449.858712] CPU: 5 PID: 1996 Comm: kworker/u24:2 Not tainted 5.14.0-118.el9.x86_64 #1\nRebooting.\n[ 449.867454] Hardware name: Dell Inc. PowerEdge R730/0WCJNT, BIOS 2.3.4 11/08/2016\n[ 449.876966] Workqueue: fc_rport_eq fc_rport_work [libfc]\n[ 449.882910] RIP: 0010:vunmap+0x2e/0x30\n[ 449.887098] Code: 00 65 8b 05 14 a2 f0 4a a9 00 ff ff 00 75 1b 55 48 89 fd e8 34 36 79 00 48 85 ed 74 0b 48 89 ef 31 f6 5d e9 14 fc ff ff 5d c3 \u003c0f\u003e 0b 0f 1f 44 00 00 41 57 41 56 49 89 ce 41 55 49 89 fd 41 54 41\n[ 449.908054] RSP: 0018:ffffb83d878b3d68 EFLAGS: 00010206\n[ 449.913887] RAX: 0000000080000201 RBX: ffff8f4355133550 RCX: 000000000d400005\n[ 449.921843] RDX: 0000000000000001 RSI: 0000000000001000 RDI: ffffb83da53f5000\n[ 449.929808] RBP: ffff8f4ac6675800 R08: ffffb83d878b3d30 R09: 00000000000efbdf\n[ 449.937774] R10: 0000000000000003 R11: ffff8f434573e000 R12: 0000000000001000\n[ 449.945736] R13: 0000000000001000 R14: ffffb83da53f5000 R15: ffff8f43d4ea3ae0\n[ 449.953701] FS: 0000000000000000(0000) GS:ffff8f529fc80000(0000) knlGS:0000000000000000\n[ 449.962732] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n[ 449.969138] CR2: 00007f8cf993e150 CR3: 0000000efbe10003 CR4: 00000000003706e0\n[ 449.977102] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\n[ 449.985065] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\n[ 449.993028] Call Trace:\n[ 449.995756] __iommu_dma_free+0x96/0x100\n[ 450.000139] bnx2fc_free_session_resc+0x67/0x240 [bnx2fc]\n[ 450.006171] bnx2fc_upload_session+0xce/0x100 [bnx2fc]\n[ 450.011910] bnx2fc_rport_event_handler+0x9f/0x240 [bnx2fc]\n[ 450.018136] fc_rport_work+0x103/0x5b0 [libfc]\n[ 450.023103] process_one_work+0x1e8/0x3c0\n[ 450.027581] worker_thread+0x50/0x3b0\n[ 450.031669] ? rescuer_thread+0x370/0x370\n[ 450.036143] kthread+0x149/0x170\n[ 450.039744] ? set_kthread_struct+0x40/0x40\n[ 450.044411] ret_from_fork+0x22/0x30\n[ 450.048404] Modules linked in: vfat msdos fat xfs nfs_layout_nfsv41_files rpcsec_gss_krb5 auth_rpcgss nfsv4 dns_resolver dm_service_time qedf qed crc8 bnx2fc libfcoe libfc scsi_transport_fc intel_rapl_msr intel_rapl_common x86_pkg_temp_thermal intel_powerclamp dcdbas rapl intel_cstate intel_uncore mei_me pcspkr mei ipmi_ssif lpc_ich ipmi_si fuse zram ext4 mbcache jbd2 loop nfsv3 nfs_acl nfs lockd grace fscache netfs irdma ice sd_mod t10_pi sg ib_uverbs ib_core 8021q garp mrp stp llc mgag200 i2c_algo_bit drm_kms_helper syscopyarea sysfillrect sysimgblt mxm_wmi fb_sys_fops cec crct10dif_pclmul ahci crc32_pclmul bnx2x drm ghash_clmulni_intel libahci rfkill i40e libata megaraid_sas mdio wmi sunrpc lrw dm_crypt dm_round_robin dm_multipath dm_snapshot dm_bufio dm_mirror dm_region_hash dm_log dm_zero dm_mod linear raid10 raid456 async_raid6_recov async_memcpy async_pq async_xor async_tx raid6_pq libcrc32c crc32c_intel raid1 raid0 iscsi_ibft squashfs be2iscsi bnx2i cnic uio cxgb4i cxgb4 tls\n[ 450.048497] libcxgbi libcxgb qla4xxx iscsi_boot_sysfs iscsi_tcp libiscsi_tcp libiscsi scsi_transport_iscsi edd ipmi_devintf ipmi_msghandler\n[ 450.159753] ---[ end trace 712de2c57c64abc8 ]---",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-36919",
"url": "https://www.suse.com/security/cve/CVE-2024-36919"
},
{
"category": "external",
"summary": "SUSE Bug 1225767 for CVE-2024-36919",
"url": "https://bugzilla.suse.com/1225767"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-14T07:24:46Z",
"details": "moderate"
}
],
"title": "CVE-2024-36919"
},
{
"cve": "CVE-2024-36924",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-36924"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: lpfc: Release hbalock before calling lpfc_worker_wake_up()\n\nlpfc_worker_wake_up() calls the lpfc_work_done() routine, which takes the\nhbalock. Thus, lpfc_worker_wake_up() should not be called while holding the\nhbalock to avoid potential deadlock.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-36924",
"url": "https://www.suse.com/security/cve/CVE-2024-36924"
},
{
"category": "external",
"summary": "SUSE Bug 1225820 for CVE-2024-36924",
"url": "https://bugzilla.suse.com/1225820"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-14T07:24:46Z",
"details": "moderate"
}
],
"title": "CVE-2024-36924"
},
{
"cve": "CVE-2024-36939",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-36939"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnfs: Handle error of rpc_proc_register() in nfs_net_init().\n\nsyzkaller reported a warning [0] triggered while destroying immature\nnetns.\n\nrpc_proc_register() was called in init_nfs_fs(), but its error\nhas been ignored since at least the initial commit 1da177e4c3f4\n(\"Linux-2.6.12-rc2\").\n\nRecently, commit d47151b79e32 (\"nfs: expose /proc/net/sunrpc/nfs\nin net namespaces\") converted the procfs to per-netns and made\nthe problem more visible.\n\nEven when rpc_proc_register() fails, nfs_net_init() could succeed,\nand thus nfs_net_exit() will be called while destroying the netns.\n\nThen, remove_proc_entry() will be called for non-existing proc\ndirectory and trigger the warning below.\n\nLet\u0027s handle the error of rpc_proc_register() properly in nfs_net_init().\n\n[0]:\nname \u0027nfs\u0027\nWARNING: CPU: 1 PID: 1710 at fs/proc/generic.c:711 remove_proc_entry+0x1bb/0x2d0 fs/proc/generic.c:711\nModules linked in:\nCPU: 1 PID: 1710 Comm: syz-executor.2 Not tainted 6.8.0-12822-gcd51db110a7e #12\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.16.0-0-gd239552ce722-prebuilt.qemu.org 04/01/2014\nRIP: 0010:remove_proc_entry+0x1bb/0x2d0 fs/proc/generic.c:711\nCode: 41 5d 41 5e c3 e8 85 09 b5 ff 48 c7 c7 88 58 64 86 e8 09 0e 71 02 e8 74 09 b5 ff 4c 89 e6 48 c7 c7 de 1b 80 84 e8 c5 ad 97 ff \u003c0f\u003e 0b eb b1 e8 5c 09 b5 ff 48 c7 c7 88 58 64 86 e8 e0 0d 71 02 eb\nRSP: 0018:ffffc9000c6d7ce0 EFLAGS: 00010286\nRAX: 0000000000000000 RBX: ffff8880422b8b00 RCX: ffffffff8110503c\nRDX: ffff888030652f00 RSI: ffffffff81105045 RDI: 0000000000000001\nRBP: 0000000000000000 R08: 0000000000000001 R09: 0000000000000000\nR10: 0000000000000001 R11: ffffffff81bb62cb R12: ffffffff84807ffc\nR13: ffff88804ad6fcc0 R14: ffffffff84807ffc R15: ffffffff85741ff8\nFS: 00007f30cfba8640(0000) GS:ffff88807dd00000(0000) knlGS:0000000000000000\nCS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 00007ff51afe8000 CR3: 000000005a60a005 CR4: 0000000000770ef0\nDR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\nDR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\nPKRU: 55555554\nCall Trace:\n \u003cTASK\u003e\n rpc_proc_unregister+0x64/0x70 net/sunrpc/stats.c:310\n nfs_net_exit+0x1c/0x30 fs/nfs/inode.c:2438\n ops_exit_list+0x62/0xb0 net/core/net_namespace.c:170\n setup_net+0x46c/0x660 net/core/net_namespace.c:372\n copy_net_ns+0x244/0x590 net/core/net_namespace.c:505\n create_new_namespaces+0x2ed/0x770 kernel/nsproxy.c:110\n unshare_nsproxy_namespaces+0xae/0x160 kernel/nsproxy.c:228\n ksys_unshare+0x342/0x760 kernel/fork.c:3322\n __do_sys_unshare kernel/fork.c:3393 [inline]\n __se_sys_unshare kernel/fork.c:3391 [inline]\n __x64_sys_unshare+0x1f/0x30 kernel/fork.c:3391\n do_syscall_x64 arch/x86/entry/common.c:52 [inline]\n do_syscall_64+0x4f/0x110 arch/x86/entry/common.c:83\n entry_SYSCALL_64_after_hwframe+0x46/0x4e\nRIP: 0033:0x7f30d0febe5d\nCode: ff c3 66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e fa 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 \u003c48\u003e 3d 01 f0 ff ff 73 01 c3 48 8b 0d 73 9f 1b 00 f7 d8 64 89 01 48\nRSP: 002b:00007f30cfba7cc8 EFLAGS: 00000246 ORIG_RAX: 0000000000000110\nRAX: ffffffffffffffda RBX: 00000000004bbf80 RCX: 00007f30d0febe5d\nRDX: 0000000000000000 RSI: 0000000000000000 RDI: 000000006c020600\nRBP: 00000000004bbf80 R08: 0000000000000000 R09: 0000000000000000\nR10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002\nR13: 000000000000000b R14: 00007f30d104c530 R15: 0000000000000000\n \u003c/TASK\u003e",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-36939",
"url": "https://www.suse.com/security/cve/CVE-2024-36939"
},
{
"category": "external",
"summary": "SUSE Bug 1225838 for CVE-2024-36939",
"url": "https://bugzilla.suse.com/1225838"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-14T07:24:46Z",
"details": "moderate"
}
],
"title": "CVE-2024-36939"
},
{
"cve": "CVE-2024-36941",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-36941"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: nl80211: don\u0027t free NULL coalescing rule\n\nIf the parsing fails, we can dereference a NULL pointer here.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-36941",
"url": "https://www.suse.com/security/cve/CVE-2024-36941"
},
{
"category": "external",
"summary": "SUSE Bug 1225835 for CVE-2024-36941",
"url": "https://bugzilla.suse.com/1225835"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-14T07:24:46Z",
"details": "moderate"
}
],
"title": "CVE-2024-36941"
},
{
"cve": "CVE-2024-36952",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-36952"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: lpfc: Move NPIV\u0027s transport unregistration to after resource clean up\n\nThere are cases after NPIV deletion where the fabric switch still believes\nthe NPIV is logged into the fabric. This occurs when a vport is\nunregistered before the Remove All DA_ID CT and LOGO ELS are sent to the\nfabric.\n\nCurrently fc_remove_host(), which calls dev_loss_tmo for all D_IDs including\nthe fabric D_ID, removes the last ndlp reference and frees the ndlp rport\nobject. This sometimes causes the race condition where the final DA_ID and\nLOGO are skipped from being sent to the fabric switch.\n\nFix by moving the fc_remove_host() and scsi_remove_host() calls after DA_ID\nand LOGO are sent.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-36952",
"url": "https://www.suse.com/security/cve/CVE-2024-36952"
},
{
"category": "external",
"summary": "SUSE Bug 1225898 for CVE-2024-36952",
"url": "https://bugzilla.suse.com/1225898"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-14T07:24:46Z",
"details": "moderate"
}
],
"title": "CVE-2024-36952"
},
{
"cve": "CVE-2024-38558",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-38558"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: openvswitch: fix overwriting ct original tuple for ICMPv6\n\nOVS_PACKET_CMD_EXECUTE has 3 main attributes:\n - OVS_PACKET_ATTR_KEY - Packet metadata in a netlink format.\n - OVS_PACKET_ATTR_PACKET - Binary packet content.\n - OVS_PACKET_ATTR_ACTIONS - Actions to execute on the packet.\n\nOVS_PACKET_ATTR_KEY is parsed first to populate sw_flow_key structure\nwith the metadata like conntrack state, input port, recirculation id,\netc. Then the packet itself gets parsed to populate the rest of the\nkeys from the packet headers.\n\nWhenever the packet parsing code starts parsing the ICMPv6 header, it\nfirst zeroes out fields in the key corresponding to Neighbor Discovery\ninformation even if it is not an ND packet.\n\nIt is an \u0027ipv6.nd\u0027 field. However, the \u0027ipv6\u0027 is a union that shares\nthe space between \u0027nd\u0027 and \u0027ct_orig\u0027 that holds the original tuple\nconntrack metadata parsed from the OVS_PACKET_ATTR_KEY.\n\nND packets should not normally have conntrack state, so it\u0027s fine to\nshare the space, but normal ICMPv6 Echo packets or maybe other types of\nICMPv6 can have the state attached and it should not be overwritten.\n\nThe issue results in all but the last 4 bytes of the destination\naddress being wiped from the original conntrack tuple leading to\nincorrect packet matching and potentially executing wrong actions\nin case this packet recirculates within the datapath or goes back\nto userspace.\n\nND fields should not be accessed in non-ND packets, so not clearing\nthem should be fine. Executing memset() only for actual ND packets to\navoid the issue.\n\nInitializing the whole thing before parsing is needed because ND packet\nmay not contain all the options.\n\nThe issue only affects the OVS_PACKET_CMD_EXECUTE path and doesn\u0027t\naffect packets entering OVS datapath from network interfaces, because\nin this case CT metadata is populated from skb after the packet is\nalready parsed.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-38558",
"url": "https://www.suse.com/security/cve/CVE-2024-38558"
},
{
"category": "external",
"summary": "SUSE Bug 1226783 for CVE-2024-38558",
"url": "https://bugzilla.suse.com/1226783"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-14T07:24:46Z",
"details": "moderate"
}
],
"title": "CVE-2024-38558"
},
{
"cve": "CVE-2024-38560",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-38560"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: bfa: Ensure the copied buf is NUL terminated\n\nCurrently, we allocate a nbytes-sized kernel buffer and copy nbytes from\nuserspace to that buffer. Later, we use sscanf on this buffer but we don\u0027t\nensure that the string is terminated inside the buffer, this can lead to\nOOB read when using sscanf. Fix this issue by using memdup_user_nul instead\nof memdup_user.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-38560",
"url": "https://www.suse.com/security/cve/CVE-2024-38560"
},
{
"category": "external",
"summary": "SUSE Bug 1226786 for CVE-2024-38560",
"url": "https://bugzilla.suse.com/1226786"
},
{
"category": "external",
"summary": "SUSE Bug 1227319 for CVE-2024-38560",
"url": "https://bugzilla.suse.com/1227319"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-14T07:24:46Z",
"details": "moderate"
}
],
"title": "CVE-2024-38560"
},
{
"cve": "CVE-2024-38598",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-38598"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmd: fix resync softlockup when bitmap size is less than array size\n\nIs is reported that for dm-raid10, lvextend + lvchange --syncaction will\ntrigger following softlockup:\n\nkernel:watchdog: BUG: soft lockup - CPU#3 stuck for 26s! [mdX_resync:6976]\nCPU: 7 PID: 3588 Comm: mdX_resync Kdump: loaded Not tainted 6.9.0-rc4-next-20240419 #1\nRIP: 0010:_raw_spin_unlock_irq+0x13/0x30\nCall Trace:\n \u003cTASK\u003e\n md_bitmap_start_sync+0x6b/0xf0\n raid10_sync_request+0x25c/0x1b40 [raid10]\n md_do_sync+0x64b/0x1020\n md_thread+0xa7/0x170\n kthread+0xcf/0x100\n ret_from_fork+0x30/0x50\n ret_from_fork_asm+0x1a/0x30\n\nAnd the detailed process is as follows:\n\nmd_do_sync\n j = mddev-\u003eresync_min\n while (j \u003c max_sectors)\n sectors = raid10_sync_request(mddev, j, \u0026skipped)\n if (!md_bitmap_start_sync(..., \u0026sync_blocks))\n // md_bitmap_start_sync set sync_blocks to 0\n return sync_blocks + sectors_skippe;\n // sectors = 0;\n j += sectors;\n // j never change\n\nRoot cause is that commit 301867b1c168 (\"md/raid10: check\nslab-out-of-bounds in md_bitmap_get_counter\") return early from\nmd_bitmap_get_counter(), without setting returned blocks.\n\nFix this problem by always set returned blocks from\nmd_bitmap_get_counter\"(), as it used to be.\n\nNoted that this patch just fix the softlockup problem in kernel, the\ncase that bitmap size doesn\u0027t match array size still need to be fixed.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-38598",
"url": "https://www.suse.com/security/cve/CVE-2024-38598"
},
{
"category": "external",
"summary": "SUSE Bug 1226757 for CVE-2024-38598",
"url": "https://bugzilla.suse.com/1226757"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-14T07:24:46Z",
"details": "moderate"
}
],
"title": "CVE-2024-38598"
},
{
"cve": "CVE-2024-38619",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-38619"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nusb-storage: alauda: Check whether the media is initialized\n\nThe member \"uzonesize\" of struct alauda_info will remain 0\nif alauda_init_media() fails, potentially causing divide errors\nin alauda_read_data() and alauda_write_lba().\n- Add a member \"media_initialized\" to struct alauda_info.\n- Change a condition in alauda_check_media() to ensure the\n first initialization.\n- Add an error check for the return value of alauda_init_media().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-38619",
"url": "https://www.suse.com/security/cve/CVE-2024-38619"
},
{
"category": "external",
"summary": "SUSE Bug 1226861 for CVE-2024-38619",
"url": "https://bugzilla.suse.com/1226861"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-14T07:24:46Z",
"details": "moderate"
}
],
"title": "CVE-2024-38619"
},
{
"cve": "CVE-2024-38630",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-38630"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nwatchdog: cpu5wdt.c: Fix use-after-free bug caused by cpu5wdt_trigger\n\nWhen the cpu5wdt module is removing, the origin code uses del_timer() to\nde-activate the timer. If the timer handler is running, del_timer() could\nnot stop it and will return directly. If the port region is released by\nrelease_region() and then the timer handler cpu5wdt_trigger() calls outb()\nto write into the region that is released, the use-after-free bug will\nhappen.\n\nChange del_timer() to timer_shutdown_sync() in order that the timer handler\ncould be finished before the port region is released.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-38630",
"url": "https://www.suse.com/security/cve/CVE-2024-38630"
},
{
"category": "external",
"summary": "SUSE Bug 1226908 for CVE-2024-38630",
"url": "https://bugzilla.suse.com/1226908"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-14T07:24:46Z",
"details": "moderate"
}
],
"title": "CVE-2024-38630"
},
{
"cve": "CVE-2024-39301",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-39301"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/9p: fix uninit-value in p9_client_rpc()\n\nSyzbot with the help of KMSAN reported the following error:\n\nBUG: KMSAN: uninit-value in trace_9p_client_res include/trace/events/9p.h:146 [inline]\nBUG: KMSAN: uninit-value in p9_client_rpc+0x1314/0x1340 net/9p/client.c:754\n trace_9p_client_res include/trace/events/9p.h:146 [inline]\n p9_client_rpc+0x1314/0x1340 net/9p/client.c:754\n p9_client_create+0x1551/0x1ff0 net/9p/client.c:1031\n v9fs_session_init+0x1b9/0x28e0 fs/9p/v9fs.c:410\n v9fs_mount+0xe2/0x12b0 fs/9p/vfs_super.c:122\n legacy_get_tree+0x114/0x290 fs/fs_context.c:662\n vfs_get_tree+0xa7/0x570 fs/super.c:1797\n do_new_mount+0x71f/0x15e0 fs/namespace.c:3352\n path_mount+0x742/0x1f20 fs/namespace.c:3679\n do_mount fs/namespace.c:3692 [inline]\n __do_sys_mount fs/namespace.c:3898 [inline]\n __se_sys_mount+0x725/0x810 fs/namespace.c:3875\n __x64_sys_mount+0xe4/0x150 fs/namespace.c:3875\n do_syscall_64+0xd5/0x1f0\n entry_SYSCALL_64_after_hwframe+0x6d/0x75\n\nUninit was created at:\n __alloc_pages+0x9d6/0xe70 mm/page_alloc.c:4598\n __alloc_pages_node include/linux/gfp.h:238 [inline]\n alloc_pages_node include/linux/gfp.h:261 [inline]\n alloc_slab_page mm/slub.c:2175 [inline]\n allocate_slab mm/slub.c:2338 [inline]\n new_slab+0x2de/0x1400 mm/slub.c:2391\n ___slab_alloc+0x1184/0x33d0 mm/slub.c:3525\n __slab_alloc mm/slub.c:3610 [inline]\n __slab_alloc_node mm/slub.c:3663 [inline]\n slab_alloc_node mm/slub.c:3835 [inline]\n kmem_cache_alloc+0x6d3/0xbe0 mm/slub.c:3852\n p9_tag_alloc net/9p/client.c:278 [inline]\n p9_client_prepare_req+0x20a/0x1770 net/9p/client.c:641\n p9_client_rpc+0x27e/0x1340 net/9p/client.c:688\n p9_client_create+0x1551/0x1ff0 net/9p/client.c:1031\n v9fs_session_init+0x1b9/0x28e0 fs/9p/v9fs.c:410\n v9fs_mount+0xe2/0x12b0 fs/9p/vfs_super.c:122\n legacy_get_tree+0x114/0x290 fs/fs_context.c:662\n vfs_get_tree+0xa7/0x570 fs/super.c:1797\n do_new_mount+0x71f/0x15e0 fs/namespace.c:3352\n path_mount+0x742/0x1f20 fs/namespace.c:3679\n do_mount fs/namespace.c:3692 [inline]\n __do_sys_mount fs/namespace.c:3898 [inline]\n __se_sys_mount+0x725/0x810 fs/namespace.c:3875\n __x64_sys_mount+0xe4/0x150 fs/namespace.c:3875\n do_syscall_64+0xd5/0x1f0\n entry_SYSCALL_64_after_hwframe+0x6d/0x75\n\nIf p9_check_errors() fails early in p9_client_rpc(), req-\u003erc.tag\nwill not be properly initialized. However, trace_9p_client_res()\nends up trying to print it out anyway before p9_client_rpc()\nfinishes.\n\nFix this issue by assigning default values to p9_fcall fields\nsuch as \u0027tag\u0027 and (just in case KMSAN unearths something new) \u0027id\u0027\nduring the tag allocation stage.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-39301",
"url": "https://www.suse.com/security/cve/CVE-2024-39301"
},
{
"category": "external",
"summary": "SUSE Bug 1226994 for CVE-2024-39301",
"url": "https://bugzilla.suse.com/1226994"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-14T07:24:46Z",
"details": "moderate"
}
],
"title": "CVE-2024-39301"
},
{
"cve": "CVE-2024-39475",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-39475"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nfbdev: savage: Handle err return when savagefb_check_var failed\n\nThe commit 04e5eac8f3ab(\"fbdev: savage: Error out if pixclock equals zero\")\nchecks the value of pixclock to avoid divide-by-zero error. However\nthe function savagefb_probe doesn\u0027t handle the error return of\nsavagefb_check_var. When pixclock is 0, it will cause divide-by-zero error.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-39475",
"url": "https://www.suse.com/security/cve/CVE-2024-39475"
},
{
"category": "external",
"summary": "SUSE Bug 1227435 for CVE-2024-39475",
"url": "https://bugzilla.suse.com/1227435"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-14T07:24:46Z",
"details": "moderate"
}
],
"title": "CVE-2024-39475"
},
{
"cve": "CVE-2024-39487",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-39487"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbonding: Fix out-of-bounds read in bond_option_arp_ip_targets_set()\n\nIn function bond_option_arp_ip_targets_set(), if newval-\u003estring is an\nempty string, newval-\u003estring+1 will point to the byte after the\nstring, causing an out-of-bound read.\n\nBUG: KASAN: slab-out-of-bounds in strlen+0x7d/0xa0 lib/string.c:418\nRead of size 1 at addr ffff8881119c4781 by task syz-executor665/8107\nCPU: 1 PID: 8107 Comm: syz-executor665 Not tainted 6.7.0-rc7 #1\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.15.0-1 04/01/2014\nCall Trace:\n \u003cTASK\u003e\n __dump_stack lib/dump_stack.c:88 [inline]\n dump_stack_lvl+0xd9/0x150 lib/dump_stack.c:106\n print_address_description mm/kasan/report.c:364 [inline]\n print_report+0xc1/0x5e0 mm/kasan/report.c:475\n kasan_report+0xbe/0xf0 mm/kasan/report.c:588\n strlen+0x7d/0xa0 lib/string.c:418\n __fortify_strlen include/linux/fortify-string.h:210 [inline]\n in4_pton+0xa3/0x3f0 net/core/utils.c:130\n bond_option_arp_ip_targets_set+0xc2/0x910\ndrivers/net/bonding/bond_options.c:1201\n __bond_opt_set+0x2a4/0x1030 drivers/net/bonding/bond_options.c:767\n __bond_opt_set_notify+0x48/0x150 drivers/net/bonding/bond_options.c:792\n bond_opt_tryset_rtnl+0xda/0x160 drivers/net/bonding/bond_options.c:817\n bonding_sysfs_store_option+0xa1/0x120 drivers/net/bonding/bond_sysfs.c:156\n dev_attr_store+0x54/0x80 drivers/base/core.c:2366\n sysfs_kf_write+0x114/0x170 fs/sysfs/file.c:136\n kernfs_fop_write_iter+0x337/0x500 fs/kernfs/file.c:334\n call_write_iter include/linux/fs.h:2020 [inline]\n new_sync_write fs/read_write.c:491 [inline]\n vfs_write+0x96a/0xd80 fs/read_write.c:584\n ksys_write+0x122/0x250 fs/read_write.c:637\n do_syscall_x64 arch/x86/entry/common.c:52 [inline]\n do_syscall_64+0x40/0x110 arch/x86/entry/common.c:83\n entry_SYSCALL_64_after_hwframe+0x63/0x6b\n---[ end trace ]---\n\nFix it by adding a check of string length before using it.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-39487",
"url": "https://www.suse.com/security/cve/CVE-2024-39487"
},
{
"category": "external",
"summary": "SUSE Bug 1227573 for CVE-2024-39487",
"url": "https://bugzilla.suse.com/1227573"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-14T07:24:46Z",
"details": "moderate"
}
],
"title": "CVE-2024-39487"
},
{
"cve": "CVE-2024-39488",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-39488"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\narm64: asm-bug: Add .align 2 to the end of __BUG_ENTRY\n\nWhen CONFIG_DEBUG_BUGVERBOSE=n, we fail to add necessary padding bytes\nto bug_table entries, and as a result the last entry in a bug table will\nbe ignored, potentially leading to an unexpected panic(). All prior\nentries in the table will be handled correctly.\n\nThe arm64 ABI requires that struct fields of up to 8 bytes are\nnaturally-aligned, with padding added within a struct such that struct\nare suitably aligned within arrays.\n\nWhen CONFIG_DEBUG_BUGVERPOSE=y, the layout of a bug_entry is:\n\n\tstruct bug_entry {\n\t\tsigned int bug_addr_disp;\t// 4 bytes\n\t\tsigned int file_disp;\t// 4 bytes\n\t\tunsigned short line;\t\t// 2 bytes\n\t\tunsigned short flags;\t\t// 2 bytes\n\t}\n\n... with 12 bytes total, requiring 4-byte alignment.\n\nWhen CONFIG_DEBUG_BUGVERBOSE=n, the layout of a bug_entry is:\n\n\tstruct bug_entry {\n\t\tsigned int bug_addr_disp;\t// 4 bytes\n\t\tunsigned short flags;\t\t// 2 bytes\n\t\t\u003c implicit padding \u003e\t\t// 2 bytes\n\t}\n\n... with 8 bytes total, with 6 bytes of data and 2 bytes of trailing\npadding, requiring 4-byte alginment.\n\nWhen we create a bug_entry in assembly, we align the start of the entry\nto 4 bytes, which implicitly handles padding for any prior entries.\nHowever, we do not align the end of the entry, and so when\nCONFIG_DEBUG_BUGVERBOSE=n, the final entry lacks the trailing padding\nbytes.\n\nFor the main kernel image this is not a problem as find_bug() doesn\u0027t\ndepend on the trailing padding bytes when searching for entries:\n\n\tfor (bug = __start___bug_table; bug \u003c __stop___bug_table; ++bug)\n\t\tif (bugaddr == bug_addr(bug))\n\t\t\treturn bug;\n\nHowever for modules, module_bug_finalize() depends on the trailing\nbytes when calculating the number of entries:\n\n\tmod-\u003enum_bugs = sechdrs[i].sh_size / sizeof(struct bug_entry);\n\n... and as the last bug_entry lacks the necessary padding bytes, this entry\nwill not be counted, e.g. in the case of a single entry:\n\n\tsechdrs[i].sh_size == 6\n\tsizeof(struct bug_entry) == 8;\n\n\tsechdrs[i].sh_size / sizeof(struct bug_entry) == 0;\n\nConsequently module_find_bug() will miss the last bug_entry when it does:\n\n\tfor (i = 0; i \u003c mod-\u003enum_bugs; ++i, ++bug)\n\t\tif (bugaddr == bug_addr(bug))\n\t\t\tgoto out;\n\n... which can lead to a kenrel panic due to an unhandled bug.\n\nThis can be demonstrated with the following module:\n\n\tstatic int __init buginit(void)\n\t{\n\t\tWARN(1, \"hello\\n\");\n\t\treturn 0;\n\t}\n\n\tstatic void __exit bugexit(void)\n\t{\n\t}\n\n\tmodule_init(buginit);\n\tmodule_exit(bugexit);\n\tMODULE_LICENSE(\"GPL\");\n\n... which will trigger a kernel panic when loaded:\n\n\t------------[ cut here ]------------\n\thello\n\tUnexpected kernel BRK exception at EL1\n\tInternal error: BRK handler: 00000000f2000800 [#1] PREEMPT SMP\n\tModules linked in: hello(O+)\n\tCPU: 0 PID: 50 Comm: insmod Tainted: G O 6.9.1 #8\n\tHardware name: linux,dummy-virt (DT)\n\tpstate: 60400005 (nZCv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)\n\tpc : buginit+0x18/0x1000 [hello]\n\tlr : buginit+0x18/0x1000 [hello]\n\tsp : ffff800080533ae0\n\tx29: ffff800080533ae0 x28: 0000000000000000 x27: 0000000000000000\n\tx26: ffffaba8c4e70510 x25: ffff800080533c30 x24: ffffaba8c4a28a58\n\tx23: 0000000000000000 x22: 0000000000000000 x21: ffff3947c0eab3c0\n\tx20: ffffaba8c4e3f000 x19: ffffaba846464000 x18: 0000000000000006\n\tx17: 0000000000000000 x16: ffffaba8c2492834 x15: 0720072007200720\n\tx14: 0720072007200720 x13: ffffaba8c49b27c8 x12: 0000000000000312\n\tx11: 0000000000000106 x10: ffffaba8c4a0a7c8 x9 : ffffaba8c49b27c8\n\tx8 : 00000000ffffefff x7 : ffffaba8c4a0a7c8 x6 : 80000000fffff000\n\tx5 : 0000000000000107 x4 : 0000000000000000 x3 : 0000000000000000\n\tx2 : 0000000000000000 x1 : 0000000000000000 x0 : ffff3947c0eab3c0\n\tCall trace:\n\t buginit+0x18/0x1000 [hello]\n\t do_one_initcall+0x80/0x1c8\n\t do_init_module+0x60/0x218\n\t load_module+0x1ba4/0x1d70\n\t __do_sys_init_module+0x198/0x1d0\n\t __arm64_sys_init_module+0x1c/0x28\n\t invoke_syscall+0x48/0x114\n\t el0_svc\n---truncated---",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-39488",
"url": "https://www.suse.com/security/cve/CVE-2024-39488"
},
{
"category": "external",
"summary": "SUSE Bug 1227618 for CVE-2024-39488",
"url": "https://bugzilla.suse.com/1227618"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-14T07:24:46Z",
"details": "moderate"
}
],
"title": "CVE-2024-39488"
},
{
"cve": "CVE-2024-39490",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-39490"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nipv6: sr: fix missing sk_buff release in seg6_input_core\n\nThe seg6_input() function is responsible for adding the SRH into a\npacket, delegating the operation to the seg6_input_core(). This function\nuses the skb_cow_head() to ensure that there is sufficient headroom in\nthe sk_buff for accommodating the link-layer header.\nIn the event that the skb_cow_header() function fails, the\nseg6_input_core() catches the error but it does not release the sk_buff,\nwhich will result in a memory leak.\n\nThis issue was introduced in commit af3b5158b89d (\"ipv6: sr: fix BUG due\nto headroom too small after SRH push\") and persists even after commit\n7a3f5b0de364 (\"netfilter: add netfilter hooks to SRv6 data plane\"),\nwhere the entire seg6_input() code was refactored to deal with netfilter\nhooks.\n\nThe proposed patch addresses the identified memory leak by requiring the\nseg6_input_core() function to release the sk_buff in the event that\nskb_cow_head() fails.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-39490",
"url": "https://www.suse.com/security/cve/CVE-2024-39490"
},
{
"category": "external",
"summary": "SUSE Bug 1227626 for CVE-2024-39490",
"url": "https://bugzilla.suse.com/1227626"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-14T07:24:46Z",
"details": "low"
}
],
"title": "CVE-2024-39490"
},
{
"cve": "CVE-2024-39494",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-39494"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nima: Fix use-after-free on a dentry\u0027s dname.name\n\n-\u003ed_name.name can change on rename and the earlier value can be freed;\nthere are conditions sufficient to stabilize it (-\u003ed_lock on dentry,\n-\u003ed_lock on its parent, -\u003ei_rwsem exclusive on the parent\u0027s inode,\nrename_lock), but none of those are met at any of the sites. Take a stable\nsnapshot of the name instead.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-39494",
"url": "https://www.suse.com/security/cve/CVE-2024-39494"
},
{
"category": "external",
"summary": "SUSE Bug 1227716 for CVE-2024-39494",
"url": "https://bugzilla.suse.com/1227716"
},
{
"category": "external",
"summary": "SUSE Bug 1227901 for CVE-2024-39494",
"url": "https://bugzilla.suse.com/1227901"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-14T07:24:46Z",
"details": "important"
}
],
"title": "CVE-2024-39494"
},
{
"cve": "CVE-2024-39499",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-39499"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nvmci: prevent speculation leaks by sanitizing event in event_deliver()\n\nCoverity spotted that event_msg is controlled by user-space,\nevent_msg-\u003eevent_data.event is passed to event_deliver() and used\nas an index without sanitization.\n\nThis change ensures that the event index is sanitized to mitigate any\npossibility of speculative information leaks.\n\nThis bug was discovered and resolved using Coverity Static Analysis\nSecurity Testing (SAST) by Synopsys, Inc.\n\nOnly compile tested, no access to HW.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-39499",
"url": "https://www.suse.com/security/cve/CVE-2024-39499"
},
{
"category": "external",
"summary": "SUSE Bug 1227725 for CVE-2024-39499",
"url": "https://bugzilla.suse.com/1227725"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-14T07:24:46Z",
"details": "moderate"
}
],
"title": "CVE-2024-39499"
},
{
"cve": "CVE-2024-39501",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-39501"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrivers: core: synchronize really_probe() and dev_uevent()\n\nSynchronize the dev-\u003edriver usage in really_probe() and dev_uevent().\nThese can run in different threads, what can result in the following\nrace condition for dev-\u003edriver uninitialization:\n\nThread #1:\n==========\n\nreally_probe() {\n...\nprobe_failed:\n...\ndevice_unbind_cleanup(dev) {\n ...\n dev-\u003edriver = NULL; // \u003c= Failed probe sets dev-\u003edriver to NULL\n ...\n }\n...\n}\n\nThread #2:\n==========\n\ndev_uevent() {\n...\nif (dev-\u003edriver)\n // If dev-\u003edriver is NULLed from really_probe() from here on,\n // after above check, the system crashes\n add_uevent_var(env, \"DRIVER=%s\", dev-\u003edriver-\u003ename);\n...\n}\n\nreally_probe() holds the lock, already. So nothing needs to be done\nthere. dev_uevent() is called with lock held, often, too. But not\nalways. What implies that we can\u0027t add any locking in dev_uevent()\nitself. So fix this race by adding the lock to the non-protected\npath. This is the path where above race is observed:\n\n dev_uevent+0x235/0x380\n uevent_show+0x10c/0x1f0 \u003c= Add lock here\n dev_attr_show+0x3a/0xa0\n sysfs_kf_seq_show+0x17c/0x250\n kernfs_seq_show+0x7c/0x90\n seq_read_iter+0x2d7/0x940\n kernfs_fop_read_iter+0xc6/0x310\n vfs_read+0x5bc/0x6b0\n ksys_read+0xeb/0x1b0\n __x64_sys_read+0x42/0x50\n x64_sys_call+0x27ad/0x2d30\n do_syscall_64+0xcd/0x1d0\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\n\nSimilar cases are reported by syzkaller in\n\nhttps://syzkaller.appspot.com/bug?extid=ffa8143439596313a85a\n\nBut these are regarding the *initialization* of dev-\u003edriver\n\ndev-\u003edriver = drv;\n\nAs this switches dev-\u003edriver to non-NULL these reports can be considered\nto be false-positives (which should be \"fixed\" by this commit, as well,\nthough).\n\nThe same issue was reported and tried to be fixed back in 2015 in\n\nhttps://lore.kernel.org/lkml/1421259054-2574-1-git-send-email-a.sangwan@samsung.com/\n\nalready.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-39501",
"url": "https://www.suse.com/security/cve/CVE-2024-39501"
},
{
"category": "external",
"summary": "SUSE Bug 1227754 for CVE-2024-39501",
"url": "https://bugzilla.suse.com/1227754"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-14T07:24:46Z",
"details": "moderate"
}
],
"title": "CVE-2024-39501"
},
{
"cve": "CVE-2024-39506",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-39506"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nliquidio: Adjust a NULL pointer handling path in lio_vf_rep_copy_packet\n\nIn lio_vf_rep_copy_packet() pg_info-\u003epage is compared to a NULL value,\nbut then it is unconditionally passed to skb_add_rx_frag() which looks\nstrange and could lead to null pointer dereference.\n\nlio_vf_rep_copy_packet() call trace looks like:\n\tocteon_droq_process_packets\n\t octeon_droq_fast_process_packets\n\t octeon_droq_dispatch_pkt\n\t octeon_create_recv_info\n\t ...search in the dispatch_list...\n\t -\u003edisp_fn(rdisp-\u003erinfo, ...)\n\t lio_vf_rep_pkt_recv(struct octeon_recv_info *recv_info, ...)\nIn this path there is no code which sets pg_info-\u003epage to NULL.\nSo this check looks unneeded and doesn\u0027t solve potential problem.\nBut I guess the author had reason to add a check and I have no such card\nand can\u0027t do real test.\nIn addition, the code in the function liquidio_push_packet() in\nliquidio/lio_core.c does exactly the same.\n\nBased on this, I consider the most acceptable compromise solution to\nadjust this issue by moving skb_add_rx_frag() into conditional scope.\n\nFound by Linux Verification Center (linuxtesting.org) with SVACE.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-39506",
"url": "https://www.suse.com/security/cve/CVE-2024-39506"
},
{
"category": "external",
"summary": "SUSE Bug 1227729 for CVE-2024-39506",
"url": "https://bugzilla.suse.com/1227729"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-14T07:24:46Z",
"details": "moderate"
}
],
"title": "CVE-2024-39506"
},
{
"cve": "CVE-2024-39507",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-39507"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: hns3: fix kernel crash problem in concurrent scenario\n\nWhen link status change, the nic driver need to notify the roce\ndriver to handle this event, but at this time, the roce driver\nmay uninit, then cause kernel crash.\n\nTo fix the problem, when link status change, need to check\nwhether the roce registered, and when uninit, need to wait link\nupdate finish.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-39507",
"url": "https://www.suse.com/security/cve/CVE-2024-39507"
},
{
"category": "external",
"summary": "SUSE Bug 1227730 for CVE-2024-39507",
"url": "https://bugzilla.suse.com/1227730"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-14T07:24:46Z",
"details": "moderate"
}
],
"title": "CVE-2024-39507"
},
{
"cve": "CVE-2024-39509",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-39509"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nHID: core: remove unnecessary WARN_ON() in implement()\n\nSyzkaller hit a warning [1] in a call to implement() when trying\nto write a value into a field of smaller size in an output report.\n\nSince implement() already has a warn message printed out with the\nhelp of hid_warn() and value in question gets trimmed with:\n\t...\n\tvalue \u0026= m;\n\t...\nWARN_ON may be considered superfluous. Remove it to suppress future\nsyzkaller triggers.\n\n[1]\nWARNING: CPU: 0 PID: 5084 at drivers/hid/hid-core.c:1451 implement drivers/hid/hid-core.c:1451 [inline]\nWARNING: CPU: 0 PID: 5084 at drivers/hid/hid-core.c:1451 hid_output_report+0x548/0x760 drivers/hid/hid-core.c:1863\nModules linked in:\nCPU: 0 PID: 5084 Comm: syz-executor424 Not tainted 6.9.0-rc7-syzkaller-00183-gcf87f46fd34d #0\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/02/2024\nRIP: 0010:implement drivers/hid/hid-core.c:1451 [inline]\nRIP: 0010:hid_output_report+0x548/0x760 drivers/hid/hid-core.c:1863\n...\nCall Trace:\n \u003cTASK\u003e\n __usbhid_submit_report drivers/hid/usbhid/hid-core.c:591 [inline]\n usbhid_submit_report+0x43d/0x9e0 drivers/hid/usbhid/hid-core.c:636\n hiddev_ioctl+0x138b/0x1f00 drivers/hid/usbhid/hiddev.c:726\n vfs_ioctl fs/ioctl.c:51 [inline]\n __do_sys_ioctl fs/ioctl.c:904 [inline]\n __se_sys_ioctl+0xfc/0x170 fs/ioctl.c:890\n do_syscall_x64 arch/x86/entry/common.c:52 [inline]\n do_syscall_64+0xf5/0x240 arch/x86/entry/common.c:83\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\n...",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-39509",
"url": "https://www.suse.com/security/cve/CVE-2024-39509"
},
{
"category": "external",
"summary": "SUSE Bug 1227733 for CVE-2024-39509",
"url": "https://bugzilla.suse.com/1227733"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-14T07:24:46Z",
"details": "moderate"
}
],
"title": "CVE-2024-39509"
},
{
"cve": "CVE-2024-40901",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-40901"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: mpt3sas: Avoid test/set_bit() operating in non-allocated memory\n\nThere is a potential out-of-bounds access when using test_bit() on a single\nword. The test_bit() and set_bit() functions operate on long values, and\nwhen testing or setting a single word, they can exceed the word\nboundary. KASAN detects this issue and produces a dump:\n\n\t BUG: KASAN: slab-out-of-bounds in _scsih_add_device.constprop.0 (./arch/x86/include/asm/bitops.h:60 ./include/asm-generic/bitops/instrumented-atomic.h:29 drivers/scsi/mpt3sas/mpt3sas_scsih.c:7331) mpt3sas\n\n\t Write of size 8 at addr ffff8881d26e3c60 by task kworker/u1536:2/2965\n\nFor full log, please look at [1].\n\nMake the allocation at least the size of sizeof(unsigned long) so that\nset_bit() and test_bit() have sufficient room for read/write operations\nwithout overwriting unallocated memory.\n\n[1] Link: https://lore.kernel.org/all/ZkNcALr3W3KGYYJG@gmail.com/",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-40901",
"url": "https://www.suse.com/security/cve/CVE-2024-40901"
},
{
"category": "external",
"summary": "SUSE Bug 1227762 for CVE-2024-40901",
"url": "https://bugzilla.suse.com/1227762"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-14T07:24:46Z",
"details": "moderate"
}
],
"title": "CVE-2024-40901"
},
{
"cve": "CVE-2024-40904",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-40904"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nUSB: class: cdc-wdm: Fix CPU lockup caused by excessive log messages\n\nThe syzbot fuzzer found that the interrupt-URB completion callback in\nthe cdc-wdm driver was taking too long, and the driver\u0027s immediate\nresubmission of interrupt URBs with -EPROTO status combined with the\ndummy-hcd emulation to cause a CPU lockup:\n\ncdc_wdm 1-1:1.0: nonzero urb status received: -71\ncdc_wdm 1-1:1.0: wdm_int_callback - 0 bytes\nwatchdog: BUG: soft lockup - CPU#0 stuck for 26s! [syz-executor782:6625]\nCPU#0 Utilization every 4s during lockup:\n\t#1: 98% system,\t 0% softirq,\t 3% hardirq,\t 0% idle\n\t#2: 98% system,\t 0% softirq,\t 3% hardirq,\t 0% idle\n\t#3: 98% system,\t 0% softirq,\t 3% hardirq,\t 0% idle\n\t#4: 98% system,\t 0% softirq,\t 3% hardirq,\t 0% idle\n\t#5: 98% system,\t 1% softirq,\t 3% hardirq,\t 0% idle\nModules linked in:\nirq event stamp: 73096\nhardirqs last enabled at (73095): [\u003cffff80008037bc00\u003e] console_emit_next_record kernel/printk/printk.c:2935 [inline]\nhardirqs last enabled at (73095): [\u003cffff80008037bc00\u003e] console_flush_all+0x650/0xb74 kernel/printk/printk.c:2994\nhardirqs last disabled at (73096): [\u003cffff80008af10b00\u003e] __el1_irq arch/arm64/kernel/entry-common.c:533 [inline]\nhardirqs last disabled at (73096): [\u003cffff80008af10b00\u003e] el1_interrupt+0x24/0x68 arch/arm64/kernel/entry-common.c:551\nsoftirqs last enabled at (73048): [\u003cffff8000801ea530\u003e] softirq_handle_end kernel/softirq.c:400 [inline]\nsoftirqs last enabled at (73048): [\u003cffff8000801ea530\u003e] handle_softirqs+0xa60/0xc34 kernel/softirq.c:582\nsoftirqs last disabled at (73043): [\u003cffff800080020de8\u003e] __do_softirq+0x14/0x20 kernel/softirq.c:588\nCPU: 0 PID: 6625 Comm: syz-executor782 Tainted: G W 6.10.0-rc2-syzkaller-g8867bbd4a056 #0\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/02/2024\n\nTesting showed that the problem did not occur if the two error\nmessages -- the first two lines above -- were removed; apparently adding\nmaterial to the kernel log takes a surprisingly large amount of time.\n\nIn any case, the best approach for preventing these lockups and to\navoid spamming the log with thousands of error messages per second is\nto ratelimit the two dev_err() calls. Therefore we replace them with\ndev_err_ratelimited().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-40904",
"url": "https://www.suse.com/security/cve/CVE-2024-40904"
},
{
"category": "external",
"summary": "SUSE Bug 1227772 for CVE-2024-40904",
"url": "https://bugzilla.suse.com/1227772"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-14T07:24:46Z",
"details": "moderate"
}
],
"title": "CVE-2024-40904"
},
{
"cve": "CVE-2024-40912",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-40912"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: mac80211: Fix deadlock in ieee80211_sta_ps_deliver_wakeup()\n\nThe ieee80211_sta_ps_deliver_wakeup() function takes sta-\u003eps_lock to\nsynchronizes with ieee80211_tx_h_unicast_ps_buf() which is called from\nsoftirq context. However using only spin_lock() to get sta-\u003eps_lock in\nieee80211_sta_ps_deliver_wakeup() does not prevent softirq to execute\non this same CPU, to run ieee80211_tx_h_unicast_ps_buf() and try to\ntake this same lock ending in deadlock. Below is an example of rcu stall\nthat arises in such situation.\n\n rcu: INFO: rcu_sched self-detected stall on CPU\n rcu: 2-....: (42413413 ticks this GP) idle=b154/1/0x4000000000000000 softirq=1763/1765 fqs=21206996\n rcu: (t=42586894 jiffies g=2057 q=362405 ncpus=4)\n CPU: 2 PID: 719 Comm: wpa_supplicant Tainted: G W 6.4.0-02158-g1b062f552873 #742\n Hardware name: RPT (r1) (DT)\n pstate: 00000005 (nzcv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--)\n pc : queued_spin_lock_slowpath+0x58/0x2d0\n lr : invoke_tx_handlers_early+0x5b4/0x5c0\n sp : ffff00001ef64660\n x29: ffff00001ef64660 x28: ffff000009bc1070 x27: ffff000009bc0ad8\n x26: ffff000009bc0900 x25: ffff00001ef647a8 x24: 0000000000000000\n x23: ffff000009bc0900 x22: ffff000009bc0900 x21: ffff00000ac0e000\n x20: ffff00000a279e00 x19: ffff00001ef646e8 x18: 0000000000000000\n x17: ffff800016468000 x16: ffff00001ef608c0 x15: 0010533c93f64f80\n x14: 0010395c9faa3946 x13: 0000000000000000 x12: 00000000fa83b2da\n x11: 000000012edeceea x10: ffff0000010fbe00 x9 : 0000000000895440\n x8 : 000000000010533c x7 : ffff00000ad8b740 x6 : ffff00000c350880\n x5 : 0000000000000007 x4 : 0000000000000001 x3 : 0000000000000000\n x2 : 0000000000000000 x1 : 0000000000000001 x0 : ffff00000ac0e0e8\n Call trace:\n queued_spin_lock_slowpath+0x58/0x2d0\n ieee80211_tx+0x80/0x12c\n ieee80211_tx_pending+0x110/0x278\n tasklet_action_common.constprop.0+0x10c/0x144\n tasklet_action+0x20/0x28\n _stext+0x11c/0x284\n ____do_softirq+0xc/0x14\n call_on_irq_stack+0x24/0x34\n do_softirq_own_stack+0x18/0x20\n do_softirq+0x74/0x7c\n __local_bh_enable_ip+0xa0/0xa4\n _ieee80211_wake_txqs+0x3b0/0x4b8\n __ieee80211_wake_queue+0x12c/0x168\n ieee80211_add_pending_skbs+0xec/0x138\n ieee80211_sta_ps_deliver_wakeup+0x2a4/0x480\n ieee80211_mps_sta_status_update.part.0+0xd8/0x11c\n ieee80211_mps_sta_status_update+0x18/0x24\n sta_apply_parameters+0x3bc/0x4c0\n ieee80211_change_station+0x1b8/0x2dc\n nl80211_set_station+0x444/0x49c\n genl_family_rcv_msg_doit.isra.0+0xa4/0xfc\n genl_rcv_msg+0x1b0/0x244\n netlink_rcv_skb+0x38/0x10c\n genl_rcv+0x34/0x48\n netlink_unicast+0x254/0x2bc\n netlink_sendmsg+0x190/0x3b4\n ____sys_sendmsg+0x1e8/0x218\n ___sys_sendmsg+0x68/0x8c\n __sys_sendmsg+0x44/0x84\n __arm64_sys_sendmsg+0x20/0x28\n do_el0_svc+0x6c/0xe8\n el0_svc+0x14/0x48\n el0t_64_sync_handler+0xb0/0xb4\n el0t_64_sync+0x14c/0x150\n\nUsing spin_lock_bh()/spin_unlock_bh() instead prevents softirq to raise\non the same CPU that is holding the lock.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-40912",
"url": "https://www.suse.com/security/cve/CVE-2024-40912"
},
{
"category": "external",
"summary": "SUSE Bug 1227790 for CVE-2024-40912",
"url": "https://bugzilla.suse.com/1227790"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-14T07:24:46Z",
"details": "moderate"
}
],
"title": "CVE-2024-40912"
},
{
"cve": "CVE-2024-40923",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-40923"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nvmxnet3: disable rx data ring on dma allocation failure\n\nWhen vmxnet3_rq_create() fails to allocate memory for rq-\u003edata_ring.base,\nthe subsequent call to vmxnet3_rq_destroy_all_rxdataring does not reset\nrq-\u003edata_ring.desc_size for the data ring that failed, which presumably\ncauses the hypervisor to reference it on packet reception.\n\nTo fix this bug, rq-\u003edata_ring.desc_size needs to be set to 0 to tell\nthe hypervisor to disable this feature.\n\n[ 95.436876] kernel BUG at net/core/skbuff.c:207!\n[ 95.439074] invalid opcode: 0000 [#1] PREEMPT SMP NOPTI\n[ 95.440411] CPU: 7 PID: 0 Comm: swapper/7 Not tainted 6.9.3-dirty #1\n[ 95.441558] Hardware name: VMware, Inc. VMware Virtual\nPlatform/440BX Desktop Reference Platform, BIOS 6.00 12/12/2018\n[ 95.443481] RIP: 0010:skb_panic+0x4d/0x4f\n[ 95.444404] Code: 4f 70 50 8b 87 c0 00 00 00 50 8b 87 bc 00 00 00 50\nff b7 d0 00 00 00 4c 8b 8f c8 00 00 00 48 c7 c7 68 e8 be 9f e8 63 58 f9\nff \u003c0f\u003e 0b 48 8b 14 24 48 c7 c1 d0 73 65 9f e8 a1 ff ff ff 48 8b 14 24\n[ 95.447684] RSP: 0018:ffffa13340274dd0 EFLAGS: 00010246\n[ 95.448762] RAX: 0000000000000089 RBX: ffff8fbbc72b02d0 RCX: 000000000000083f\n[ 95.450148] RDX: 0000000000000000 RSI: 00000000000000f6 RDI: 000000000000083f\n[ 95.451520] RBP: 000000000000002d R08: 0000000000000000 R09: ffffa13340274c60\n[ 95.452886] R10: ffffffffa04ed468 R11: 0000000000000002 R12: 0000000000000000\n[ 95.454293] R13: ffff8fbbdab3c2d0 R14: ffff8fbbdbd829e0 R15: ffff8fbbdbd809e0\n[ 95.455682] FS: 0000000000000000(0000) GS:ffff8fbeefd80000(0000) knlGS:0000000000000000\n[ 95.457178] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n[ 95.458340] CR2: 00007fd0d1f650c8 CR3: 0000000115f28000 CR4: 00000000000406f0\n[ 95.459791] Call Trace:\n[ 95.460515] \u003cIRQ\u003e\n[ 95.461180] ? __die_body.cold+0x19/0x27\n[ 95.462150] ? die+0x2e/0x50\n[ 95.462976] ? do_trap+0xca/0x110\n[ 95.463973] ? do_error_trap+0x6a/0x90\n[ 95.464966] ? skb_panic+0x4d/0x4f\n[ 95.465901] ? exc_invalid_op+0x50/0x70\n[ 95.466849] ? skb_panic+0x4d/0x4f\n[ 95.467718] ? asm_exc_invalid_op+0x1a/0x20\n[ 95.468758] ? skb_panic+0x4d/0x4f\n[ 95.469655] skb_put.cold+0x10/0x10\n[ 95.470573] vmxnet3_rq_rx_complete+0x862/0x11e0 [vmxnet3]\n[ 95.471853] vmxnet3_poll_rx_only+0x36/0xb0 [vmxnet3]\n[ 95.473185] __napi_poll+0x2b/0x160\n[ 95.474145] net_rx_action+0x2c6/0x3b0\n[ 95.475115] handle_softirqs+0xe7/0x2a0\n[ 95.476122] __irq_exit_rcu+0x97/0xb0\n[ 95.477109] common_interrupt+0x85/0xa0\n[ 95.478102] \u003c/IRQ\u003e\n[ 95.478846] \u003cTASK\u003e\n[ 95.479603] asm_common_interrupt+0x26/0x40\n[ 95.480657] RIP: 0010:pv_native_safe_halt+0xf/0x20\n[ 95.481801] Code: 22 d7 e9 54 87 01 00 0f 1f 40 00 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 f3 0f 1e fa eb 07 0f 00 2d 93 ba 3b 00 fb f4 \u003ce9\u003e 2c 87 01 00 66 66 2e 0f 1f 84 00 00 00 00 00 90 90 90 90 90 90\n[ 95.485563] RSP: 0018:ffffa133400ffe58 EFLAGS: 00000246\n[ 95.486882] RAX: 0000000000004000 RBX: ffff8fbbc1d14064 RCX: 0000000000000000\n[ 95.488477] RDX: ffff8fbeefd80000 RSI: ffff8fbbc1d14000 RDI: 0000000000000001\n[ 95.490067] RBP: ffff8fbbc1d14064 R08: ffffffffa0652260 R09: 00000000000010d3\n[ 95.491683] R10: 0000000000000018 R11: ffff8fbeefdb4764 R12: ffffffffa0652260\n[ 95.493389] R13: ffffffffa06522e0 R14: 0000000000000001 R15: 0000000000000000\n[ 95.495035] acpi_safe_halt+0x14/0x20\n[ 95.496127] acpi_idle_do_entry+0x2f/0x50\n[ 95.497221] acpi_idle_enter+0x7f/0xd0\n[ 95.498272] cpuidle_enter_state+0x81/0x420\n[ 95.499375] cpuidle_enter+0x2d/0x40\n[ 95.500400] do_idle+0x1e5/0x240\n[ 95.501385] cpu_startup_entry+0x29/0x30\n[ 95.502422] start_secondary+0x11c/0x140\n[ 95.503454] common_startup_64+0x13e/0x141\n[ 95.504466] \u003c/TASK\u003e\n[ 95.505197] Modules linked in: nft_fib_inet nft_fib_ipv4\nnft_fib_ipv6 nft_fib nft_reject_inet nf_reject_ipv4 nf_reject_ipv6\nnft_reject nft_ct nft_chain_nat nf_nat nf_conntrack nf_defrag_ip\n---truncated---",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-40923",
"url": "https://www.suse.com/security/cve/CVE-2024-40923"
},
{
"category": "external",
"summary": "SUSE Bug 1227786 for CVE-2024-40923",
"url": "https://bugzilla.suse.com/1227786"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-14T07:24:46Z",
"details": "moderate"
}
],
"title": "CVE-2024-40923"
},
{
"cve": "CVE-2024-40929",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-40929"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: iwlwifi: mvm: check n_ssids before accessing the ssids\n\nIn some versions of cfg80211, the ssids poinet might be a valid one even\nthough n_ssids is 0. Accessing the pointer in this case will cuase an\nout-of-bound access. Fix this by checking n_ssids first.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-40929",
"url": "https://www.suse.com/security/cve/CVE-2024-40929"
},
{
"category": "external",
"summary": "SUSE Bug 1227774 for CVE-2024-40929",
"url": "https://bugzilla.suse.com/1227774"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-14T07:24:46Z",
"details": "moderate"
}
],
"title": "CVE-2024-40929"
},
{
"cve": "CVE-2024-40932",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-40932"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/exynos/vidi: fix memory leak in .get_modes()\n\nThe duplicated EDID is never freed. Fix it.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-40932",
"url": "https://www.suse.com/security/cve/CVE-2024-40932"
},
{
"category": "external",
"summary": "SUSE Bug 1227828 for CVE-2024-40932",
"url": "https://bugzilla.suse.com/1227828"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-14T07:24:46Z",
"details": "moderate"
}
],
"title": "CVE-2024-40932"
},
{
"cve": "CVE-2024-40937",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-40937"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ngve: Clear napi-\u003eskb before dev_kfree_skb_any()\n\ngve_rx_free_skb incorrectly leaves napi-\u003eskb referencing an skb after it\nis freed with dev_kfree_skb_any(). This can result in a subsequent call\nto napi_get_frags returning a dangling pointer.\n\nFix this by clearing napi-\u003eskb before the skb is freed.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-40937",
"url": "https://www.suse.com/security/cve/CVE-2024-40937"
},
{
"category": "external",
"summary": "SUSE Bug 1227836 for CVE-2024-40937",
"url": "https://bugzilla.suse.com/1227836"
},
{
"category": "external",
"summary": "SUSE Bug 1227903 for CVE-2024-40937",
"url": "https://bugzilla.suse.com/1227903"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-14T07:24:46Z",
"details": "important"
}
],
"title": "CVE-2024-40937"
},
{
"cve": "CVE-2024-40941",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-40941"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: iwlwifi: mvm: don\u0027t read past the mfuart notifcation\n\nIn case the firmware sends a notification that claims it has more data\nthan it has, we will read past that was allocated for the notification.\nRemove the print of the buffer, we won\u0027t see it by default. If needed,\nwe can see the content with tracing.\n\nThis was reported by KFENCE.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-40941",
"url": "https://www.suse.com/security/cve/CVE-2024-40941"
},
{
"category": "external",
"summary": "SUSE Bug 1227771 for CVE-2024-40941",
"url": "https://bugzilla.suse.com/1227771"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-14T07:24:46Z",
"details": "moderate"
}
],
"title": "CVE-2024-40941"
},
{
"cve": "CVE-2024-40942",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-40942"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: mac80211: mesh: Fix leak of mesh_preq_queue objects\n\nThe hwmp code use objects of type mesh_preq_queue, added to a list in\nieee80211_if_mesh, to keep track of mpath we need to resolve. If the mpath\ngets deleted, ex mesh interface is removed, the entries in that list will\nnever get cleaned. Fix this by flushing all corresponding items of the\npreq_queue in mesh_path_flush_pending().\n\nThis should take care of KASAN reports like this:\n\nunreferenced object 0xffff00000668d800 (size 128):\n comm \"kworker/u8:4\", pid 67, jiffies 4295419552 (age 1836.444s)\n hex dump (first 32 bytes):\n 00 1f 05 09 00 00 ff ff 00 d5 68 06 00 00 ff ff ..........h.....\n 8e 97 ea eb 3e b8 01 00 00 00 00 00 00 00 00 00 ....\u003e...........\n backtrace:\n [\u003c000000007302a0b6\u003e] __kmem_cache_alloc_node+0x1e0/0x35c\n [\u003c00000000049bd418\u003e] kmalloc_trace+0x34/0x80\n [\u003c0000000000d792bb\u003e] mesh_queue_preq+0x44/0x2a8\n [\u003c00000000c99c3696\u003e] mesh_nexthop_resolve+0x198/0x19c\n [\u003c00000000926bf598\u003e] ieee80211_xmit+0x1d0/0x1f4\n [\u003c00000000fc8c2284\u003e] __ieee80211_subif_start_xmit+0x30c/0x764\n [\u003c000000005926ee38\u003e] ieee80211_subif_start_xmit+0x9c/0x7a4\n [\u003c000000004c86e916\u003e] dev_hard_start_xmit+0x174/0x440\n [\u003c0000000023495647\u003e] __dev_queue_xmit+0xe24/0x111c\n [\u003c00000000cfe9ca78\u003e] batadv_send_skb_packet+0x180/0x1e4\n [\u003c000000007bacc5d5\u003e] batadv_v_elp_periodic_work+0x2f4/0x508\n [\u003c00000000adc3cd94\u003e] process_one_work+0x4b8/0xa1c\n [\u003c00000000b36425d1\u003e] worker_thread+0x9c/0x634\n [\u003c0000000005852dd5\u003e] kthread+0x1bc/0x1c4\n [\u003c000000005fccd770\u003e] ret_from_fork+0x10/0x20\nunreferenced object 0xffff000009051f00 (size 128):\n comm \"kworker/u8:4\", pid 67, jiffies 4295419553 (age 1836.440s)\n hex dump (first 32 bytes):\n 90 d6 92 0d 00 00 ff ff 00 d8 68 06 00 00 ff ff ..........h.....\n 36 27 92 e4 02 e0 01 00 00 58 79 06 00 00 ff ff 6\u0027.......Xy.....\n backtrace:\n [\u003c000000007302a0b6\u003e] __kmem_cache_alloc_node+0x1e0/0x35c\n [\u003c00000000049bd418\u003e] kmalloc_trace+0x34/0x80\n [\u003c0000000000d792bb\u003e] mesh_queue_preq+0x44/0x2a8\n [\u003c00000000c99c3696\u003e] mesh_nexthop_resolve+0x198/0x19c\n [\u003c00000000926bf598\u003e] ieee80211_xmit+0x1d0/0x1f4\n [\u003c00000000fc8c2284\u003e] __ieee80211_subif_start_xmit+0x30c/0x764\n [\u003c000000005926ee38\u003e] ieee80211_subif_start_xmit+0x9c/0x7a4\n [\u003c000000004c86e916\u003e] dev_hard_start_xmit+0x174/0x440\n [\u003c0000000023495647\u003e] __dev_queue_xmit+0xe24/0x111c\n [\u003c00000000cfe9ca78\u003e] batadv_send_skb_packet+0x180/0x1e4\n [\u003c000000007bacc5d5\u003e] batadv_v_elp_periodic_work+0x2f4/0x508\n [\u003c00000000adc3cd94\u003e] process_one_work+0x4b8/0xa1c\n [\u003c00000000b36425d1\u003e] worker_thread+0x9c/0x634\n [\u003c0000000005852dd5\u003e] kthread+0x1bc/0x1c4\n [\u003c000000005fccd770\u003e] ret_from_fork+0x10/0x20",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-40942",
"url": "https://www.suse.com/security/cve/CVE-2024-40942"
},
{
"category": "external",
"summary": "SUSE Bug 1227770 for CVE-2024-40942",
"url": "https://bugzilla.suse.com/1227770"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-14T07:24:46Z",
"details": "moderate"
}
],
"title": "CVE-2024-40942"
},
{
"cve": "CVE-2024-40943",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-40943"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nocfs2: fix races between hole punching and AIO+DIO\n\nAfter commit \"ocfs2: return real error code in ocfs2_dio_wr_get_block\",\nfstests/generic/300 become from always failed to sometimes failed:\n\n========================================================================\n[ 473.293420 ] run fstests generic/300\n\n[ 475.296983 ] JBD2: Ignoring recovery information on journal\n[ 475.302473 ] ocfs2: Mounting device (253,1) on (node local, slot 0) with ordered data mode.\n[ 494.290998 ] OCFS2: ERROR (device dm-1): ocfs2_change_extent_flag: Owner 5668 has an extent at cpos 78723 which can no longer be found\n[ 494.291609 ] On-disk corruption discovered. Please run fsck.ocfs2 once the filesystem is unmounted.\n[ 494.292018 ] OCFS2: File system is now read-only.\n[ 494.292224 ] (kworker/19:11,2628,19):ocfs2_mark_extent_written:5272 ERROR: status = -30\n[ 494.292602 ] (kworker/19:11,2628,19):ocfs2_dio_end_io_write:2374 ERROR: status = -3\nfio: io_u error on file /mnt/scratch/racer: Read-only file system: write offset=460849152, buflen=131072\n=========================================================================\n\nIn __blockdev_direct_IO, ocfs2_dio_wr_get_block is called to add unwritten\nextents to a list. extents are also inserted into extent tree in\nocfs2_write_begin_nolock. Then another thread call fallocate to puch a\nhole at one of the unwritten extent. The extent at cpos was removed by\nocfs2_remove_extent(). At end io worker thread, ocfs2_search_extent_list\nfound there is no such extent at the cpos.\n\n T1 T2 T3\n inode lock\n ...\n insert extents\n ...\n inode unlock\nocfs2_fallocate\n __ocfs2_change_file_space\n inode lock\n lock ip_alloc_sem\n ocfs2_remove_inode_range inode\n ocfs2_remove_btree_range\n ocfs2_remove_extent\n ^---remove the extent at cpos 78723\n ...\n unlock ip_alloc_sem\n inode unlock\n ocfs2_dio_end_io\n ocfs2_dio_end_io_write\n lock ip_alloc_sem\n ocfs2_mark_extent_written\n ocfs2_change_extent_flag\n ocfs2_search_extent_list\n ^---failed to find extent\n ...\n unlock ip_alloc_sem\n\nIn most filesystems, fallocate is not compatible with racing with AIO+DIO,\nso fix it by adding to wait for all dio before fallocate/punch_hole like\next4.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-40943",
"url": "https://www.suse.com/security/cve/CVE-2024-40943"
},
{
"category": "external",
"summary": "SUSE Bug 1227849 for CVE-2024-40943",
"url": "https://bugzilla.suse.com/1227849"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-14T07:24:46Z",
"details": "moderate"
}
],
"title": "CVE-2024-40943"
},
{
"cve": "CVE-2024-40953",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-40953"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nKVM: Fix a data race on last_boosted_vcpu in kvm_vcpu_on_spin()\n\nUse {READ,WRITE}_ONCE() to access kvm-\u003elast_boosted_vcpu to ensure the\nloads and stores are atomic. In the extremely unlikely scenario the\ncompiler tears the stores, it\u0027s theoretically possible for KVM to attempt\nto get a vCPU using an out-of-bounds index, e.g. if the write is split\ninto multiple 8-bit stores, and is paired with a 32-bit load on a VM with\n257 vCPUs:\n\n CPU0 CPU1\n last_boosted_vcpu = 0xff;\n\n (last_boosted_vcpu = 0x100)\n last_boosted_vcpu[15:8] = 0x01;\n i = (last_boosted_vcpu = 0x1ff)\n last_boosted_vcpu[7:0] = 0x00;\n\n vcpu = kvm-\u003evcpu_array[0x1ff];\n\nAs detected by KCSAN:\n\n BUG: KCSAN: data-race in kvm_vcpu_on_spin [kvm] / kvm_vcpu_on_spin [kvm]\n\n write to 0xffffc90025a92344 of 4 bytes by task 4340 on cpu 16:\n kvm_vcpu_on_spin (arch/x86/kvm/../../../virt/kvm/kvm_main.c:4112) kvm\n handle_pause (arch/x86/kvm/vmx/vmx.c:5929) kvm_intel\n vmx_handle_exit (arch/x86/kvm/vmx/vmx.c:?\n\t\t arch/x86/kvm/vmx/vmx.c:6606) kvm_intel\n vcpu_run (arch/x86/kvm/x86.c:11107 arch/x86/kvm/x86.c:11211) kvm\n kvm_arch_vcpu_ioctl_run (arch/x86/kvm/x86.c:?) kvm\n kvm_vcpu_ioctl (arch/x86/kvm/../../../virt/kvm/kvm_main.c:?) kvm\n __se_sys_ioctl (fs/ioctl.c:52 fs/ioctl.c:904 fs/ioctl.c:890)\n __x64_sys_ioctl (fs/ioctl.c:890)\n x64_sys_call (arch/x86/entry/syscall_64.c:33)\n do_syscall_64 (arch/x86/entry/common.c:?)\n entry_SYSCALL_64_after_hwframe (arch/x86/entry/entry_64.S:130)\n\n read to 0xffffc90025a92344 of 4 bytes by task 4342 on cpu 4:\n kvm_vcpu_on_spin (arch/x86/kvm/../../../virt/kvm/kvm_main.c:4069) kvm\n handle_pause (arch/x86/kvm/vmx/vmx.c:5929) kvm_intel\n vmx_handle_exit (arch/x86/kvm/vmx/vmx.c:?\n\t\t\tarch/x86/kvm/vmx/vmx.c:6606) kvm_intel\n vcpu_run (arch/x86/kvm/x86.c:11107 arch/x86/kvm/x86.c:11211) kvm\n kvm_arch_vcpu_ioctl_run (arch/x86/kvm/x86.c:?) kvm\n kvm_vcpu_ioctl (arch/x86/kvm/../../../virt/kvm/kvm_main.c:?) kvm\n __se_sys_ioctl (fs/ioctl.c:52 fs/ioctl.c:904 fs/ioctl.c:890)\n __x64_sys_ioctl (fs/ioctl.c:890)\n x64_sys_call (arch/x86/entry/syscall_64.c:33)\n do_syscall_64 (arch/x86/entry/common.c:?)\n entry_SYSCALL_64_after_hwframe (arch/x86/entry/entry_64.S:130)\n\n value changed: 0x00000012 -\u003e 0x00000000",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-40953",
"url": "https://www.suse.com/security/cve/CVE-2024-40953"
},
{
"category": "external",
"summary": "SUSE Bug 1227806 for CVE-2024-40953",
"url": "https://bugzilla.suse.com/1227806"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-14T07:24:46Z",
"details": "moderate"
}
],
"title": "CVE-2024-40953"
},
{
"cve": "CVE-2024-40959",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-40959"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nxfrm6: check ip6_dst_idev() return value in xfrm6_get_saddr()\n\nip6_dst_idev() can return NULL, xfrm6_get_saddr() must act accordingly.\n\nsyzbot reported:\n\nOops: general protection fault, probably for non-canonical address 0xdffffc0000000000: 0000 [#1] PREEMPT SMP KASAN PTI\nKASAN: null-ptr-deref in range [0x0000000000000000-0x0000000000000007]\nCPU: 1 PID: 12 Comm: kworker/u8:1 Not tainted 6.10.0-rc2-syzkaller-00383-gb8481381d4e2 #0\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/02/2024\nWorkqueue: wg-kex-wg1 wg_packet_handshake_send_worker\n RIP: 0010:xfrm6_get_saddr+0x93/0x130 net/ipv6/xfrm6_policy.c:64\nCode: df 48 89 fa 48 c1 ea 03 80 3c 02 00 0f 85 97 00 00 00 4c 8b ab d8 00 00 00 48 b8 00 00 00 00 00 fc ff df 4c 89 ea 48 c1 ea 03 \u003c80\u003e 3c 02 00 0f 85 86 00 00 00 4d 8b 6d 00 e8 ca 13 47 01 48 b8 00\nRSP: 0018:ffffc90000117378 EFLAGS: 00010246\nRAX: dffffc0000000000 RBX: ffff88807b079dc0 RCX: ffffffff89a0d6d7\nRDX: 0000000000000000 RSI: ffffffff89a0d6e9 RDI: ffff88807b079e98\nRBP: ffff88807ad73248 R08: 0000000000000007 R09: fffffffffffff000\nR10: ffff88807b079dc0 R11: 0000000000000007 R12: ffffc90000117480\nR13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000\nFS: 0000000000000000(0000) GS:ffff8880b9300000(0000) knlGS:0000000000000000\nCS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 00007f4586d00440 CR3: 0000000079042000 CR4: 00000000003506f0\nDR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\nDR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\nCall Trace:\n \u003cTASK\u003e\n xfrm_get_saddr net/xfrm/xfrm_policy.c:2452 [inline]\n xfrm_tmpl_resolve_one net/xfrm/xfrm_policy.c:2481 [inline]\n xfrm_tmpl_resolve+0xa26/0xf10 net/xfrm/xfrm_policy.c:2541\n xfrm_resolve_and_create_bundle+0x140/0x2570 net/xfrm/xfrm_policy.c:2835\n xfrm_bundle_lookup net/xfrm/xfrm_policy.c:3070 [inline]\n xfrm_lookup_with_ifid+0x4d1/0x1e60 net/xfrm/xfrm_policy.c:3201\n xfrm_lookup net/xfrm/xfrm_policy.c:3298 [inline]\n xfrm_lookup_route+0x3b/0x200 net/xfrm/xfrm_policy.c:3309\n ip6_dst_lookup_flow+0x15c/0x1d0 net/ipv6/ip6_output.c:1256\n send6+0x611/0xd20 drivers/net/wireguard/socket.c:139\n wg_socket_send_skb_to_peer+0xf9/0x220 drivers/net/wireguard/socket.c:178\n wg_socket_send_buffer_to_peer+0x12b/0x190 drivers/net/wireguard/socket.c:200\n wg_packet_send_handshake_initiation+0x227/0x360 drivers/net/wireguard/send.c:40\n wg_packet_handshake_send_worker+0x1c/0x30 drivers/net/wireguard/send.c:51\n process_one_work+0x9fb/0x1b60 kernel/workqueue.c:3231\n process_scheduled_works kernel/workqueue.c:3312 [inline]\n worker_thread+0x6c8/0xf70 kernel/workqueue.c:3393\n kthread+0x2c1/0x3a0 kernel/kthread.c:389\n ret_from_fork+0x45/0x80 arch/x86/kernel/process.c:147\n ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-40959",
"url": "https://www.suse.com/security/cve/CVE-2024-40959"
},
{
"category": "external",
"summary": "SUSE Bug 1227884 for CVE-2024-40959",
"url": "https://bugzilla.suse.com/1227884"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-14T07:24:46Z",
"details": "moderate"
}
],
"title": "CVE-2024-40959"
},
{
"cve": "CVE-2024-40966",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-40966"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntty: add the option to have a tty reject a new ldisc\n\n... and use it to limit the virtual terminals to just N_TTY. They are\nkind of special, and in particular, the \"con_write()\" routine violates\nthe \"writes cannot sleep\" rule that some ldiscs rely on.\n\nThis avoids the\n\n BUG: sleeping function called from invalid context at kernel/printk/printk.c:2659\n\nwhen N_GSM has been attached to a virtual console, and gsmld_write()\ncalls con_write() while holding a spinlock, and con_write() then tries\nto get the console lock.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-40966",
"url": "https://www.suse.com/security/cve/CVE-2024-40966"
},
{
"category": "external",
"summary": "SUSE Bug 1227886 for CVE-2024-40966",
"url": "https://bugzilla.suse.com/1227886"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-14T07:24:46Z",
"details": "moderate"
}
],
"title": "CVE-2024-40966"
},
{
"cve": "CVE-2024-40967",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-40967"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nserial: imx: Introduce timeout when waiting on transmitter empty\n\nBy waiting at most 1 second for USR2_TXDC to be set, we avoid a potential\ndeadlock.\n\nIn case of the timeout, there is not much we can do, so we simply ignore\nthe transmitter state and optimistically try to continue.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-40967",
"url": "https://www.suse.com/security/cve/CVE-2024-40967"
},
{
"category": "external",
"summary": "SUSE Bug 1227891 for CVE-2024-40967",
"url": "https://bugzilla.suse.com/1227891"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-14T07:24:46Z",
"details": "moderate"
}
],
"title": "CVE-2024-40967"
},
{
"cve": "CVE-2024-40978",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-40978"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: qedi: Fix crash while reading debugfs attribute\n\nThe qedi_dbg_do_not_recover_cmd_read() function invokes sprintf() directly\non a __user pointer, which results into the crash.\n\nTo fix this issue, use a small local stack buffer for sprintf() and then\ncall simple_read_from_buffer(), which in turns make the copy_to_user()\ncall.\n\nBUG: unable to handle page fault for address: 00007f4801111000\nPGD 8000000864df6067 P4D 8000000864df6067 PUD 864df7067 PMD 846028067 PTE 0\nOops: 0002 [#1] PREEMPT SMP PTI\nHardware name: HPE ProLiant DL380 Gen10/ProLiant DL380 Gen10, BIOS U30 06/15/2023\nRIP: 0010:memcpy_orig+0xcd/0x130\nRSP: 0018:ffffb7a18c3ffc40 EFLAGS: 00010202\nRAX: 00007f4801111000 RBX: 00007f4801111000 RCX: 000000000000000f\nRDX: 000000000000000f RSI: ffffffffc0bfd7a0 RDI: 00007f4801111000\nRBP: ffffffffc0bfd7a0 R08: 725f746f6e5f6f64 R09: 3d7265766f636572\nR10: ffffb7a18c3ffd08 R11: 0000000000000000 R12: 00007f4881110fff\nR13: 000000007fffffff R14: ffffb7a18c3ffca0 R15: ffffffffc0bfd7af\nFS: 00007f480118a740(0000) GS:ffff98e38af00000(0000) knlGS:0000000000000000\nCS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 00007f4801111000 CR3: 0000000864b8e001 CR4: 00000000007706e0\nDR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\nDR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\nPKRU: 55555554\nCall Trace:\n \u003cTASK\u003e\n ? __die_body+0x1a/0x60\n ? page_fault_oops+0x183/0x510\n ? exc_page_fault+0x69/0x150\n ? asm_exc_page_fault+0x22/0x30\n ? memcpy_orig+0xcd/0x130\n vsnprintf+0x102/0x4c0\n sprintf+0x51/0x80\n qedi_dbg_do_not_recover_cmd_read+0x2f/0x50 [qedi 6bcfdeeecdea037da47069eca2ba717c84a77324]\n full_proxy_read+0x50/0x80\n vfs_read+0xa5/0x2e0\n ? folio_add_new_anon_rmap+0x44/0xa0\n ? set_pte_at+0x15/0x30\n ? do_pte_missing+0x426/0x7f0\n ksys_read+0xa5/0xe0\n do_syscall_64+0x58/0x80\n ? __count_memcg_events+0x46/0x90\n ? count_memcg_event_mm+0x3d/0x60\n ? handle_mm_fault+0x196/0x2f0\n ? do_user_addr_fault+0x267/0x890\n ? exc_page_fault+0x69/0x150\n entry_SYSCALL_64_after_hwframe+0x72/0xdc\nRIP: 0033:0x7f4800f20b4d",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-40978",
"url": "https://www.suse.com/security/cve/CVE-2024-40978"
},
{
"category": "external",
"summary": "SUSE Bug 1227929 for CVE-2024-40978",
"url": "https://bugzilla.suse.com/1227929"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-14T07:24:46Z",
"details": "moderate"
}
],
"title": "CVE-2024-40978"
},
{
"cve": "CVE-2024-40982",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-40982"
}
],
"notes": [
{
"category": "general",
"text": "** REJECT ** This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-40982",
"url": "https://www.suse.com/security/cve/CVE-2024-40982"
},
{
"category": "external",
"summary": "SUSE Bug 1227865 for CVE-2024-40982",
"url": "https://bugzilla.suse.com/1227865"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-14T07:24:46Z",
"details": "moderate"
}
],
"title": "CVE-2024-40982"
},
{
"cve": "CVE-2024-40987",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-40987"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amdgpu: fix UBSAN warning in kv_dpm.c\n\nAdds bounds check for sumo_vid_mapping_entry.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-40987",
"url": "https://www.suse.com/security/cve/CVE-2024-40987"
},
{
"category": "external",
"summary": "SUSE Bug 1228235 for CVE-2024-40987",
"url": "https://bugzilla.suse.com/1228235"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-14T07:24:46Z",
"details": "moderate"
}
],
"title": "CVE-2024-40987"
},
{
"cve": "CVE-2024-40988",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-40988"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/radeon: fix UBSAN warning in kv_dpm.c\n\nAdds bounds check for sumo_vid_mapping_entry.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-40988",
"url": "https://www.suse.com/security/cve/CVE-2024-40988"
},
{
"category": "external",
"summary": "SUSE Bug 1227957 for CVE-2024-40988",
"url": "https://bugzilla.suse.com/1227957"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-14T07:24:46Z",
"details": "moderate"
}
],
"title": "CVE-2024-40988"
},
{
"cve": "CVE-2024-40990",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-40990"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nRDMA/mlx5: Add check for srq max_sge attribute\n\nmax_sge attribute is passed by the user, and is inserted and used\nunchecked, so verify that the value doesn\u0027t exceed maximum allowed value\nbefore using it.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-40990",
"url": "https://www.suse.com/security/cve/CVE-2024-40990"
},
{
"category": "external",
"summary": "SUSE Bug 1227824 for CVE-2024-40990",
"url": "https://bugzilla.suse.com/1227824"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-14T07:24:46Z",
"details": "moderate"
}
],
"title": "CVE-2024-40990"
},
{
"cve": "CVE-2024-40995",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-40995"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/sched: act_api: fix possible infinite loop in tcf_idr_check_alloc()\n\nsyzbot found hanging tasks waiting on rtnl_lock [1]\n\nA reproducer is available in the syzbot bug.\n\nWhen a request to add multiple actions with the same index is sent, the\nsecond request will block forever on the first request. This holds\nrtnl_lock, and causes tasks to hang.\n\nReturn -EAGAIN to prevent infinite looping, while keeping documented\nbehavior.\n\n[1]\n\nINFO: task kworker/1:0:5088 blocked for more than 143 seconds.\nNot tainted 6.9.0-rc4-syzkaller-00173-g3cdb45594619 #0\n\"echo 0 \u003e /proc/sys/kernel/hung_task_timeout_secs\" disables this message.\ntask:kworker/1:0 state:D stack:23744 pid:5088 tgid:5088 ppid:2 flags:0x00004000\nWorkqueue: events_power_efficient reg_check_chans_work\nCall Trace:\n\u003cTASK\u003e\ncontext_switch kernel/sched/core.c:5409 [inline]\n__schedule+0xf15/0x5d00 kernel/sched/core.c:6746\n__schedule_loop kernel/sched/core.c:6823 [inline]\nschedule+0xe7/0x350 kernel/sched/core.c:6838\nschedule_preempt_disabled+0x13/0x30 kernel/sched/core.c:6895\n__mutex_lock_common kernel/locking/mutex.c:684 [inline]\n__mutex_lock+0x5b8/0x9c0 kernel/locking/mutex.c:752\nwiphy_lock include/net/cfg80211.h:5953 [inline]\nreg_leave_invalid_chans net/wireless/reg.c:2466 [inline]\nreg_check_chans_work+0x10a/0x10e0 net/wireless/reg.c:2481",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-40995",
"url": "https://www.suse.com/security/cve/CVE-2024-40995"
},
{
"category": "external",
"summary": "SUSE Bug 1227830 for CVE-2024-40995",
"url": "https://bugzilla.suse.com/1227830"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-14T07:24:46Z",
"details": "moderate"
}
],
"title": "CVE-2024-40995"
},
{
"cve": "CVE-2024-40998",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-40998"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\next4: fix uninitialized ratelimit_state-\u003elock access in __ext4_fill_super()\n\nIn the following concurrency we will access the uninitialized rs-\u003elock:\n\next4_fill_super\n ext4_register_sysfs\n // sysfs registered msg_ratelimit_interval_ms\n // Other processes modify rs-\u003einterval to\n // non-zero via msg_ratelimit_interval_ms\n ext4_orphan_cleanup\n ext4_msg(sb, KERN_INFO, \"Errors on filesystem, \"\n __ext4_msg\n ___ratelimit(\u0026(EXT4_SB(sb)-\u003es_msg_ratelimit_state)\n if (!rs-\u003einterval) // do nothing if interval is 0\n return 1;\n raw_spin_trylock_irqsave(\u0026rs-\u003elock, flags)\n raw_spin_trylock(lock)\n _raw_spin_trylock\n __raw_spin_trylock\n spin_acquire(\u0026lock-\u003edep_map, 0, 1, _RET_IP_)\n lock_acquire\n __lock_acquire\n register_lock_class\n assign_lock_key\n dump_stack();\n ratelimit_state_init(\u0026sbi-\u003es_msg_ratelimit_state, 5 * HZ, 10);\n raw_spin_lock_init(\u0026rs-\u003elock);\n // init rs-\u003elock here\n\nand get the following dump_stack:\n\n=========================================================\nINFO: trying to register non-static key.\nThe code is fine but needs lockdep annotation, or maybe\nyou didn\u0027t initialize this object before use?\nturning off the locking correctness validator.\nCPU: 12 PID: 753 Comm: mount Tainted: G E 6.7.0-rc6-next-20231222 #504\n[...]\nCall Trace:\n dump_stack_lvl+0xc5/0x170\n dump_stack+0x18/0x30\n register_lock_class+0x740/0x7c0\n __lock_acquire+0x69/0x13a0\n lock_acquire+0x120/0x450\n _raw_spin_trylock+0x98/0xd0\n ___ratelimit+0xf6/0x220\n __ext4_msg+0x7f/0x160 [ext4]\n ext4_orphan_cleanup+0x665/0x740 [ext4]\n __ext4_fill_super+0x21ea/0x2b10 [ext4]\n ext4_fill_super+0x14d/0x360 [ext4]\n[...]\n=========================================================\n\nNormally interval is 0 until s_msg_ratelimit_state is initialized, so\n___ratelimit() does nothing. But registering sysfs precedes initializing\nrs-\u003elock, so it is possible to change rs-\u003einterval to a non-zero value\nvia the msg_ratelimit_interval_ms interface of sysfs while rs-\u003elock is\nuninitialized, and then a call to ext4_msg triggers the problem by\naccessing an uninitialized rs-\u003elock. Therefore register sysfs after all\ninitializations are complete to avoid such problems.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-40998",
"url": "https://www.suse.com/security/cve/CVE-2024-40998"
},
{
"category": "external",
"summary": "SUSE Bug 1227866 for CVE-2024-40998",
"url": "https://bugzilla.suse.com/1227866"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-14T07:24:46Z",
"details": "moderate"
}
],
"title": "CVE-2024-40998"
},
{
"cve": "CVE-2024-40999",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-40999"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: ena: Add validation for completion descriptors consistency\n\nValidate that `first` flag is set only for the first\ndescriptor in multi-buffer packets.\nIn case of an invalid descriptor, a reset will occur.\nA new reset reason for RX data corruption has been added.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-40999",
"url": "https://www.suse.com/security/cve/CVE-2024-40999"
},
{
"category": "external",
"summary": "SUSE Bug 1227913 for CVE-2024-40999",
"url": "https://bugzilla.suse.com/1227913"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.6,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-14T07:24:46Z",
"details": "low"
}
],
"title": "CVE-2024-40999"
},
{
"cve": "CVE-2024-41014",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-41014"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nxfs: add bounds checking to xlog_recover_process_data\n\nThere is a lack of verification of the space occupied by fixed members\nof xlog_op_header in the xlog_recover_process_data.\n\nWe can create a crafted image to trigger an out of bounds read by\nfollowing these steps:\n 1) Mount an image of xfs, and do some file operations to leave records\n 2) Before umounting, copy the image for subsequent steps to simulate\n abnormal exit. Because umount will ensure that tail_blk and\n head_blk are the same, which will result in the inability to enter\n xlog_recover_process_data\n 3) Write a tool to parse and modify the copied image in step 2\n 4) Make the end of the xlog_op_header entries only 1 byte away from\n xlog_rec_header-\u003eh_size\n 5) xlog_rec_header-\u003eh_num_logops++\n 6) Modify xlog_rec_header-\u003eh_crc\n\nFix:\nAdd a check to make sure there is sufficient space to access fixed members\nof xlog_op_header.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-41014",
"url": "https://www.suse.com/security/cve/CVE-2024-41014"
},
{
"category": "external",
"summary": "SUSE Bug 1228408 for CVE-2024-41014",
"url": "https://bugzilla.suse.com/1228408"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-14T07:24:46Z",
"details": "moderate"
}
],
"title": "CVE-2024-41014"
},
{
"cve": "CVE-2024-41015",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-41015"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nocfs2: add bounds checking to ocfs2_check_dir_entry()\n\nThis adds sanity checks for ocfs2_dir_entry to make sure all members of\nocfs2_dir_entry don\u0027t stray beyond valid memory region.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-41015",
"url": "https://www.suse.com/security/cve/CVE-2024-41015"
},
{
"category": "external",
"summary": "SUSE Bug 1228409 for CVE-2024-41015",
"url": "https://bugzilla.suse.com/1228409"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-14T07:24:46Z",
"details": "low"
}
],
"title": "CVE-2024-41015"
},
{
"cve": "CVE-2024-41016",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-41016"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nocfs2: strict bound check before memcmp in ocfs2_xattr_find_entry()\n\nxattr in ocfs2 maybe \u0027non-indexed\u0027, which saved with additional space\nrequested. It\u0027s better to check if the memory is out of bound before\nmemcmp, although this possibility mainly comes from crafted poisonous\nimages.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-41016",
"url": "https://www.suse.com/security/cve/CVE-2024-41016"
},
{
"category": "external",
"summary": "SUSE Bug 1228410 for CVE-2024-41016",
"url": "https://bugzilla.suse.com/1228410"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-14T07:24:46Z",
"details": "moderate"
}
],
"title": "CVE-2024-41016"
},
{
"cve": "CVE-2024-41044",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-41044"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nppp: reject claimed-as-LCP but actually malformed packets\n\nSince \u0027ppp_async_encode()\u0027 assumes valid LCP packets (with code\nfrom 1 to 7 inclusive), add \u0027ppp_check_packet()\u0027 to ensure that\nLCP packet has an actual body beyond PPP_LCP header bytes, and\nreject claimed-as-LCP but actually malformed data otherwise.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-41044",
"url": "https://www.suse.com/security/cve/CVE-2024-41044"
},
{
"category": "external",
"summary": "SUSE Bug 1228530 for CVE-2024-41044",
"url": "https://bugzilla.suse.com/1228530"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-14T07:24:46Z",
"details": "moderate"
}
],
"title": "CVE-2024-41044"
},
{
"cve": "CVE-2024-41048",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-41048"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nskmsg: Skip zero length skb in sk_msg_recvmsg\n\nWhen running BPF selftests (./test_progs -t sockmap_basic) on a Loongarch\nplatform, the following kernel panic occurs:\n\n [...]\n Oops[#1]:\n CPU: 22 PID: 2824 Comm: test_progs Tainted: G OE 6.10.0-rc2+ #18\n Hardware name: LOONGSON Dabieshan/Loongson-TC542F0, BIOS Loongson-UDK2018\n ... ...\n ra: 90000000048bf6c0 sk_msg_recvmsg+0x120/0x560\n ERA: 9000000004162774 copy_page_to_iter+0x74/0x1c0\n CRMD: 000000b0 (PLV0 -IE -DA +PG DACF=CC DACM=CC -WE)\n PRMD: 0000000c (PPLV0 +PIE +PWE)\n EUEN: 00000007 (+FPE +SXE +ASXE -BTE)\n ECFG: 00071c1d (LIE=0,2-4,10-12 VS=7)\n ESTAT: 00010000 [PIL] (IS= ECode=1 EsubCode=0)\n BADV: 0000000000000040\n PRID: 0014c011 (Loongson-64bit, Loongson-3C5000)\n Modules linked in: bpf_testmod(OE) xt_CHECKSUM xt_MASQUERADE xt_conntrack\n Process test_progs (pid: 2824, threadinfo=0000000000863a31, task=...)\n Stack : ...\n Call Trace:\n [\u003c9000000004162774\u003e] copy_page_to_iter+0x74/0x1c0\n [\u003c90000000048bf6c0\u003e] sk_msg_recvmsg+0x120/0x560\n [\u003c90000000049f2b90\u003e] tcp_bpf_recvmsg_parser+0x170/0x4e0\n [\u003c90000000049aae34\u003e] inet_recvmsg+0x54/0x100\n [\u003c900000000481ad5c\u003e] sock_recvmsg+0x7c/0xe0\n [\u003c900000000481e1a8\u003e] __sys_recvfrom+0x108/0x1c0\n [\u003c900000000481e27c\u003e] sys_recvfrom+0x1c/0x40\n [\u003c9000000004c076ec\u003e] do_syscall+0x8c/0xc0\n [\u003c9000000003731da4\u003e] handle_syscall+0xc4/0x160\n Code: ...\n ---[ end trace 0000000000000000 ]---\n Kernel panic - not syncing: Fatal exception\n Kernel relocated by 0x3510000\n .text @ 0x9000000003710000\n .data @ 0x9000000004d70000\n .bss @ 0x9000000006469400\n ---[ end Kernel panic - not syncing: Fatal exception ]---\n [...]\n\nThis crash happens every time when running sockmap_skb_verdict_shutdown\nsubtest in sockmap_basic.\n\nThis crash is because a NULL pointer is passed to page_address() in the\nsk_msg_recvmsg(). Due to the different implementations depending on the\narchitecture, page_address(NULL) will trigger a panic on Loongarch\nplatform but not on x86 platform. So this bug was hidden on x86 platform\nfor a while, but now it is exposed on Loongarch platform. The root cause\nis that a zero length skb (skb-\u003elen == 0) was put on the queue.\n\nThis zero length skb is a TCP FIN packet, which was sent by shutdown(),\ninvoked in test_sockmap_skb_verdict_shutdown():\n\n\tshutdown(p1, SHUT_WR);\n\nIn this case, in sk_psock_skb_ingress_enqueue(), num_sge is zero, and no\npage is put to this sge (see sg_set_page in sg_set_page), but this empty\nsge is queued into ingress_msg list.\n\nAnd in sk_msg_recvmsg(), this empty sge is used, and a NULL page is got by\nsg_page(sge). Pass this NULL page to copy_page_to_iter(), which passes it\nto kmap_local_page() and to page_address(), then kernel panics.\n\nTo solve this, we should skip this zero length skb. So in sk_msg_recvmsg(),\nif copy is zero, that means it\u0027s a zero length skb, skip invoking\ncopy_page_to_iter(). We are using the EFAULT return triggered by\ncopy_page_to_iter to check for is_fin in tcp_bpf.c.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-41048",
"url": "https://www.suse.com/security/cve/CVE-2024-41048"
},
{
"category": "external",
"summary": "SUSE Bug 1228565 for CVE-2024-41048",
"url": "https://bugzilla.suse.com/1228565"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-14T07:24:46Z",
"details": "moderate"
}
],
"title": "CVE-2024-41048"
},
{
"cve": "CVE-2024-41059",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-41059"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nhfsplus: fix uninit-value in copy_name\n\n[syzbot reported]\nBUG: KMSAN: uninit-value in sized_strscpy+0xc4/0x160\n sized_strscpy+0xc4/0x160\n copy_name+0x2af/0x320 fs/hfsplus/xattr.c:411\n hfsplus_listxattr+0x11e9/0x1a50 fs/hfsplus/xattr.c:750\n vfs_listxattr fs/xattr.c:493 [inline]\n listxattr+0x1f3/0x6b0 fs/xattr.c:840\n path_listxattr fs/xattr.c:864 [inline]\n __do_sys_listxattr fs/xattr.c:876 [inline]\n __se_sys_listxattr fs/xattr.c:873 [inline]\n __x64_sys_listxattr+0x16b/0x2f0 fs/xattr.c:873\n x64_sys_call+0x2ba0/0x3b50 arch/x86/include/generated/asm/syscalls_64.h:195\n do_syscall_x64 arch/x86/entry/common.c:52 [inline]\n do_syscall_64+0xcf/0x1e0 arch/x86/entry/common.c:83\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\n\nUninit was created at:\n slab_post_alloc_hook mm/slub.c:3877 [inline]\n slab_alloc_node mm/slub.c:3918 [inline]\n kmalloc_trace+0x57b/0xbe0 mm/slub.c:4065\n kmalloc include/linux/slab.h:628 [inline]\n hfsplus_listxattr+0x4cc/0x1a50 fs/hfsplus/xattr.c:699\n vfs_listxattr fs/xattr.c:493 [inline]\n listxattr+0x1f3/0x6b0 fs/xattr.c:840\n path_listxattr fs/xattr.c:864 [inline]\n __do_sys_listxattr fs/xattr.c:876 [inline]\n __se_sys_listxattr fs/xattr.c:873 [inline]\n __x64_sys_listxattr+0x16b/0x2f0 fs/xattr.c:873\n x64_sys_call+0x2ba0/0x3b50 arch/x86/include/generated/asm/syscalls_64.h:195\n do_syscall_x64 arch/x86/entry/common.c:52 [inline]\n do_syscall_64+0xcf/0x1e0 arch/x86/entry/common.c:83\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\n[Fix]\nWhen allocating memory to strbuf, initialize memory to 0.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-41059",
"url": "https://www.suse.com/security/cve/CVE-2024-41059"
},
{
"category": "external",
"summary": "SUSE Bug 1228561 for CVE-2024-41059",
"url": "https://bugzilla.suse.com/1228561"
},
{
"category": "external",
"summary": "SUSE Bug 1228573 for CVE-2024-41059",
"url": "https://bugzilla.suse.com/1228573"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-14T07:24:46Z",
"details": "important"
}
],
"title": "CVE-2024-41059"
},
{
"cve": "CVE-2024-41060",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-41060"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/radeon: check bo_va-\u003ebo is non-NULL before using it\n\nThe call to radeon_vm_clear_freed might clear bo_va-\u003ebo, so\nwe have to check it before dereferencing it.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-41060",
"url": "https://www.suse.com/security/cve/CVE-2024-41060"
},
{
"category": "external",
"summary": "SUSE Bug 1228567 for CVE-2024-41060",
"url": "https://bugzilla.suse.com/1228567"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-14T07:24:46Z",
"details": "moderate"
}
],
"title": "CVE-2024-41060"
},
{
"cve": "CVE-2024-41063",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-41063"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nBluetooth: hci_core: cancel all works upon hci_unregister_dev()\n\nsyzbot is reporting that calling hci_release_dev() from hci_error_reset()\ndue to hci_dev_put() from hci_error_reset() can cause deadlock at\ndestroy_workqueue(), for hci_error_reset() is called from\nhdev-\u003ereq_workqueue which destroy_workqueue() needs to flush.\n\nWe need to make sure that hdev-\u003e{rx_work,cmd_work,tx_work} which are\nqueued into hdev-\u003eworkqueue and hdev-\u003e{power_on,error_reset} which are\nqueued into hdev-\u003ereq_workqueue are no longer running by the moment\n\n destroy_workqueue(hdev-\u003eworkqueue);\n destroy_workqueue(hdev-\u003ereq_workqueue);\n\nare called from hci_release_dev().\n\nCall cancel_work_sync() on these work items from hci_unregister_dev()\nas soon as hdev-\u003elist is removed from hci_dev_list.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-41063",
"url": "https://www.suse.com/security/cve/CVE-2024-41063"
},
{
"category": "external",
"summary": "SUSE Bug 1228580 for CVE-2024-41063",
"url": "https://bugzilla.suse.com/1228580"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-14T07:24:46Z",
"details": "moderate"
}
],
"title": "CVE-2024-41063"
},
{
"cve": "CVE-2024-41064",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-41064"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\npowerpc/eeh: avoid possible crash when edev-\u003epdev changes\n\nIf a PCI device is removed during eeh_pe_report_edev(), edev-\u003epdev\nwill change and can cause a crash, hold the PCI rescan/remove lock\nwhile taking a copy of edev-\u003epdev-\u003ebus.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-41064",
"url": "https://www.suse.com/security/cve/CVE-2024-41064"
},
{
"category": "external",
"summary": "SUSE Bug 1228599 for CVE-2024-41064",
"url": "https://bugzilla.suse.com/1228599"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-14T07:24:46Z",
"details": "moderate"
}
],
"title": "CVE-2024-41064"
},
{
"cve": "CVE-2024-41066",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-41066"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nibmvnic: Add tx check to prevent skb leak\n\nBelow is a summary of how the driver stores a reference to an skb during\ntransmit:\n tx_buff[free_map[consumer_index]]-\u003eskb = new_skb;\n free_map[consumer_index] = IBMVNIC_INVALID_MAP;\n consumer_index ++;\nWhere variable data looks like this:\n free_map == [4, IBMVNIC_INVALID_MAP, IBMVNIC_INVALID_MAP, 0, 3]\n \tconsumer_index^\n tx_buff == [skb=null, skb=\u003cptr\u003e, skb=\u003cptr\u003e, skb=null, skb=null]\n\nThe driver has checks to ensure that free_map[consumer_index] pointed to\na valid index but there was no check to ensure that this index pointed\nto an unused/null skb address. So, if, by some chance, our free_map and\ntx_buff lists become out of sync then we were previously risking an\nskb memory leak. This could then cause tcp congestion control to stop\nsending packets, eventually leading to ETIMEDOUT.\n\nTherefore, add a conditional to ensure that the skb address is null. If\nnot then warn the user (because this is still a bug that should be\npatched) and free the old pointer to prevent memleak/tcp problems.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-41066",
"url": "https://www.suse.com/security/cve/CVE-2024-41066"
},
{
"category": "external",
"summary": "SUSE Bug 1228640 for CVE-2024-41066",
"url": "https://bugzilla.suse.com/1228640"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-14T07:24:46Z",
"details": "moderate"
}
],
"title": "CVE-2024-41066"
},
{
"cve": "CVE-2024-41070",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-41070"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nKVM: PPC: Book3S HV: Prevent UAF in kvm_spapr_tce_attach_iommu_group()\n\nAl reported a possible use-after-free (UAF) in kvm_spapr_tce_attach_iommu_group().\n\nIt looks up `stt` from tablefd, but then continues to use it after doing\nfdput() on the returned fd. After the fdput() the tablefd is free to be\nclosed by another thread. The close calls kvm_spapr_tce_release() and\nthen release_spapr_tce_table() (via call_rcu()) which frees `stt`.\n\nAlthough there are calls to rcu_read_lock() in\nkvm_spapr_tce_attach_iommu_group() they are not sufficient to prevent\nthe UAF, because `stt` is used outside the locked regions.\n\nWith an artifcial delay after the fdput() and a userspace program which\ntriggers the race, KASAN detects the UAF:\n\n BUG: KASAN: slab-use-after-free in kvm_spapr_tce_attach_iommu_group+0x298/0x720 [kvm]\n Read of size 4 at addr c000200027552c30 by task kvm-vfio/2505\n CPU: 54 PID: 2505 Comm: kvm-vfio Not tainted 6.10.0-rc3-next-20240612-dirty #1\n Hardware name: 8335-GTH POWER9 0x4e1202 opal:skiboot-v6.5.3-35-g1851b2a06 PowerNV\n Call Trace:\n dump_stack_lvl+0xb4/0x108 (unreliable)\n print_report+0x2b4/0x6ec\n kasan_report+0x118/0x2b0\n __asan_load4+0xb8/0xd0\n kvm_spapr_tce_attach_iommu_group+0x298/0x720 [kvm]\n kvm_vfio_set_attr+0x524/0xac0 [kvm]\n kvm_device_ioctl+0x144/0x240 [kvm]\n sys_ioctl+0x62c/0x1810\n system_call_exception+0x190/0x440\n system_call_vectored_common+0x15c/0x2ec\n ...\n Freed by task 0:\n ...\n kfree+0xec/0x3e0\n release_spapr_tce_table+0xd4/0x11c [kvm]\n rcu_core+0x568/0x16a0\n handle_softirqs+0x23c/0x920\n do_softirq_own_stack+0x6c/0x90\n do_softirq_own_stack+0x58/0x90\n __irq_exit_rcu+0x218/0x2d0\n irq_exit+0x30/0x80\n arch_local_irq_restore+0x128/0x230\n arch_local_irq_enable+0x1c/0x30\n cpuidle_enter_state+0x134/0x5cc\n cpuidle_enter+0x6c/0xb0\n call_cpuidle+0x7c/0x100\n do_idle+0x394/0x410\n cpu_startup_entry+0x60/0x70\n start_secondary+0x3fc/0x410\n start_secondary_prolog+0x10/0x14\n\nFix it by delaying the fdput() until `stt` is no longer in use, which\nis effectively the entire function. To keep the patch minimal add a call\nto fdput() at each of the existing return paths. Future work can convert\nthe function to goto or __cleanup style cleanup.\n\nWith the fix in place the test case no longer triggers the UAF.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-41070",
"url": "https://www.suse.com/security/cve/CVE-2024-41070"
},
{
"category": "external",
"summary": "SUSE Bug 1228581 for CVE-2024-41070",
"url": "https://bugzilla.suse.com/1228581"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-14T07:24:46Z",
"details": "moderate"
}
],
"title": "CVE-2024-41070"
},
{
"cve": "CVE-2024-41071",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-41071"
}
],
"notes": [
{
"category": "general",
"text": "** REJECT ** This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-41071",
"url": "https://www.suse.com/security/cve/CVE-2024-41071"
},
{
"category": "external",
"summary": "SUSE Bug 1228625 for CVE-2024-41071",
"url": "https://bugzilla.suse.com/1228625"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-14T07:24:46Z",
"details": "moderate"
}
],
"title": "CVE-2024-41071"
},
{
"cve": "CVE-2024-41072",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-41072"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: cfg80211: wext: add extra SIOCSIWSCAN data check\n\nIn \u0027cfg80211_wext_siwscan()\u0027, add extra check whether number of\nchannels passed via \u0027ioctl(sock, SIOCSIWSCAN, ...)\u0027 doesn\u0027t exceed\nIW_MAX_FREQUENCIES and reject invalid request with -EINVAL otherwise.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-41072",
"url": "https://www.suse.com/security/cve/CVE-2024-41072"
},
{
"category": "external",
"summary": "SUSE Bug 1228626 for CVE-2024-41072",
"url": "https://bugzilla.suse.com/1228626"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-14T07:24:46Z",
"details": "moderate"
}
],
"title": "CVE-2024-41072"
},
{
"cve": "CVE-2024-41076",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-41076"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nNFSv4: Fix memory leak in nfs4_set_security_label\n\nWe leak nfs_fattr and nfs4_label every time we set a security xattr.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-41076",
"url": "https://www.suse.com/security/cve/CVE-2024-41076"
},
{
"category": "external",
"summary": "SUSE Bug 1228649 for CVE-2024-41076",
"url": "https://bugzilla.suse.com/1228649"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-14T07:24:46Z",
"details": "low"
}
],
"title": "CVE-2024-41076"
},
{
"cve": "CVE-2024-41078",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-41078"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbtrfs: qgroup: fix quota root leak after quota disable failure\n\nIf during the quota disable we fail when cleaning the quota tree or when\ndeleting the root from the root tree, we jump to the \u0027out\u0027 label without\never dropping the reference on the quota root, resulting in a leak of the\nroot since fs_info-\u003equota_root is no longer pointing to the root (we have\nset it to NULL just before those steps).\n\nFix this by always doing a btrfs_put_root() call under the \u0027out\u0027 label.\nThis is a problem that exists since qgroups were first added in 2012 by\ncommit bed92eae26cc (\"Btrfs: qgroup implementation and prototypes\"), but\nback then we missed a kfree on the quota root and free_extent_buffer()\ncalls on its root and commit root nodes, since back then roots were not\nyet reference counted.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-41078",
"url": "https://www.suse.com/security/cve/CVE-2024-41078"
},
{
"category": "external",
"summary": "SUSE Bug 1228655 for CVE-2024-41078",
"url": "https://bugzilla.suse.com/1228655"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-14T07:24:46Z",
"details": "low"
}
],
"title": "CVE-2024-41078"
},
{
"cve": "CVE-2024-41081",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-41081"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nila: block BH in ila_output()\n\nAs explained in commit 1378817486d6 (\"tipc: block BH\nbefore using dst_cache\"), net/core/dst_cache.c\nhelpers need to be called with BH disabled.\n\nila_output() is called from lwtunnel_output()\npossibly from process context, and under rcu_read_lock().\n\nWe might be interrupted by a softirq, re-enter ila_output()\nand corrupt dst_cache data structures.\n\nFix the race by using local_bh_disable().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-41081",
"url": "https://www.suse.com/security/cve/CVE-2024-41081"
},
{
"category": "external",
"summary": "SUSE Bug 1228617 for CVE-2024-41081",
"url": "https://bugzilla.suse.com/1228617"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-14T07:24:46Z",
"details": "moderate"
}
],
"title": "CVE-2024-41081"
},
{
"cve": "CVE-2024-41089",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-41089"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/nouveau/dispnv04: fix null pointer dereference in nv17_tv_get_hd_modes\n\nIn nv17_tv_get_hd_modes(), the return value of drm_mode_duplicate() is\nassigned to mode, which will lead to a possible NULL pointer dereference\non failure of drm_mode_duplicate(). The same applies to drm_cvt_mode().\nAdd a check to avoid null pointer dereference.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-41089",
"url": "https://www.suse.com/security/cve/CVE-2024-41089"
},
{
"category": "external",
"summary": "SUSE Bug 1228658 for CVE-2024-41089",
"url": "https://bugzilla.suse.com/1228658"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-14T07:24:46Z",
"details": "moderate"
}
],
"title": "CVE-2024-41089"
},
{
"cve": "CVE-2024-41090",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-41090"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntap: add missing verification for short frame\n\nThe cited commit missed to check against the validity of the frame length\nin the tap_get_user_xdp() path, which could cause a corrupted skb to be\nsent downstack. Even before the skb is transmitted, the\ntap_get_user_xdp()--\u003eskb_set_network_header() may assume the size is more\nthan ETH_HLEN. Once transmitted, this could either cause out-of-bound\naccess beyond the actual length, or confuse the underlayer with incorrect\nor inconsistent header length in the skb metadata.\n\nIn the alternative path, tap_get_user() already prohibits short frame which\nhas the length less than Ethernet header size from being transmitted.\n\nThis is to drop any frame shorter than the Ethernet header size just like\nhow tap_get_user() does.\n\nCVE: CVE-2024-41090",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-41090",
"url": "https://www.suse.com/security/cve/CVE-2024-41090"
},
{
"category": "external",
"summary": "SUSE Bug 1228328 for CVE-2024-41090",
"url": "https://bugzilla.suse.com/1228328"
},
{
"category": "external",
"summary": "SUSE Bug 1228714 for CVE-2024-41090",
"url": "https://bugzilla.suse.com/1228714"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-14T07:24:46Z",
"details": "important"
}
],
"title": "CVE-2024-41090"
},
{
"cve": "CVE-2024-41091",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-41091"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntun: add missing verification for short frame\n\nThe cited commit missed to check against the validity of the frame length\nin the tun_xdp_one() path, which could cause a corrupted skb to be sent\ndownstack. Even before the skb is transmitted, the\ntun_xdp_one--\u003eeth_type_trans() may access the Ethernet header although it\ncan be less than ETH_HLEN. Once transmitted, this could either cause\nout-of-bound access beyond the actual length, or confuse the underlayer\nwith incorrect or inconsistent header length in the skb metadata.\n\nIn the alternative path, tun_get_user() already prohibits short frame which\nhas the length less than Ethernet header size from being transmitted for\nIFF_TAP.\n\nThis is to drop any frame shorter than the Ethernet header size just like\nhow tun_get_user() does.\n\nCVE: CVE-2024-41091",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-41091",
"url": "https://www.suse.com/security/cve/CVE-2024-41091"
},
{
"category": "external",
"summary": "SUSE Bug 1228327 for CVE-2024-41091",
"url": "https://bugzilla.suse.com/1228327"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-14T07:24:46Z",
"details": "moderate"
}
],
"title": "CVE-2024-41091"
},
{
"cve": "CVE-2024-41095",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-41095"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/nouveau/dispnv04: fix null pointer dereference in nv17_tv_get_ld_modes\n\nIn nv17_tv_get_ld_modes(), the return value of drm_mode_duplicate() is\nassigned to mode, which will lead to a possible NULL pointer dereference\non failure of drm_mode_duplicate(). Add a check to avoid npd.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-41095",
"url": "https://www.suse.com/security/cve/CVE-2024-41095"
},
{
"category": "external",
"summary": "SUSE Bug 1228662 for CVE-2024-41095",
"url": "https://bugzilla.suse.com/1228662"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-14T07:24:46Z",
"details": "moderate"
}
],
"title": "CVE-2024-41095"
},
{
"cve": "CVE-2024-42070",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-42070"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnetfilter: nf_tables: fully validate NFT_DATA_VALUE on store to data registers\n\nregister store validation for NFT_DATA_VALUE is conditional, however,\nthe datatype is always either NFT_DATA_VALUE or NFT_DATA_VERDICT. This\nonly requires a new helper function to infer the register type from the\nset datatype so this conditional check can be removed. Otherwise,\npointer to chain object can be leaked through the registers.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-42070",
"url": "https://www.suse.com/security/cve/CVE-2024-42070"
},
{
"category": "external",
"summary": "SUSE Bug 1228470 for CVE-2024-42070",
"url": "https://bugzilla.suse.com/1228470"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-14T07:24:46Z",
"details": "low"
}
],
"title": "CVE-2024-42070"
},
{
"cve": "CVE-2024-42093",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-42093"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/dpaa2: Avoid explicit cpumask var allocation on stack\n\nFor CONFIG_CPUMASK_OFFSTACK=y kernel, explicit allocation of cpumask\nvariable on stack is not recommended since it can cause potential stack\noverflow.\n\nInstead, kernel code should always use *cpumask_var API(s) to allocate\ncpumask var in config-neutral way, leaving allocation strategy to\nCONFIG_CPUMASK_OFFSTACK.\n\nUse *cpumask_var API(s) to address it.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-42093",
"url": "https://www.suse.com/security/cve/CVE-2024-42093"
},
{
"category": "external",
"summary": "SUSE Bug 1228680 for CVE-2024-42093",
"url": "https://bugzilla.suse.com/1228680"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-14T07:24:46Z",
"details": "moderate"
}
],
"title": "CVE-2024-42093"
},
{
"cve": "CVE-2024-42096",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-42096"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nx86: stop playing stack games in profile_pc()\n\nThe \u0027profile_pc()\u0027 function is used for timer-based profiling, which\nisn\u0027t really all that relevant any more to begin with, but it also ends\nup making assumptions based on the stack layout that aren\u0027t necessarily\nvalid.\n\nBasically, the code tries to account the time spent in spinlocks to the\ncaller rather than the spinlock, and while I support that as a concept,\nit\u0027s not worth the code complexity or the KASAN warnings when no serious\nprofiling is done using timers anyway these days.\n\nAnd the code really does depend on stack layout that is only true in the\nsimplest of cases. We\u0027ve lost the comment at some point (I think when\nthe 32-bit and 64-bit code was unified), but it used to say:\n\n\tAssume the lock function has either no stack frame or a copy\n\tof eflags from PUSHF.\n\nwhich explains why it just blindly loads a word or two straight off the\nstack pointer and then takes a minimal look at the values to just check\nif they might be eflags or the return pc:\n\n\tEflags always has bits 22 and up cleared unlike kernel addresses\n\nbut that basic stack layout assumption assumes that there isn\u0027t any lock\ndebugging etc going on that would complicate the code and cause a stack\nframe.\n\nIt causes KASAN unhappiness reported for years by syzkaller [1] and\nothers [2].\n\nWith no real practical reason for this any more, just remove the code.\n\nJust for historical interest, here\u0027s some background commits relating to\nthis code from 2006:\n\n 0cb91a229364 (\"i386: Account spinlocks to the caller during profiling for !FP kernels\")\n 31679f38d886 (\"Simplify profile_pc on x86-64\")\n\nand a code unification from 2009:\n\n ef4512882dbe (\"x86: time_32/64.c unify profile_pc\")\n\nbut the basics of this thing actually goes back to before the git tree.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-42096",
"url": "https://www.suse.com/security/cve/CVE-2024-42096"
},
{
"category": "external",
"summary": "SUSE Bug 1228633 for CVE-2024-42096",
"url": "https://bugzilla.suse.com/1228633"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-14T07:24:46Z",
"details": "moderate"
}
],
"title": "CVE-2024-42096"
},
{
"cve": "CVE-2024-42119",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-42119"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amd/display: Skip finding free audio for unknown engine_id\n\n[WHY]\nENGINE_ID_UNKNOWN = -1 and can not be used as an array index. Plus, it\nalso means it is uninitialized and does not need free audio.\n\n[HOW]\nSkip and return NULL.\n\nThis fixes 2 OVERRUN issues reported by Coverity.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-42119",
"url": "https://www.suse.com/security/cve/CVE-2024-42119"
},
{
"category": "external",
"summary": "SUSE Bug 1228584 for CVE-2024-42119",
"url": "https://bugzilla.suse.com/1228584"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-14T07:24:46Z",
"details": "moderate"
}
],
"title": "CVE-2024-42119"
},
{
"cve": "CVE-2024-42120",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-42120"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amd/display: Check pipe offset before setting vblank\n\npipe_ctx has a size of MAX_PIPES so checking its index before accessing\nthe array.\n\nThis fixes an OVERRUN issue reported by Coverity.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-42120",
"url": "https://www.suse.com/security/cve/CVE-2024-42120"
},
{
"category": "external",
"summary": "SUSE Bug 1228588 for CVE-2024-42120",
"url": "https://bugzilla.suse.com/1228588"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-14T07:24:46Z",
"details": "moderate"
}
],
"title": "CVE-2024-42120"
},
{
"cve": "CVE-2024-42124",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-42124"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: qedf: Make qedf_execute_tmf() non-preemptible\n\nStop calling smp_processor_id() from preemptible code in\nqedf_execute_tmf90. This results in BUG_ON() when running an RT kernel.\n\n[ 659.343280] BUG: using smp_processor_id() in preemptible [00000000] code: sg_reset/3646\n[ 659.343282] caller is qedf_execute_tmf+0x8b/0x360 [qedf]",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-42124",
"url": "https://www.suse.com/security/cve/CVE-2024-42124"
},
{
"category": "external",
"summary": "SUSE Bug 1228705 for CVE-2024-42124",
"url": "https://bugzilla.suse.com/1228705"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-14T07:24:46Z",
"details": "moderate"
}
],
"title": "CVE-2024-42124"
},
{
"cve": "CVE-2024-42145",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-42145"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nIB/core: Implement a limit on UMAD receive List\n\nThe existing behavior of ib_umad, which maintains received MAD\npackets in an unbounded list, poses a risk of uncontrolled growth.\nAs user-space applications extract packets from this list, the rate\nof extraction may not match the rate of incoming packets, leading\nto potential list overflow.\n\nTo address this, we introduce a limit to the size of the list. After\nconsidering typical scenarios, such as OpenSM processing, which can\nhandle approximately 100k packets per second, and the 1-second retry\ntimeout for most packets, we set the list size limit to 200k. Packets\nreceived beyond this limit are dropped, assuming they are likely timed\nout by the time they are handled by user-space.\n\nNotably, packets queued on the receive list due to reasons like\ntimed-out sends are preserved even when the list is full.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-42145",
"url": "https://www.suse.com/security/cve/CVE-2024-42145"
},
{
"category": "external",
"summary": "SUSE Bug 1223384 for CVE-2024-42145",
"url": "https://bugzilla.suse.com/1223384"
},
{
"category": "external",
"summary": "SUSE Bug 1228743 for CVE-2024-42145",
"url": "https://bugzilla.suse.com/1228743"
},
{
"category": "external",
"summary": "SUSE Bug 1228744 for CVE-2024-42145",
"url": "https://bugzilla.suse.com/1228744"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-14T07:24:46Z",
"details": "important"
}
],
"title": "CVE-2024-42145"
},
{
"cve": "CVE-2024-42223",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-42223"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmedia: dvb-frontends: tda10048: Fix integer overflow\n\nstate-\u003extal_hz can be up to 16M, so it can overflow a 32 bit integer\nwhen multiplied by pll_mfactor.\n\nCreate a new 64 bit variable to hold the calculations.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-42223",
"url": "https://www.suse.com/security/cve/CVE-2024-42223"
},
{
"category": "external",
"summary": "SUSE Bug 1228726 for CVE-2024-42223",
"url": "https://bugzilla.suse.com/1228726"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-14T07:24:46Z",
"details": "moderate"
}
],
"title": "CVE-2024-42223"
},
{
"cve": "CVE-2024-42224",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-42224"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: dsa: mv88e6xxx: Correct check for empty list\n\nSince commit a3c53be55c95 (\"net: dsa: mv88e6xxx: Support multiple MDIO\nbusses\") mv88e6xxx_default_mdio_bus() has checked that the\nreturn value of list_first_entry() is non-NULL.\n\nThis appears to be intended to guard against the list chip-\u003emdios being\nempty. However, it is not the correct check as the implementation of\nlist_first_entry is not designed to return NULL for empty lists.\n\nInstead, use list_first_entry_or_null() which does return NULL if the\nlist is empty.\n\nFlagged by Smatch.\nCompile tested only.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-42224",
"url": "https://www.suse.com/security/cve/CVE-2024-42224"
},
{
"category": "external",
"summary": "SUSE Bug 1228723 for CVE-2024-42224",
"url": "https://bugzilla.suse.com/1228723"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-14T07:24:46Z",
"details": "moderate"
}
],
"title": "CVE-2024-42224"
}
]
}
suse-su-2024:2940-1
Vulnerability from csaf_suse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel",
"title": "Title of the patch"
},
{
"category": "description",
"text": "The SUSE Linux Enterprise 12 SP5 kernel was updated to receive various security bugfixes.\n\n\nThe following security bugs were fixed:\n\n- CVE-2024-39494: ima: Fix use-after-free on a dentry\u0027s dname.name (bsc#1227716).\n- CVE-2024-42096: x86: stop playing stack games in profile_pc() (bsc#1228633).\n- CVE-2024-39506: liquidio: adjust a NULL pointer handling path in lio_vf_rep_copy_packet (bsc#1227729).\n- CVE-2021-47619: i40e: Fix queues reservation for XDP (bsc#1226645).\n- CVE-2024-42145: IB/core: Implement a limit on UMAD receive List (bsc#1228743).\n- CVE-2024-42124: scsi: qedf: Make qedf_execute_tmf() non-preemptible (bsc#1228705).\n- CVE-2024-42223: media: dvb-frontends: tda10048: Fix integer overflow (bsc#1228726)\n- CVE-2024-42119: drm/amd/display: Skip finding free audio for unknown engine_id (bsc#1228584)\n- CVE-2024-42120: drm/amd/display: Check pipe offset before setting vblank (bsc#1228588)\n- CVE-2024-41095: drm/nouveau/dispnv04: fix null pointer dereference in nv17_tv_get_ld_modes (bsc#1228662)\n- CVE-2024-42224: net: dsa: mv88e6xxx: Correct check for empty list (bsc#1228723).\n- CVE-2024-41072: wifi: cfg80211: wext: add extra SIOCSIWSCAN data check (bsc#1228626).\n- CVE-2024-41048: skmsg: Skip zero length skb in sk_msg_recvmsg (bsc#1228565).\n- CVE-2024-40995: net/sched: act_api: fix possible infinite loop in tcf_idr_check_alloc() (bsc#1227830).\n- CVE-2024-41044: ppp: reject claimed-as-LCP but actually malformed packets (bsc#1228530).\n- CVE-2024-41066: ibmvnic: add tx check to prevent skb leak (bsc#1228640).\n- CVE-2024-42093: net/dpaa2: Avoid explicit cpumask var allocation on stack (bsc#1228680).\n- CVE-2024-41089: drm/nouveau/dispnv04: fix null pointer dereference in (bsc#1228658)\n- CVE-2024-41060: drm/radeon: check bo_va-\u003ebo is non-NULL before using it (bsc#1228567)\n- CVE-2022-48829: NFSD: Fix NFSv3 SETATTR/CREATE\u0027s handling of large file sizes (bsc#1228055).\n- CVE-2022-48828: NFSD: Fix ia_size underflow (bsc#1228054).\n- CVE-2022-48827: NFSD: Fix the behavior of READ near OFFSET_MAX (bsc#1228037).\n- CVE-2024-41078: btrfs: qgroup: fix quota root leak after quota disable failure (bsc#1228655).\n- CVE-2024-41071: wifi: mac80211: Avoid address calculations via out of bounds array indexing (bsc#1228625).\n- CVE-2024-41064: powerpc/eeh: avoid possible crash when edev-\u003epdev changes (bsc#1228599).\n- CVE-2024-35949: btrfs: make sure that WRITTEN is set on all metadata blocks (bsc#1224700).\n- CVE-2024-41081: ila: block BH in ila_output() (bsc#1228617).\n- CVE-2024-40978: scsi: qedi: Fix crash while reading debugfs attribute (bsc#1227929).\n- CVE-2022-48792: scsi: pm8001: Fix use-after-free for aborted SSP/STP sas_task (bsc#1228013).\n- CVE-2022-48823: scsi: qedf: Fix refcount issue when LOGO is received during TMF (bsc#1228045).\n- CVE-2024-40998: ext4: fix uninitialized ratelimit_state-\u003elock access in __ext4_fill_super() (bsc#1227866).\n- CVE-2024-41059: hfsplus: fix uninit-value in copy_name (bsc#1228561).\n- CVE-2024-40987: drm/amdgpu: fix UBSAN warning in kv_dpm.c (bsc#1228235)\n- CVE-2022-48826: drm/vc4: Fix deadlock on DSI device attach error (bsc#1227975)\n- CVE-2024-27437: vfio/pci: Disable auto-enable of exclusive INTx IRQ (bsc#1222625).\n- CVE-2024-41015: ocfs2: add bounds checking to ocfs2_check_dir_entry() (bsc#1228409).\n- CVE-2024-41016: ocfs2: strict bound check before memcmp in ocfs2_xattr_find_entry() (bsc#1228410).\n- CVE-2024-41063: bluetooth: hci_core: cancel all works upon hci_unregister_dev() (bsc#1228580).\n- CVE-2024-42070: netfilter: nf_tables: fully validate NFT_DATA_VALUE on store to data registers (bsc#1228470).\n- CVE-2024-41070: KVM: PPC: Book3S HV: Prevent UAF in kvm_spapr_tce_attach_iommu_group() (bsc#1228581).\n- CVE-2021-47405: HID: usbhid: free raw_report buffers in usbhid_stop (bsc#1225238).\n- CVE-2024-40988: drm/radeon: fix UBSAN warning in kv_dpm.c (bsc#1227957)\n- CVE-2024-40932: drm/exynos/vidi: fix memory leak in .get_modes() (bsc#1227828)\n- CVE-2021-47403: ipack: ipoctal: fix module reference leak (bsc#1225241).\n- CVE-2021-47388: mac80211: fix use-after-free in CCMP/GCMP RX (bsc#1225214).\n- CVE-2024-41014: xfs: add bounds checking to xlog_recover_process_data (bsc#1228408).\n- CVE-2024-41091: tun: add missing verification for short frame (bsc#1228327).\n- CVE-2024-41090: tap: add missing verification for short frame (bsc#1228328).\n- CVE-2024-40999: net: ena: Add validation for completion descriptors consistency (bsc#1227913).\n- CVE-2024-35837: net: mvpp2: clear BM pool before initialization (bsc#1224500).\n- CVE-2021-47588: sit: do not call ipip6_dev_free() from sit_init_net() (bsc#1226568).\n- CVE-2022-48804: vt_ioctl: fix array_index_nospec in vt_setactivate (bsc#1227968).\n- CVE-2024-40967: serial: imx: Introduce timeout when waiting on transmitter empty (bsc#1227891).\n- CVE-2024-40966: kABI: tty: add the option to have a tty reject a new ldisc (bsc#1227886).\n- CVE-2022-48850: net-sysfs: add check for netdevice being present to speed_show (bsc#1228071).\n- CVE-2021-47582: usb: core: Do not hold the device lock while sleeping in do_proc_control() (bsc#1226559).\n- CVE-2024-40982: ssb: fix potential NULL pointer dereference in ssb_device_uevent() (bsc#1227865).\n- CVE-2021-47468: isdn: mISDN: Fix sleeping function called from invalid context (bsc#1225346).\n- CVE-2021-47395: mac80211: limit injected vht mcs/nss in ieee80211_parse_tx_radiotap (bsc#1225326).\n- CVE-2022-48810: ipmr,ip6mr: acquire RTNL before calling ip[6]mr_free_table() on failure path (bsc#1227936).\n- CVE-2023-52594: Fixed potential array-index-out-of-bounds read in ath9k_htc_txstatus() (bsc#1221045).\n- CVE-2022-48855: sctp: fix kernel-infoleak for SCTP sockets (bsc#1228003).\n- CVE-2021-47580: scsi: scsi_debug: Fix type in min_t to avoid stack OOB (bsc#1226550).\n- CVE-2024-26735: ipv6: sr: fix possible use-after-free and null-ptr-deref (bsc#1222372).\n- CVE-2024-38560: scsi: bfa: Ensure the copied buf is NUL terminated (bsc#1226786).\n- CVE-2022-48811: ibmvnic: do not release napi in __ibmvnic_open() (bsc#1227928).\n- CVE-2021-0129: Improper access control in BlueZ may have allowed an authenticated user to potentially enable information disclosure via adjacent access (bsc#1186463).\n- CVE-2020-26558: Fixed a flaw in the Bluetooth LE and BR/EDR secure pairing that could permit a nearby man-in-the-middle attacker to identify the Passkey used during pairing (bsc#1179610).\n- CVE-2024-40937: gve: Clear napi-\u003eskb before dev_kfree_skb_any() (bsc#1227836).\n- CVE-2024-39507: net: hns3: fix kernel crash problem in concurrent scenario (bsc#1227730).\n- CVE-2024-40923: vmxnet3: disable rx data ring on dma allocation failure (bsc#1227786).\n- CVE-2024-40941: wifi: iwlwifi: mvm: do not read past the mfuart notifcation (bsc#1227771).\n- CVE-2022-48860: ethernet: Fix error handling in xemaclite_of_probe (bsc#1228008)\n- CVE-2022-48863: mISDN: Fix memory leak in dsp_pipeline_build() (bsc#1228063).\n- CVE-2024-40953: KVM: Fix a data race on last_boosted_vcpu in kvm_vcpu_on_spin() (bsc#1227806).\n- CVE-2024-39499: vmci: prevent speculation leaks by sanitizing event in event_deliver() (bsc#1227725)\n- CVE-2024-39509: HID: core: remove unnecessary WARN_ON() in implement() (bsc#1227733)\n- CVE-2024-39487: bonding: Fix out-of-bounds read in bond_option_arp_ip_targets_set() (bsc#1227573)\n- CVE-2024-35934: net/smc: reduce rtnl pressure in smc_pnet_create_pnetids_list() (bsc#1224641)\n- CVE-2024-40959: xfrm6: check ip6_dst_idev() return value in xfrm6_get_saddr() (bsc#1227884).\n- CVE-2024-35893: net/sched: act_skbmod: prevent kernel-infoleak (bsc#1224512)\n- CVE-2021-47441: mlxsw: thermal: Fix out-of-bounds memory accesses (bsc#1225224)\n- CVE-2021-47194: cfg80211: call cfg80211_stop_ap when switch from P2P_GO type (bsc#1222829)\n- CVE-2024-27020: netfilter: nf_tables: Fix potential data-race in __nft_expr_type_get() (bsc#1223815)\n- CVE-2022-48775: Drivers: hv: vmbus: Fix memory leak in vmbus_add_channel_kobj (bsc#1227924).\n- CVE-2024-27019: netfilter: nf_tables: Fix potential data-race in __nft_obj_type_get() (bsc#1223813)\n- CVE-2024-40929: wifi: iwlwifi: mvm: check n_ssids before accessing the ssids (bsc#1227774).\n- CVE-2024-40912: wifi: mac80211: Fix deadlock in ieee80211_sta_ps_deliver_wakeup() (bsc#1227790).\n- CVE-2024-40942: wifi: mac80211: mesh: Fix leak of mesh_preq_queue objects (bsc#1227770).\n- CVE-2022-48857: NFC: port100: fix use-after-free in port100_send_complete (bsc#1228005).\n- CVE-2024-36902: ipv6: fib6_rules: avoid possible NULL dereference in fib6_rule_action() (bsc#1225719).\n- CVE-2021-47606: net: netlink: af_netlink: Prevent empty skb by adding a check on len. (bsc#1226555).\n- CVE-2024-40901: scsi: mpt3sas: Avoid test/set_bit() operating in non-allocated memory (bsc#1227762).\n- CVE-2024-26924: scsi: lpfc: Release hbalock before calling lpfc_worker_wake_up() (bsc#1225820).\n- CVE-2024-26830: Fixed i40e to not allow untrusted VF to remove administratively set MAC (bsc#1223012).\n- CVE-2021-47516: nfp: Fix memory leak in nfp_cpp_area_cache_add() (bsc#1225427).\n- CVE-2021-47501: i40e: Fix NULL pointer dereference in i40e_dbg_dump_desc (bsc#1225361).\n- CVE-2024-39501: drivers: core: synchronize really_probe() and dev_uevent() (bsc#1227754).\n- CVE-2023-52743: ice: Do not use WQ_MEM_RECLAIM flag for workqueue (bsc#1225003)\n- CVE-2021-47542: net: qlogic: qlcnic: Fix a NULL pointer dereference in qlcnic_83xx_add_rings() (bsc#1225455)\n- CVE-2024-36901: ipv6: prevent NULL dereference in ip6_output() (bsc#1225711)\n- CVE-2024-36004: i40e: Do not use WQ_MEM_RECLAIM flag for workqueue (bsc#1224545)\n- CVE-2024-27025: nbd: null check for nla_nest_start (bsc#1223778)\n- CVE-2021-47599: btrfs: use latest_dev in btrfs_show_devname (bsc#1226571).\n- CVE-2023-52435: net: prevent mss overflow in skb_segment() (bsc#1220138).\n- CVE-2024-26663: tipc: Check the bearer type before calling tipc_udp_nl_bearer_add() (bsc#1222326).\n- CVE-2021-47597: inet_diag: fix kernel-infoleak for UDP sockets (bsc#1226553).\n- CVE-2024-39490: ipv6: sr: fix missing sk_buff release in seg6_input_core (bsc#1227626).\n- CVE-2024-38558: net: openvswitch: fix overwriting ct original tuple for ICMPv6 (bsc#1226783).\n- CVE-2024-26615: net/smc: fix illegal rmb_desc access in SMC-D connection dump (bsc#1220942).\n- CVE-2023-52619: Fixed possible crash when setting number of cpus to an odd number in pstore/ram (bsc#1221618).\n- CVE-2024-26659: Fixed wrong handling of isoc Babble and Buffer Overrun events in xhci (bsc#1222317).\n- CVE-2024-35978: Bluetooth: Fix memory leak in hci_req_sync_complete() (bsc#1224571).\n- CVE-2023-52669: crypto: s390/aes - Fix buffer overread in CTR mode (bsc#1224637).\n- CVE-2023-52615: Fixed page fault dead lock on mmap-ed hwrng (bsc#1221614).\n- CVE-2023-52612: Fixed req-\u003edst buffer overflow in crypto/scomp (bsc#1221616).\n- CVE-2024-35995: ACPI: CPPC: Use access_width over bit_width for system memory accesses (bsc#1224557).\n- CVE-2023-52623: Fixed suspicious RCU usage in SUNRPC (bsc#1222060).\n- CVE-2021-47295: net: sched: fix memory leak in tcindex_partial_destroy_work (bsc#1224975)\n- CVE-2024-38630: watchdog: cpu5wdt.c: Fix use-after-free bug caused by cpu5wdt_trigger (bsc#1226908).\n- CVE-2021-47559: net/smc: Fix NULL pointer dereferencing in smc_vlan_by_tcpsk() (bsc#1225396).\n\nThe following non-security bugs were fixed:\n\n- Fix spurious WARNING caused by a qxl driver patch (bsc#1227213,bsc#1227191)\n- Btrfs: incremental send, fix emission of invalid clone operations (bsc#1228030).\n- Btrfs: send, improve clone range (bsc#1228030).\n- KVM: PPC: Book3S HV: Do not take kvm-\u003elock around kvm_for_each_vcpu (bsc#1065729).\n- KVM: PPC: Book3S HV: remove extraneous asterisk from rm_host_ipi_action() comment (bsc#1065729).\n- KVM: PPC: Book3S PR: Exiting split hack mode needs to fixup both PC and LR (bsc#1065729).\n- KVM: PPC: Book3S: Fix some RCU-list locks (git-fixes).\n- KVM: PPC: Book3S: Only report KVM_CAP_SPAPR_TCE_VFIO on powernv machines (bsc#1065729).\n- KVM: PPC: Book3S: Use new mutex to synchronize access to rtas token list (bsc#1065729).\n- KVM: PPC: Inform the userspace about TCE update failures (bsc#1065729).\n- KVM: PPC: Move and undef TRACE_INCLUDE_PATH/FILE (bsc#1065729).\n- PCI: Fix resource double counting on remove \u0026 rescan (git-fixes).\n- PCI: hv: Return zero, not garbage, when reading PCI_INTERRUPT_PIN (git-fixes).\n- Tools: hv: kvp: eliminate \u0027may be used uninitialized\u0027 warning (git-fixes).\n- USB: class: cdc-wdm: Fix CPU lockup caused by excessive log messages (git-fixes).\n- btrfs: fix 64bit compat send ioctl arguments not initializing version member (bsc#1228030).\n- btrfs: fix send ioctl on 32bit with 64bit kernel (bsc#1228030).\n- btrfs: remove unused members dir_path from recorded_ref (bsc#1228030).\n- btrfs: send: add new command FILEATTR for file attributes (bsc#1228030).\n- btrfs: send: add stream v2 definitions (bsc#1228030).\n- btrfs: send: always use the rbtree based inode ref management infrastructure (bsc#1228030).\n- btrfs: send: avoid copying file data (bsc#1228030).\n- btrfs: send: explicitly number commands and attributes (bsc#1228030).\n- btrfs: send: fix failures when processing inodes with no links (bsc#1228030).\n- btrfs: send: fix send failure of a subcase of orphan inodes (bsc#1228030).\n- btrfs: send: fix sending link commands for existing file paths (bsc#1228030).\n- btrfs: send: get rid of i_size logic in send_write() (bsc#1228030).\n- btrfs: send: introduce recorded_ref_alloc and recorded_ref_free (bsc#1228030).\n- btrfs: send: prepare for v2 protocol (bsc#1228030).\n- btrfs: send: refactor arguments of get_inode_info() (bsc#1228030).\n- btrfs: send: remove stale code when checking for shared extents (bsc#1228030).\n- btrfs: send: remove unused found_type parameter to lookup_dir_item_inode() (bsc#1228030).\n- btrfs: send: remove unused send_ctx::{total,cmd}_send_size (bsc#1228030).\n- btrfs: send: use boolean types for current inode status (bsc#1228030).\n- btrfs: silence maybe-uninitialized warning in clone_range (bsc#1228030).\n- drm/vc4: dsi: Only register our component once a DSI device is (bsc#1227975)\n- hv_netvsc: rndis_filter needs to select NLS (git-fixes).\n- ipv6: sr: fix incorrect unregister order (git-fixes).\n- net: mana: Fix the extra HZ in mana_hwc_send_request (git-fixes).\n- net: mana: select PAGE_POOL (git-fixes).\n- net_sched: add a temporary refcnt for struct tcindex_data (bsc#1224975).\n- net_sched: fix a memory leak in cls_tcindex (bsc#1224975).\n- net_sched: fix a missing refcnt in tcindex_init() (bsc#1224975).\n- net_sched: hold rtnl lock in tcindex_partial_destroy_work() (bsc#1224975)\n- nvme: fixup comment for nvme RDMA Provider Type (git-fixes).\n- ocfs2: fix DIO failure due to insufficient transaction credits (bsc#1216834).\n- ocfs2: remove redundant assignment to variable free_space (bsc#1228409).\n- ocfs2: strict bound check before memcmp in ocfs2_xattr_find_entry() (bsc#1228410).\n- scsi: qla2xxx: Avoid possible run-time warning with long model_num (bsc#1228850).\n- scsi: qla2xxx: Complete command early within lock (bsc#1228850).\n- scsi: qla2xxx: Convert comma to semicolon (bsc#1228850).\n- scsi: qla2xxx: Drop driver owner assignment (bsc#1228850).\n- scsi: qla2xxx: During vport delete send async logout explicitly (bsc#1228850).\n- scsi: qla2xxx: Fix debugfs output for fw_resource_count (bsc#1228850).\n- scsi: qla2xxx: Fix flash read failure (bsc#1228850).\n- scsi: qla2xxx: Fix for possible memory corruption (bsc#1228850).\n- scsi: qla2xxx: Fix optrom version displayed in FDMI (bsc#1228850).\n- scsi: qla2xxx: Reduce fabric scan duplicate code (bsc#1228850).\n- scsi: qla2xxx: Remove unused struct \u0027scsi_dif_tuple\u0027 (bsc#1228850).\n- scsi: qla2xxx: Return ENOBUFS if sg_cnt is more than one for ELS cmds (bsc#1228850).\n- scsi: qla2xxx: Unable to act on RSCN for port online (bsc#1228850).\n- scsi: qla2xxx: Update version to 10.02.09.300-k (bsc#1228850).\n- scsi: qla2xxx: Use QP lock to search for bsg (bsc#1228850).\n- scsi: qla2xxx: validate nvme_local_port correctly (bsc#1228850).\n- signal: Introduce clear_siginfo (git-fixes).\n- string.h: Introduce memtostr() and memtostr_pad() (bsc#1228850).\n- tools lib: Fix builds when glibc contains strlcpy() (git-fixes).\n- tools: hv: fix KVP and VSS daemons exit code (git-fixes).\n- usb: add a hcd_uses_dma helper (git-fixes).\n- usb: atm: cxacru: fix endpoint checking in cxacru_bind() (git-fixes).\n- usb: musb: da8xx: fix a resource leak in probe() (git-fixes).\n- x86/bhi: Avoid warning in #DB handler due to BHI mitigation (git-fixes).\n- x86/bugs: Remove CONFIG_BHI_MITIGATION_AUTO and spectre_bhi=auto (git-fixes).\n- x86/bugs: Replace CONFIG_SPECTRE_BHI_{ON,OFF} with CONFIG_MITIGATION_SPECTRE_BHI (git-fixes).\n- xfs: check that dir block entries do not off the end of the buffer (git-fixes).\n- xfs: refactor xfs_verifier_error and xfs_buf_ioerror (git-fixes).\n- xfs: remove XFS_WANT_CORRUPTED_RETURN from dir3 data verifiers (git-fixes).\n- xhci: Poll for U0 after disabling USB2 LPM (git-fixes).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2024-2940,SUSE-SLE-HA-12-SP5-2024-2940,SUSE-SLE-Live-Patching-12-SP5-2024-2940,SUSE-SLE-SDK-12-SP5-2024-2940,SUSE-SLE-SERVER-12-SP5-2024-2940,SUSE-SLE-WE-12-SP5-2024-2940",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2024_2940-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2024:2940-1",
"url": "https://www.suse.com/support/update/announcement/2024/suse-su-20242940-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2024:2940-1",
"url": "https://lists.suse.com/pipermail/sle-updates/2024-August/036478.html"
},
{
"category": "self",
"summary": "SUSE Bug 1065729",
"url": "https://bugzilla.suse.com/1065729"
},
{
"category": "self",
"summary": "SUSE Bug 1088701",
"url": "https://bugzilla.suse.com/1088701"
},
{
"category": "self",
"summary": "SUSE Bug 1149446",
"url": "https://bugzilla.suse.com/1149446"
},
{
"category": "self",
"summary": "SUSE Bug 1179610",
"url": "https://bugzilla.suse.com/1179610"
},
{
"category": "self",
"summary": "SUSE Bug 1186463",
"url": "https://bugzilla.suse.com/1186463"
},
{
"category": "self",
"summary": "SUSE Bug 1196018",
"url": "https://bugzilla.suse.com/1196018"
},
{
"category": "self",
"summary": "SUSE Bug 1202346",
"url": "https://bugzilla.suse.com/1202346"
},
{
"category": "self",
"summary": "SUSE Bug 1216834",
"url": "https://bugzilla.suse.com/1216834"
},
{
"category": "self",
"summary": "SUSE Bug 1220138",
"url": "https://bugzilla.suse.com/1220138"
},
{
"category": "self",
"summary": "SUSE Bug 1220942",
"url": "https://bugzilla.suse.com/1220942"
},
{
"category": "self",
"summary": "SUSE Bug 1221045",
"url": "https://bugzilla.suse.com/1221045"
},
{
"category": "self",
"summary": "SUSE Bug 1221614",
"url": "https://bugzilla.suse.com/1221614"
},
{
"category": "self",
"summary": "SUSE Bug 1221616",
"url": "https://bugzilla.suse.com/1221616"
},
{
"category": "self",
"summary": "SUSE Bug 1221618",
"url": "https://bugzilla.suse.com/1221618"
},
{
"category": "self",
"summary": "SUSE Bug 1222060",
"url": "https://bugzilla.suse.com/1222060"
},
{
"category": "self",
"summary": "SUSE Bug 1222317",
"url": "https://bugzilla.suse.com/1222317"
},
{
"category": "self",
"summary": "SUSE Bug 1222326",
"url": "https://bugzilla.suse.com/1222326"
},
{
"category": "self",
"summary": "SUSE Bug 1222372",
"url": "https://bugzilla.suse.com/1222372"
},
{
"category": "self",
"summary": "SUSE Bug 1222625",
"url": "https://bugzilla.suse.com/1222625"
},
{
"category": "self",
"summary": "SUSE Bug 1222776",
"url": "https://bugzilla.suse.com/1222776"
},
{
"category": "self",
"summary": "SUSE Bug 1222824",
"url": "https://bugzilla.suse.com/1222824"
},
{
"category": "self",
"summary": "SUSE Bug 1222829",
"url": "https://bugzilla.suse.com/1222829"
},
{
"category": "self",
"summary": "SUSE Bug 1222866",
"url": "https://bugzilla.suse.com/1222866"
},
{
"category": "self",
"summary": "SUSE Bug 1223012",
"url": "https://bugzilla.suse.com/1223012"
},
{
"category": "self",
"summary": "SUSE Bug 1223778",
"url": "https://bugzilla.suse.com/1223778"
},
{
"category": "self",
"summary": "SUSE Bug 1223813",
"url": "https://bugzilla.suse.com/1223813"
},
{
"category": "self",
"summary": "SUSE Bug 1223815",
"url": "https://bugzilla.suse.com/1223815"
},
{
"category": "self",
"summary": "SUSE Bug 1224500",
"url": "https://bugzilla.suse.com/1224500"
},
{
"category": "self",
"summary": "SUSE Bug 1224512",
"url": "https://bugzilla.suse.com/1224512"
},
{
"category": "self",
"summary": "SUSE Bug 1224545",
"url": "https://bugzilla.suse.com/1224545"
},
{
"category": "self",
"summary": "SUSE Bug 1224557",
"url": "https://bugzilla.suse.com/1224557"
},
{
"category": "self",
"summary": "SUSE Bug 1224571",
"url": "https://bugzilla.suse.com/1224571"
},
{
"category": "self",
"summary": "SUSE Bug 1224576",
"url": "https://bugzilla.suse.com/1224576"
},
{
"category": "self",
"summary": "SUSE Bug 1224587",
"url": "https://bugzilla.suse.com/1224587"
},
{
"category": "self",
"summary": "SUSE Bug 1224637",
"url": "https://bugzilla.suse.com/1224637"
},
{
"category": "self",
"summary": "SUSE Bug 1224641",
"url": "https://bugzilla.suse.com/1224641"
},
{
"category": "self",
"summary": "SUSE Bug 1224663",
"url": "https://bugzilla.suse.com/1224663"
},
{
"category": "self",
"summary": "SUSE Bug 1224683",
"url": "https://bugzilla.suse.com/1224683"
},
{
"category": "self",
"summary": "SUSE Bug 1224699",
"url": "https://bugzilla.suse.com/1224699"
},
{
"category": "self",
"summary": "SUSE Bug 1224700",
"url": "https://bugzilla.suse.com/1224700"
},
{
"category": "self",
"summary": "SUSE Bug 1224975",
"url": "https://bugzilla.suse.com/1224975"
},
{
"category": "self",
"summary": "SUSE Bug 1225003",
"url": "https://bugzilla.suse.com/1225003"
},
{
"category": "self",
"summary": "SUSE Bug 1225214",
"url": "https://bugzilla.suse.com/1225214"
},
{
"category": "self",
"summary": "SUSE Bug 1225224",
"url": "https://bugzilla.suse.com/1225224"
},
{
"category": "self",
"summary": "SUSE Bug 1225229",
"url": "https://bugzilla.suse.com/1225229"
},
{
"category": "self",
"summary": "SUSE Bug 1225238",
"url": "https://bugzilla.suse.com/1225238"
},
{
"category": "self",
"summary": "SUSE Bug 1225241",
"url": "https://bugzilla.suse.com/1225241"
},
{
"category": "self",
"summary": "SUSE Bug 1225326",
"url": "https://bugzilla.suse.com/1225326"
},
{
"category": "self",
"summary": "SUSE Bug 1225328",
"url": "https://bugzilla.suse.com/1225328"
},
{
"category": "self",
"summary": "SUSE Bug 1225346",
"url": "https://bugzilla.suse.com/1225346"
},
{
"category": "self",
"summary": "SUSE Bug 1225361",
"url": "https://bugzilla.suse.com/1225361"
},
{
"category": "self",
"summary": "SUSE Bug 1225396",
"url": "https://bugzilla.suse.com/1225396"
},
{
"category": "self",
"summary": "SUSE Bug 1225427",
"url": "https://bugzilla.suse.com/1225427"
},
{
"category": "self",
"summary": "SUSE Bug 1225455",
"url": "https://bugzilla.suse.com/1225455"
},
{
"category": "self",
"summary": "SUSE Bug 1225711",
"url": "https://bugzilla.suse.com/1225711"
},
{
"category": "self",
"summary": "SUSE Bug 1225719",
"url": "https://bugzilla.suse.com/1225719"
},
{
"category": "self",
"summary": "SUSE Bug 1225767",
"url": "https://bugzilla.suse.com/1225767"
},
{
"category": "self",
"summary": "SUSE Bug 1225820",
"url": "https://bugzilla.suse.com/1225820"
},
{
"category": "self",
"summary": "SUSE Bug 1225838",
"url": "https://bugzilla.suse.com/1225838"
},
{
"category": "self",
"summary": "SUSE Bug 1225898",
"url": "https://bugzilla.suse.com/1225898"
},
{
"category": "self",
"summary": "SUSE Bug 1226550",
"url": "https://bugzilla.suse.com/1226550"
},
{
"category": "self",
"summary": "SUSE Bug 1226553",
"url": "https://bugzilla.suse.com/1226553"
},
{
"category": "self",
"summary": "SUSE Bug 1226555",
"url": "https://bugzilla.suse.com/1226555"
},
{
"category": "self",
"summary": "SUSE Bug 1226559",
"url": "https://bugzilla.suse.com/1226559"
},
{
"category": "self",
"summary": "SUSE Bug 1226568",
"url": "https://bugzilla.suse.com/1226568"
},
{
"category": "self",
"summary": "SUSE Bug 1226571",
"url": "https://bugzilla.suse.com/1226571"
},
{
"category": "self",
"summary": "SUSE Bug 1226645",
"url": "https://bugzilla.suse.com/1226645"
},
{
"category": "self",
"summary": "SUSE Bug 1226783",
"url": "https://bugzilla.suse.com/1226783"
},
{
"category": "self",
"summary": "SUSE Bug 1226786",
"url": "https://bugzilla.suse.com/1226786"
},
{
"category": "self",
"summary": "SUSE Bug 1226834",
"url": "https://bugzilla.suse.com/1226834"
},
{
"category": "self",
"summary": "SUSE Bug 1226908",
"url": "https://bugzilla.suse.com/1226908"
},
{
"category": "self",
"summary": "SUSE Bug 1227191",
"url": "https://bugzilla.suse.com/1227191"
},
{
"category": "self",
"summary": "SUSE Bug 1227213",
"url": "https://bugzilla.suse.com/1227213"
},
{
"category": "self",
"summary": "SUSE Bug 1227573",
"url": "https://bugzilla.suse.com/1227573"
},
{
"category": "self",
"summary": "SUSE Bug 1227618",
"url": "https://bugzilla.suse.com/1227618"
},
{
"category": "self",
"summary": "SUSE Bug 1227626",
"url": "https://bugzilla.suse.com/1227626"
},
{
"category": "self",
"summary": "SUSE Bug 1227716",
"url": "https://bugzilla.suse.com/1227716"
},
{
"category": "self",
"summary": "SUSE Bug 1227725",
"url": "https://bugzilla.suse.com/1227725"
},
{
"category": "self",
"summary": "SUSE Bug 1227729",
"url": "https://bugzilla.suse.com/1227729"
},
{
"category": "self",
"summary": "SUSE Bug 1227730",
"url": "https://bugzilla.suse.com/1227730"
},
{
"category": "self",
"summary": "SUSE Bug 1227733",
"url": "https://bugzilla.suse.com/1227733"
},
{
"category": "self",
"summary": "SUSE Bug 1227750",
"url": "https://bugzilla.suse.com/1227750"
},
{
"category": "self",
"summary": "SUSE Bug 1227754",
"url": "https://bugzilla.suse.com/1227754"
},
{
"category": "self",
"summary": "SUSE Bug 1227762",
"url": "https://bugzilla.suse.com/1227762"
},
{
"category": "self",
"summary": "SUSE Bug 1227770",
"url": "https://bugzilla.suse.com/1227770"
},
{
"category": "self",
"summary": "SUSE Bug 1227771",
"url": "https://bugzilla.suse.com/1227771"
},
{
"category": "self",
"summary": "SUSE Bug 1227772",
"url": "https://bugzilla.suse.com/1227772"
},
{
"category": "self",
"summary": "SUSE Bug 1227774",
"url": "https://bugzilla.suse.com/1227774"
},
{
"category": "self",
"summary": "SUSE Bug 1227786",
"url": "https://bugzilla.suse.com/1227786"
},
{
"category": "self",
"summary": "SUSE Bug 1227790",
"url": "https://bugzilla.suse.com/1227790"
},
{
"category": "self",
"summary": "SUSE Bug 1227806",
"url": "https://bugzilla.suse.com/1227806"
},
{
"category": "self",
"summary": "SUSE Bug 1227824",
"url": "https://bugzilla.suse.com/1227824"
},
{
"category": "self",
"summary": "SUSE Bug 1227828",
"url": "https://bugzilla.suse.com/1227828"
},
{
"category": "self",
"summary": "SUSE Bug 1227830",
"url": "https://bugzilla.suse.com/1227830"
},
{
"category": "self",
"summary": "SUSE Bug 1227836",
"url": "https://bugzilla.suse.com/1227836"
},
{
"category": "self",
"summary": "SUSE Bug 1227849",
"url": "https://bugzilla.suse.com/1227849"
},
{
"category": "self",
"summary": "SUSE Bug 1227865",
"url": "https://bugzilla.suse.com/1227865"
},
{
"category": "self",
"summary": "SUSE Bug 1227866",
"url": "https://bugzilla.suse.com/1227866"
},
{
"category": "self",
"summary": "SUSE Bug 1227884",
"url": "https://bugzilla.suse.com/1227884"
},
{
"category": "self",
"summary": "SUSE Bug 1227886",
"url": "https://bugzilla.suse.com/1227886"
},
{
"category": "self",
"summary": "SUSE Bug 1227891",
"url": "https://bugzilla.suse.com/1227891"
},
{
"category": "self",
"summary": "SUSE Bug 1227913",
"url": "https://bugzilla.suse.com/1227913"
},
{
"category": "self",
"summary": "SUSE Bug 1227924",
"url": "https://bugzilla.suse.com/1227924"
},
{
"category": "self",
"summary": "SUSE Bug 1227928",
"url": "https://bugzilla.suse.com/1227928"
},
{
"category": "self",
"summary": "SUSE Bug 1227929",
"url": "https://bugzilla.suse.com/1227929"
},
{
"category": "self",
"summary": "SUSE Bug 1227936",
"url": "https://bugzilla.suse.com/1227936"
},
{
"category": "self",
"summary": "SUSE Bug 1227957",
"url": "https://bugzilla.suse.com/1227957"
},
{
"category": "self",
"summary": "SUSE Bug 1227968",
"url": "https://bugzilla.suse.com/1227968"
},
{
"category": "self",
"summary": "SUSE Bug 1227969",
"url": "https://bugzilla.suse.com/1227969"
},
{
"category": "self",
"summary": "SUSE Bug 1227975",
"url": "https://bugzilla.suse.com/1227975"
},
{
"category": "self",
"summary": "SUSE Bug 1227985",
"url": "https://bugzilla.suse.com/1227985"
},
{
"category": "self",
"summary": "SUSE Bug 1227989",
"url": "https://bugzilla.suse.com/1227989"
},
{
"category": "self",
"summary": "SUSE Bug 1228003",
"url": "https://bugzilla.suse.com/1228003"
},
{
"category": "self",
"summary": "SUSE Bug 1228005",
"url": "https://bugzilla.suse.com/1228005"
},
{
"category": "self",
"summary": "SUSE Bug 1228008",
"url": "https://bugzilla.suse.com/1228008"
},
{
"category": "self",
"summary": "SUSE Bug 1228013",
"url": "https://bugzilla.suse.com/1228013"
},
{
"category": "self",
"summary": "SUSE Bug 1228025",
"url": "https://bugzilla.suse.com/1228025"
},
{
"category": "self",
"summary": "SUSE Bug 1228030",
"url": "https://bugzilla.suse.com/1228030"
},
{
"category": "self",
"summary": "SUSE Bug 1228037",
"url": "https://bugzilla.suse.com/1228037"
},
{
"category": "self",
"summary": "SUSE Bug 1228045",
"url": "https://bugzilla.suse.com/1228045"
},
{
"category": "self",
"summary": "SUSE Bug 1228054",
"url": "https://bugzilla.suse.com/1228054"
},
{
"category": "self",
"summary": "SUSE Bug 1228055",
"url": "https://bugzilla.suse.com/1228055"
},
{
"category": "self",
"summary": "SUSE Bug 1228063",
"url": "https://bugzilla.suse.com/1228063"
},
{
"category": "self",
"summary": "SUSE Bug 1228071",
"url": "https://bugzilla.suse.com/1228071"
},
{
"category": "self",
"summary": "SUSE Bug 1228235",
"url": "https://bugzilla.suse.com/1228235"
},
{
"category": "self",
"summary": "SUSE Bug 1228237",
"url": "https://bugzilla.suse.com/1228237"
},
{
"category": "self",
"summary": "SUSE Bug 1228327",
"url": "https://bugzilla.suse.com/1228327"
},
{
"category": "self",
"summary": "SUSE Bug 1228328",
"url": "https://bugzilla.suse.com/1228328"
},
{
"category": "self",
"summary": "SUSE Bug 1228408",
"url": "https://bugzilla.suse.com/1228408"
},
{
"category": "self",
"summary": "SUSE Bug 1228409",
"url": "https://bugzilla.suse.com/1228409"
},
{
"category": "self",
"summary": "SUSE Bug 1228410",
"url": "https://bugzilla.suse.com/1228410"
},
{
"category": "self",
"summary": "SUSE Bug 1228470",
"url": "https://bugzilla.suse.com/1228470"
},
{
"category": "self",
"summary": "SUSE Bug 1228530",
"url": "https://bugzilla.suse.com/1228530"
},
{
"category": "self",
"summary": "SUSE Bug 1228561",
"url": "https://bugzilla.suse.com/1228561"
},
{
"category": "self",
"summary": "SUSE Bug 1228565",
"url": "https://bugzilla.suse.com/1228565"
},
{
"category": "self",
"summary": "SUSE Bug 1228567",
"url": "https://bugzilla.suse.com/1228567"
},
{
"category": "self",
"summary": "SUSE Bug 1228580",
"url": "https://bugzilla.suse.com/1228580"
},
{
"category": "self",
"summary": "SUSE Bug 1228581",
"url": "https://bugzilla.suse.com/1228581"
},
{
"category": "self",
"summary": "SUSE Bug 1228584",
"url": "https://bugzilla.suse.com/1228584"
},
{
"category": "self",
"summary": "SUSE Bug 1228588",
"url": "https://bugzilla.suse.com/1228588"
},
{
"category": "self",
"summary": "SUSE Bug 1228599",
"url": "https://bugzilla.suse.com/1228599"
},
{
"category": "self",
"summary": "SUSE Bug 1228617",
"url": "https://bugzilla.suse.com/1228617"
},
{
"category": "self",
"summary": "SUSE Bug 1228625",
"url": "https://bugzilla.suse.com/1228625"
},
{
"category": "self",
"summary": "SUSE Bug 1228626",
"url": "https://bugzilla.suse.com/1228626"
},
{
"category": "self",
"summary": "SUSE Bug 1228633",
"url": "https://bugzilla.suse.com/1228633"
},
{
"category": "self",
"summary": "SUSE Bug 1228640",
"url": "https://bugzilla.suse.com/1228640"
},
{
"category": "self",
"summary": "SUSE Bug 1228655",
"url": "https://bugzilla.suse.com/1228655"
},
{
"category": "self",
"summary": "SUSE Bug 1228658",
"url": "https://bugzilla.suse.com/1228658"
},
{
"category": "self",
"summary": "SUSE Bug 1228662",
"url": "https://bugzilla.suse.com/1228662"
},
{
"category": "self",
"summary": "SUSE Bug 1228680",
"url": "https://bugzilla.suse.com/1228680"
},
{
"category": "self",
"summary": "SUSE Bug 1228705",
"url": "https://bugzilla.suse.com/1228705"
},
{
"category": "self",
"summary": "SUSE Bug 1228723",
"url": "https://bugzilla.suse.com/1228723"
},
{
"category": "self",
"summary": "SUSE Bug 1228726",
"url": "https://bugzilla.suse.com/1228726"
},
{
"category": "self",
"summary": "SUSE Bug 1228743",
"url": "https://bugzilla.suse.com/1228743"
},
{
"category": "self",
"summary": "SUSE Bug 1228850",
"url": "https://bugzilla.suse.com/1228850"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-26558 page",
"url": "https://www.suse.com/security/cve/CVE-2020-26558/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-0129 page",
"url": "https://www.suse.com/security/cve/CVE-2021-0129/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47191 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47191/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47194 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47194/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47197 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47197/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47219 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47219/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47295 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47295/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47388 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47388/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47395 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47395/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47399 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47399/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47403 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47403/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47405 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47405/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47438 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47438/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47441 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47441/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47468 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47468/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47501 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47501/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47516 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47516/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47542 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47542/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47559 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47559/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47580 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47580/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47582 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47582/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47588 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47588/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47597 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47597/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47599 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47599/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47606 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47606/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47619 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47619/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-20368 page",
"url": "https://www.suse.com/security/cve/CVE-2022-20368/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-28748 page",
"url": "https://www.suse.com/security/cve/CVE-2022-28748/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-2964 page",
"url": "https://www.suse.com/security/cve/CVE-2022-2964/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-48775 page",
"url": "https://www.suse.com/security/cve/CVE-2022-48775/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-48792 page",
"url": "https://www.suse.com/security/cve/CVE-2022-48792/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-48794 page",
"url": "https://www.suse.com/security/cve/CVE-2022-48794/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-48804 page",
"url": "https://www.suse.com/security/cve/CVE-2022-48804/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-48805 page",
"url": "https://www.suse.com/security/cve/CVE-2022-48805/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-48810 page",
"url": "https://www.suse.com/security/cve/CVE-2022-48810/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-48811 page",
"url": "https://www.suse.com/security/cve/CVE-2022-48811/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-48823 page",
"url": "https://www.suse.com/security/cve/CVE-2022-48823/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-48826 page",
"url": "https://www.suse.com/security/cve/CVE-2022-48826/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-48827 page",
"url": "https://www.suse.com/security/cve/CVE-2022-48827/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-48828 page",
"url": "https://www.suse.com/security/cve/CVE-2022-48828/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-48829 page",
"url": "https://www.suse.com/security/cve/CVE-2022-48829/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-48836 page",
"url": "https://www.suse.com/security/cve/CVE-2022-48836/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-48839 page",
"url": "https://www.suse.com/security/cve/CVE-2022-48839/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-48850 page",
"url": "https://www.suse.com/security/cve/CVE-2022-48850/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-48855 page",
"url": "https://www.suse.com/security/cve/CVE-2022-48855/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-48857 page",
"url": "https://www.suse.com/security/cve/CVE-2022-48857/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-48860 page",
"url": "https://www.suse.com/security/cve/CVE-2022-48860/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-48863 page",
"url": "https://www.suse.com/security/cve/CVE-2022-48863/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-52435 page",
"url": "https://www.suse.com/security/cve/CVE-2023-52435/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-52594 page",
"url": "https://www.suse.com/security/cve/CVE-2023-52594/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-52612 page",
"url": "https://www.suse.com/security/cve/CVE-2023-52612/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-52615 page",
"url": "https://www.suse.com/security/cve/CVE-2023-52615/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-52619 page",
"url": "https://www.suse.com/security/cve/CVE-2023-52619/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-52623 page",
"url": "https://www.suse.com/security/cve/CVE-2023-52623/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-52669 page",
"url": "https://www.suse.com/security/cve/CVE-2023-52669/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-52743 page",
"url": "https://www.suse.com/security/cve/CVE-2023-52743/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-52885 page",
"url": "https://www.suse.com/security/cve/CVE-2023-52885/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-26615 page",
"url": "https://www.suse.com/security/cve/CVE-2024-26615/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-26659 page",
"url": "https://www.suse.com/security/cve/CVE-2024-26659/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-26663 page",
"url": "https://www.suse.com/security/cve/CVE-2024-26663/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-26735 page",
"url": "https://www.suse.com/security/cve/CVE-2024-26735/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-26830 page",
"url": "https://www.suse.com/security/cve/CVE-2024-26830/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-26920 page",
"url": "https://www.suse.com/security/cve/CVE-2024-26920/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-26924 page",
"url": "https://www.suse.com/security/cve/CVE-2024-26924/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-27019 page",
"url": "https://www.suse.com/security/cve/CVE-2024-27019/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-27020 page",
"url": "https://www.suse.com/security/cve/CVE-2024-27020/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-27025 page",
"url": "https://www.suse.com/security/cve/CVE-2024-27025/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-27437 page",
"url": "https://www.suse.com/security/cve/CVE-2024-27437/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-35806 page",
"url": "https://www.suse.com/security/cve/CVE-2024-35806/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-35819 page",
"url": "https://www.suse.com/security/cve/CVE-2024-35819/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-35837 page",
"url": "https://www.suse.com/security/cve/CVE-2024-35837/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-35887 page",
"url": "https://www.suse.com/security/cve/CVE-2024-35887/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-35893 page",
"url": "https://www.suse.com/security/cve/CVE-2024-35893/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-35934 page",
"url": "https://www.suse.com/security/cve/CVE-2024-35934/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-35949 page",
"url": "https://www.suse.com/security/cve/CVE-2024-35949/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-35966 page",
"url": "https://www.suse.com/security/cve/CVE-2024-35966/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-35967 page",
"url": "https://www.suse.com/security/cve/CVE-2024-35967/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-35978 page",
"url": "https://www.suse.com/security/cve/CVE-2024-35978/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-35995 page",
"url": "https://www.suse.com/security/cve/CVE-2024-35995/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-36004 page",
"url": "https://www.suse.com/security/cve/CVE-2024-36004/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-36288 page",
"url": "https://www.suse.com/security/cve/CVE-2024-36288/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-36592 page",
"url": "https://www.suse.com/security/cve/CVE-2024-36592/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-36901 page",
"url": "https://www.suse.com/security/cve/CVE-2024-36901/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-36902 page",
"url": "https://www.suse.com/security/cve/CVE-2024-36902/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-36919 page",
"url": "https://www.suse.com/security/cve/CVE-2024-36919/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-36924 page",
"url": "https://www.suse.com/security/cve/CVE-2024-36924/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-36939 page",
"url": "https://www.suse.com/security/cve/CVE-2024-36939/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-36952 page",
"url": "https://www.suse.com/security/cve/CVE-2024-36952/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-38558 page",
"url": "https://www.suse.com/security/cve/CVE-2024-38558/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-38560 page",
"url": "https://www.suse.com/security/cve/CVE-2024-38560/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-38630 page",
"url": "https://www.suse.com/security/cve/CVE-2024-38630/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-39487 page",
"url": "https://www.suse.com/security/cve/CVE-2024-39487/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-39488 page",
"url": "https://www.suse.com/security/cve/CVE-2024-39488/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-39490 page",
"url": "https://www.suse.com/security/cve/CVE-2024-39490/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-39494 page",
"url": "https://www.suse.com/security/cve/CVE-2024-39494/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-39499 page",
"url": "https://www.suse.com/security/cve/CVE-2024-39499/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-39501 page",
"url": "https://www.suse.com/security/cve/CVE-2024-39501/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-39506 page",
"url": "https://www.suse.com/security/cve/CVE-2024-39506/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-39507 page",
"url": "https://www.suse.com/security/cve/CVE-2024-39507/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-39509 page",
"url": "https://www.suse.com/security/cve/CVE-2024-39509/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-40901 page",
"url": "https://www.suse.com/security/cve/CVE-2024-40901/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-40904 page",
"url": "https://www.suse.com/security/cve/CVE-2024-40904/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-40912 page",
"url": "https://www.suse.com/security/cve/CVE-2024-40912/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-40923 page",
"url": "https://www.suse.com/security/cve/CVE-2024-40923/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-40929 page",
"url": "https://www.suse.com/security/cve/CVE-2024-40929/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-40932 page",
"url": "https://www.suse.com/security/cve/CVE-2024-40932/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-40937 page",
"url": "https://www.suse.com/security/cve/CVE-2024-40937/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-40941 page",
"url": "https://www.suse.com/security/cve/CVE-2024-40941/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-40942 page",
"url": "https://www.suse.com/security/cve/CVE-2024-40942/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-40943 page",
"url": "https://www.suse.com/security/cve/CVE-2024-40943/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-40953 page",
"url": "https://www.suse.com/security/cve/CVE-2024-40953/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-40959 page",
"url": "https://www.suse.com/security/cve/CVE-2024-40959/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-40966 page",
"url": "https://www.suse.com/security/cve/CVE-2024-40966/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-40967 page",
"url": "https://www.suse.com/security/cve/CVE-2024-40967/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-40978 page",
"url": "https://www.suse.com/security/cve/CVE-2024-40978/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-40982 page",
"url": "https://www.suse.com/security/cve/CVE-2024-40982/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-40987 page",
"url": "https://www.suse.com/security/cve/CVE-2024-40987/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-40988 page",
"url": "https://www.suse.com/security/cve/CVE-2024-40988/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-40990 page",
"url": "https://www.suse.com/security/cve/CVE-2024-40990/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-40995 page",
"url": "https://www.suse.com/security/cve/CVE-2024-40995/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-40998 page",
"url": "https://www.suse.com/security/cve/CVE-2024-40998/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-40999 page",
"url": "https://www.suse.com/security/cve/CVE-2024-40999/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-41014 page",
"url": "https://www.suse.com/security/cve/CVE-2024-41014/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-41015 page",
"url": "https://www.suse.com/security/cve/CVE-2024-41015/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-41016 page",
"url": "https://www.suse.com/security/cve/CVE-2024-41016/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-41044 page",
"url": "https://www.suse.com/security/cve/CVE-2024-41044/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-41048 page",
"url": "https://www.suse.com/security/cve/CVE-2024-41048/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-41059 page",
"url": "https://www.suse.com/security/cve/CVE-2024-41059/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-41060 page",
"url": "https://www.suse.com/security/cve/CVE-2024-41060/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-41063 page",
"url": "https://www.suse.com/security/cve/CVE-2024-41063/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-41064 page",
"url": "https://www.suse.com/security/cve/CVE-2024-41064/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-41066 page",
"url": "https://www.suse.com/security/cve/CVE-2024-41066/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-41070 page",
"url": "https://www.suse.com/security/cve/CVE-2024-41070/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-41071 page",
"url": "https://www.suse.com/security/cve/CVE-2024-41071/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-41072 page",
"url": "https://www.suse.com/security/cve/CVE-2024-41072/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-41078 page",
"url": "https://www.suse.com/security/cve/CVE-2024-41078/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-41081 page",
"url": "https://www.suse.com/security/cve/CVE-2024-41081/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-41089 page",
"url": "https://www.suse.com/security/cve/CVE-2024-41089/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-41090 page",
"url": "https://www.suse.com/security/cve/CVE-2024-41090/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-41091 page",
"url": "https://www.suse.com/security/cve/CVE-2024-41091/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-41095 page",
"url": "https://www.suse.com/security/cve/CVE-2024-41095/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-42070 page",
"url": "https://www.suse.com/security/cve/CVE-2024-42070/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-42093 page",
"url": "https://www.suse.com/security/cve/CVE-2024-42093/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-42096 page",
"url": "https://www.suse.com/security/cve/CVE-2024-42096/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-42119 page",
"url": "https://www.suse.com/security/cve/CVE-2024-42119/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-42120 page",
"url": "https://www.suse.com/security/cve/CVE-2024-42120/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-42124 page",
"url": "https://www.suse.com/security/cve/CVE-2024-42124/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-42145 page",
"url": "https://www.suse.com/security/cve/CVE-2024-42145/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-42223 page",
"url": "https://www.suse.com/security/cve/CVE-2024-42223/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-42224 page",
"url": "https://www.suse.com/security/cve/CVE-2024-42224/"
}
],
"title": "Security update for the Linux Kernel",
"tracking": {
"current_release_date": "2024-08-16T09:14:50Z",
"generator": {
"date": "2024-08-16T09:14:50Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2024:2940-1",
"initial_release_date": "2024-08-16T09:14:50Z",
"revision_history": [
{
"date": "2024-08-16T09:14:50Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-4.12.14-122.225.1.aarch64",
"product": {
"name": "cluster-md-kmp-default-4.12.14-122.225.1.aarch64",
"product_id": "cluster-md-kmp-default-4.12.14-122.225.1.aarch64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-4.12.14-122.225.1.aarch64",
"product": {
"name": "dlm-kmp-default-4.12.14-122.225.1.aarch64",
"product_id": "dlm-kmp-default-4.12.14-122.225.1.aarch64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-4.12.14-122.225.1.aarch64",
"product": {
"name": "gfs2-kmp-default-4.12.14-122.225.1.aarch64",
"product_id": "gfs2-kmp-default-4.12.14-122.225.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-4.12.14-122.225.1.aarch64",
"product": {
"name": "kernel-default-4.12.14-122.225.1.aarch64",
"product_id": "kernel-default-4.12.14-122.225.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-4.12.14-122.225.1.aarch64",
"product": {
"name": "kernel-default-base-4.12.14-122.225.1.aarch64",
"product_id": "kernel-default-base-4.12.14-122.225.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-4.12.14-122.225.1.aarch64",
"product": {
"name": "kernel-default-devel-4.12.14-122.225.1.aarch64",
"product_id": "kernel-default-devel-4.12.14-122.225.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-4.12.14-122.225.1.aarch64",
"product": {
"name": "kernel-default-extra-4.12.14-122.225.1.aarch64",
"product_id": "kernel-default-extra-4.12.14-122.225.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-kgraft-4.12.14-122.225.1.aarch64",
"product": {
"name": "kernel-default-kgraft-4.12.14-122.225.1.aarch64",
"product_id": "kernel-default-kgraft-4.12.14-122.225.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-kgraft-devel-4.12.14-122.225.1.aarch64",
"product": {
"name": "kernel-default-kgraft-devel-4.12.14-122.225.1.aarch64",
"product_id": "kernel-default-kgraft-devel-4.12.14-122.225.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-4.12.14-122.225.1.aarch64",
"product": {
"name": "kernel-obs-build-4.12.14-122.225.1.aarch64",
"product_id": "kernel-obs-build-4.12.14-122.225.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-4.12.14-122.225.1.aarch64",
"product": {
"name": "kernel-obs-qa-4.12.14-122.225.1.aarch64",
"product_id": "kernel-obs-qa-4.12.14-122.225.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-syms-4.12.14-122.225.1.aarch64",
"product": {
"name": "kernel-syms-4.12.14-122.225.1.aarch64",
"product_id": "kernel-syms-4.12.14-122.225.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-4.12.14-122.225.1.aarch64",
"product": {
"name": "kernel-vanilla-4.12.14-122.225.1.aarch64",
"product_id": "kernel-vanilla-4.12.14-122.225.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-base-4.12.14-122.225.1.aarch64",
"product": {
"name": "kernel-vanilla-base-4.12.14-122.225.1.aarch64",
"product_id": "kernel-vanilla-base-4.12.14-122.225.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-devel-4.12.14-122.225.1.aarch64",
"product": {
"name": "kernel-vanilla-devel-4.12.14-122.225.1.aarch64",
"product_id": "kernel-vanilla-devel-4.12.14-122.225.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-kgraft-devel-4.12.14-122.225.1.aarch64",
"product": {
"name": "kernel-vanilla-kgraft-devel-4.12.14-122.225.1.aarch64",
"product_id": "kernel-vanilla-kgraft-devel-4.12.14-122.225.1.aarch64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-4.12.14-122.225.1.aarch64",
"product": {
"name": "kselftests-kmp-default-4.12.14-122.225.1.aarch64",
"product_id": "kselftests-kmp-default-4.12.14-122.225.1.aarch64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-4.12.14-122.225.1.aarch64",
"product": {
"name": "ocfs2-kmp-default-4.12.14-122.225.1.aarch64",
"product_id": "ocfs2-kmp-default-4.12.14-122.225.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-devel-4.12.14-122.225.1.noarch",
"product": {
"name": "kernel-devel-4.12.14-122.225.1.noarch",
"product_id": "kernel-devel-4.12.14-122.225.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-docs-4.12.14-122.225.2.noarch",
"product": {
"name": "kernel-docs-4.12.14-122.225.2.noarch",
"product_id": "kernel-docs-4.12.14-122.225.2.noarch"
}
},
{
"category": "product_version",
"name": "kernel-docs-html-4.12.14-122.225.2.noarch",
"product": {
"name": "kernel-docs-html-4.12.14-122.225.2.noarch",
"product_id": "kernel-docs-html-4.12.14-122.225.2.noarch"
}
},
{
"category": "product_version",
"name": "kernel-macros-4.12.14-122.225.1.noarch",
"product": {
"name": "kernel-macros-4.12.14-122.225.1.noarch",
"product_id": "kernel-macros-4.12.14-122.225.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-4.12.14-122.225.1.noarch",
"product": {
"name": "kernel-source-4.12.14-122.225.1.noarch",
"product_id": "kernel-source-4.12.14-122.225.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-vanilla-4.12.14-122.225.1.noarch",
"product": {
"name": "kernel-source-vanilla-4.12.14-122.225.1.noarch",
"product_id": "kernel-source-vanilla-4.12.14-122.225.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"product": {
"name": "cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"product_id": "cluster-md-kmp-default-4.12.14-122.225.1.ppc64le"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"product": {
"name": "dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"product_id": "dlm-kmp-default-4.12.14-122.225.1.ppc64le"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"product": {
"name": "gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"product_id": "gfs2-kmp-default-4.12.14-122.225.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-4.12.14-122.225.1.ppc64le",
"product": {
"name": "kernel-debug-4.12.14-122.225.1.ppc64le",
"product_id": "kernel-debug-4.12.14-122.225.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-base-4.12.14-122.225.1.ppc64le",
"product": {
"name": "kernel-debug-base-4.12.14-122.225.1.ppc64le",
"product_id": "kernel-debug-base-4.12.14-122.225.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-4.12.14-122.225.1.ppc64le",
"product": {
"name": "kernel-debug-devel-4.12.14-122.225.1.ppc64le",
"product_id": "kernel-debug-devel-4.12.14-122.225.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-kgraft-devel-4.12.14-122.225.1.ppc64le",
"product": {
"name": "kernel-debug-kgraft-devel-4.12.14-122.225.1.ppc64le",
"product_id": "kernel-debug-kgraft-devel-4.12.14-122.225.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-4.12.14-122.225.1.ppc64le",
"product": {
"name": "kernel-default-4.12.14-122.225.1.ppc64le",
"product_id": "kernel-default-4.12.14-122.225.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-base-4.12.14-122.225.1.ppc64le",
"product": {
"name": "kernel-default-base-4.12.14-122.225.1.ppc64le",
"product_id": "kernel-default-base-4.12.14-122.225.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-4.12.14-122.225.1.ppc64le",
"product": {
"name": "kernel-default-devel-4.12.14-122.225.1.ppc64le",
"product_id": "kernel-default-devel-4.12.14-122.225.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-4.12.14-122.225.1.ppc64le",
"product": {
"name": "kernel-default-extra-4.12.14-122.225.1.ppc64le",
"product_id": "kernel-default-extra-4.12.14-122.225.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"product": {
"name": "kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"product_id": "kernel-default-kgraft-4.12.14-122.225.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"product": {
"name": "kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"product_id": "kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-4.12.14-122.225.1.ppc64le",
"product": {
"name": "kernel-obs-build-4.12.14-122.225.1.ppc64le",
"product_id": "kernel-obs-build-4.12.14-122.225.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-4.12.14-122.225.1.ppc64le",
"product": {
"name": "kernel-obs-qa-4.12.14-122.225.1.ppc64le",
"product_id": "kernel-obs-qa-4.12.14-122.225.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-syms-4.12.14-122.225.1.ppc64le",
"product": {
"name": "kernel-syms-4.12.14-122.225.1.ppc64le",
"product_id": "kernel-syms-4.12.14-122.225.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-4.12.14-122.225.1.ppc64le",
"product": {
"name": "kernel-vanilla-4.12.14-122.225.1.ppc64le",
"product_id": "kernel-vanilla-4.12.14-122.225.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-base-4.12.14-122.225.1.ppc64le",
"product": {
"name": "kernel-vanilla-base-4.12.14-122.225.1.ppc64le",
"product_id": "kernel-vanilla-base-4.12.14-122.225.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-devel-4.12.14-122.225.1.ppc64le",
"product": {
"name": "kernel-vanilla-devel-4.12.14-122.225.1.ppc64le",
"product_id": "kernel-vanilla-devel-4.12.14-122.225.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-kgraft-devel-4.12.14-122.225.1.ppc64le",
"product": {
"name": "kernel-vanilla-kgraft-devel-4.12.14-122.225.1.ppc64le",
"product_id": "kernel-vanilla-kgraft-devel-4.12.14-122.225.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"product": {
"name": "kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"product_id": "kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-4.12.14-122.225.1.ppc64le",
"product": {
"name": "kselftests-kmp-default-4.12.14-122.225.1.ppc64le",
"product_id": "kselftests-kmp-default-4.12.14-122.225.1.ppc64le"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"product": {
"name": "ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"product_id": "ocfs2-kmp-default-4.12.14-122.225.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"product": {
"name": "cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"product_id": "cluster-md-kmp-default-4.12.14-122.225.1.s390x"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-4.12.14-122.225.1.s390x",
"product": {
"name": "dlm-kmp-default-4.12.14-122.225.1.s390x",
"product_id": "dlm-kmp-default-4.12.14-122.225.1.s390x"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-4.12.14-122.225.1.s390x",
"product": {
"name": "gfs2-kmp-default-4.12.14-122.225.1.s390x",
"product_id": "gfs2-kmp-default-4.12.14-122.225.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-4.12.14-122.225.1.s390x",
"product": {
"name": "kernel-default-4.12.14-122.225.1.s390x",
"product_id": "kernel-default-4.12.14-122.225.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-base-4.12.14-122.225.1.s390x",
"product": {
"name": "kernel-default-base-4.12.14-122.225.1.s390x",
"product_id": "kernel-default-base-4.12.14-122.225.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-4.12.14-122.225.1.s390x",
"product": {
"name": "kernel-default-devel-4.12.14-122.225.1.s390x",
"product_id": "kernel-default-devel-4.12.14-122.225.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-4.12.14-122.225.1.s390x",
"product": {
"name": "kernel-default-extra-4.12.14-122.225.1.s390x",
"product_id": "kernel-default-extra-4.12.14-122.225.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-kgraft-4.12.14-122.225.1.s390x",
"product": {
"name": "kernel-default-kgraft-4.12.14-122.225.1.s390x",
"product_id": "kernel-default-kgraft-4.12.14-122.225.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"product": {
"name": "kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"product_id": "kernel-default-kgraft-devel-4.12.14-122.225.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-man-4.12.14-122.225.1.s390x",
"product": {
"name": "kernel-default-man-4.12.14-122.225.1.s390x",
"product_id": "kernel-default-man-4.12.14-122.225.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-4.12.14-122.225.1.s390x",
"product": {
"name": "kernel-obs-build-4.12.14-122.225.1.s390x",
"product_id": "kernel-obs-build-4.12.14-122.225.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-4.12.14-122.225.1.s390x",
"product": {
"name": "kernel-obs-qa-4.12.14-122.225.1.s390x",
"product_id": "kernel-obs-qa-4.12.14-122.225.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-syms-4.12.14-122.225.1.s390x",
"product": {
"name": "kernel-syms-4.12.14-122.225.1.s390x",
"product_id": "kernel-syms-4.12.14-122.225.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-4.12.14-122.225.1.s390x",
"product": {
"name": "kernel-vanilla-4.12.14-122.225.1.s390x",
"product_id": "kernel-vanilla-4.12.14-122.225.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-base-4.12.14-122.225.1.s390x",
"product": {
"name": "kernel-vanilla-base-4.12.14-122.225.1.s390x",
"product_id": "kernel-vanilla-base-4.12.14-122.225.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-devel-4.12.14-122.225.1.s390x",
"product": {
"name": "kernel-vanilla-devel-4.12.14-122.225.1.s390x",
"product_id": "kernel-vanilla-devel-4.12.14-122.225.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-kgraft-devel-4.12.14-122.225.1.s390x",
"product": {
"name": "kernel-vanilla-kgraft-devel-4.12.14-122.225.1.s390x",
"product_id": "kernel-vanilla-kgraft-devel-4.12.14-122.225.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-4.12.14-122.225.1.s390x",
"product": {
"name": "kernel-zfcpdump-4.12.14-122.225.1.s390x",
"product_id": "kernel-zfcpdump-4.12.14-122.225.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-man-4.12.14-122.225.1.s390x",
"product": {
"name": "kernel-zfcpdump-man-4.12.14-122.225.1.s390x",
"product_id": "kernel-zfcpdump-man-4.12.14-122.225.1.s390x"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"product": {
"name": "kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"product_id": "kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-4.12.14-122.225.1.s390x",
"product": {
"name": "kselftests-kmp-default-4.12.14-122.225.1.s390x",
"product_id": "kselftests-kmp-default-4.12.14-122.225.1.s390x"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"product": {
"name": "ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"product_id": "ocfs2-kmp-default-4.12.14-122.225.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"product": {
"name": "cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"product_id": "cluster-md-kmp-default-4.12.14-122.225.1.x86_64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-4.12.14-122.225.1.x86_64",
"product": {
"name": "dlm-kmp-default-4.12.14-122.225.1.x86_64",
"product_id": "dlm-kmp-default-4.12.14-122.225.1.x86_64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"product": {
"name": "gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"product_id": "gfs2-kmp-default-4.12.14-122.225.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-4.12.14-122.225.1.x86_64",
"product": {
"name": "kernel-debug-4.12.14-122.225.1.x86_64",
"product_id": "kernel-debug-4.12.14-122.225.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-base-4.12.14-122.225.1.x86_64",
"product": {
"name": "kernel-debug-base-4.12.14-122.225.1.x86_64",
"product_id": "kernel-debug-base-4.12.14-122.225.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-4.12.14-122.225.1.x86_64",
"product": {
"name": "kernel-debug-devel-4.12.14-122.225.1.x86_64",
"product_id": "kernel-debug-devel-4.12.14-122.225.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-kgraft-devel-4.12.14-122.225.1.x86_64",
"product": {
"name": "kernel-debug-kgraft-devel-4.12.14-122.225.1.x86_64",
"product_id": "kernel-debug-kgraft-devel-4.12.14-122.225.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-4.12.14-122.225.1.x86_64",
"product": {
"name": "kernel-default-4.12.14-122.225.1.x86_64",
"product_id": "kernel-default-4.12.14-122.225.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-4.12.14-122.225.1.x86_64",
"product": {
"name": "kernel-default-base-4.12.14-122.225.1.x86_64",
"product_id": "kernel-default-base-4.12.14-122.225.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-4.12.14-122.225.1.x86_64",
"product": {
"name": "kernel-default-devel-4.12.14-122.225.1.x86_64",
"product_id": "kernel-default-devel-4.12.14-122.225.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-4.12.14-122.225.1.x86_64",
"product": {
"name": "kernel-default-extra-4.12.14-122.225.1.x86_64",
"product_id": "kernel-default-extra-4.12.14-122.225.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"product": {
"name": "kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"product_id": "kernel-default-kgraft-4.12.14-122.225.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"product": {
"name": "kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"product_id": "kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-4.12.14-122.225.1.x86_64",
"product": {
"name": "kernel-kvmsmall-4.12.14-122.225.1.x86_64",
"product_id": "kernel-kvmsmall-4.12.14-122.225.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-base-4.12.14-122.225.1.x86_64",
"product": {
"name": "kernel-kvmsmall-base-4.12.14-122.225.1.x86_64",
"product_id": "kernel-kvmsmall-base-4.12.14-122.225.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-devel-4.12.14-122.225.1.x86_64",
"product": {
"name": "kernel-kvmsmall-devel-4.12.14-122.225.1.x86_64",
"product_id": "kernel-kvmsmall-devel-4.12.14-122.225.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-kgraft-devel-4.12.14-122.225.1.x86_64",
"product": {
"name": "kernel-kvmsmall-kgraft-devel-4.12.14-122.225.1.x86_64",
"product_id": "kernel-kvmsmall-kgraft-devel-4.12.14-122.225.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-4.12.14-122.225.1.x86_64",
"product": {
"name": "kernel-obs-build-4.12.14-122.225.1.x86_64",
"product_id": "kernel-obs-build-4.12.14-122.225.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-4.12.14-122.225.1.x86_64",
"product": {
"name": "kernel-obs-qa-4.12.14-122.225.1.x86_64",
"product_id": "kernel-obs-qa-4.12.14-122.225.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-syms-4.12.14-122.225.1.x86_64",
"product": {
"name": "kernel-syms-4.12.14-122.225.1.x86_64",
"product_id": "kernel-syms-4.12.14-122.225.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-4.12.14-122.225.1.x86_64",
"product": {
"name": "kernel-vanilla-4.12.14-122.225.1.x86_64",
"product_id": "kernel-vanilla-4.12.14-122.225.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-base-4.12.14-122.225.1.x86_64",
"product": {
"name": "kernel-vanilla-base-4.12.14-122.225.1.x86_64",
"product_id": "kernel-vanilla-base-4.12.14-122.225.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-devel-4.12.14-122.225.1.x86_64",
"product": {
"name": "kernel-vanilla-devel-4.12.14-122.225.1.x86_64",
"product_id": "kernel-vanilla-devel-4.12.14-122.225.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-kgraft-devel-4.12.14-122.225.1.x86_64",
"product": {
"name": "kernel-vanilla-kgraft-devel-4.12.14-122.225.1.x86_64",
"product_id": "kernel-vanilla-kgraft-devel-4.12.14-122.225.1.x86_64"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"product": {
"name": "kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"product_id": "kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-4.12.14-122.225.1.x86_64",
"product": {
"name": "kselftests-kmp-default-4.12.14-122.225.1.x86_64",
"product_id": "kselftests-kmp-default-4.12.14-122.225.1.x86_64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"product": {
"name": "ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"product_id": "ocfs2-kmp-default-4.12.14-122.225.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Availability Extension 12 SP5",
"product": {
"name": "SUSE Linux Enterprise High Availability Extension 12 SP5",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-ha:12:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 12 SP5",
"product": {
"name": "SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-live-patching:12:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Software Development Kit 12 SP5",
"product": {
"name": "SUSE Linux Enterprise Software Development Kit 12 SP5",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-sdk:12:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 12 SP5",
"product": {
"name": "SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles:12:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:12:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Workstation Extension 12 SP5",
"product": {
"name": "SUSE Linux Enterprise Workstation Extension 12 SP5",
"product_id": "SUSE Linux Enterprise Workstation Extension 12 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-we:12:sp5"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-4.12.14-122.225.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP5",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le"
},
"product_reference": "cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-4.12.14-122.225.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP5",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x"
},
"product_reference": "cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-4.12.14-122.225.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP5",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64"
},
"product_reference": "cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-4.12.14-122.225.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP5",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le"
},
"product_reference": "dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-4.12.14-122.225.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP5",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x"
},
"product_reference": "dlm-kmp-default-4.12.14-122.225.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-4.12.14-122.225.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP5",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64"
},
"product_reference": "dlm-kmp-default-4.12.14-122.225.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-4.12.14-122.225.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP5",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le"
},
"product_reference": "gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-4.12.14-122.225.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP5",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x"
},
"product_reference": "gfs2-kmp-default-4.12.14-122.225.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-4.12.14-122.225.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP5",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64"
},
"product_reference": "gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-4.12.14-122.225.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP5",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le"
},
"product_reference": "ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-4.12.14-122.225.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP5",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x"
},
"product_reference": "ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-4.12.14-122.225.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP5",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64"
},
"product_reference": "ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-kgraft-4.12.14-122.225.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le"
},
"product_reference": "kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-kgraft-4.12.14-122.225.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x"
},
"product_reference": "kernel-default-kgraft-4.12.14-122.225.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-kgraft-4.12.14-122.225.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64"
},
"product_reference": "kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le"
},
"product_reference": "kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-kgraft-devel-4.12.14-122.225.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x"
},
"product_reference": "kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64"
},
"product_reference": "kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-docs-4.12.14-122.225.2.noarch as component of SUSE Linux Enterprise Software Development Kit 12 SP5",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch"
},
"product_reference": "kernel-docs-4.12.14-122.225.2.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.12.14-122.225.1.aarch64 as component of SUSE Linux Enterprise Software Development Kit 12 SP5",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64"
},
"product_reference": "kernel-obs-build-4.12.14-122.225.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.12.14-122.225.1.ppc64le as component of SUSE Linux Enterprise Software Development Kit 12 SP5",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le"
},
"product_reference": "kernel-obs-build-4.12.14-122.225.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.12.14-122.225.1.s390x as component of SUSE Linux Enterprise Software Development Kit 12 SP5",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x"
},
"product_reference": "kernel-obs-build-4.12.14-122.225.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.12.14-122.225.1.x86_64 as component of SUSE Linux Enterprise Software Development Kit 12 SP5",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64"
},
"product_reference": "kernel-obs-build-4.12.14-122.225.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-122.225.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64"
},
"product_reference": "kernel-default-4.12.14-122.225.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-122.225.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le"
},
"product_reference": "kernel-default-4.12.14-122.225.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-122.225.1.s390x as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x"
},
"product_reference": "kernel-default-4.12.14-122.225.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-122.225.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64"
},
"product_reference": "kernel-default-4.12.14-122.225.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-122.225.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64"
},
"product_reference": "kernel-default-base-4.12.14-122.225.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-122.225.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le"
},
"product_reference": "kernel-default-base-4.12.14-122.225.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-122.225.1.s390x as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x"
},
"product_reference": "kernel-default-base-4.12.14-122.225.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-122.225.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64"
},
"product_reference": "kernel-default-base-4.12.14-122.225.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-122.225.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64"
},
"product_reference": "kernel-default-devel-4.12.14-122.225.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-122.225.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le"
},
"product_reference": "kernel-default-devel-4.12.14-122.225.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-122.225.1.s390x as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x"
},
"product_reference": "kernel-default-devel-4.12.14-122.225.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-122.225.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64"
},
"product_reference": "kernel-default-devel-4.12.14-122.225.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-man-4.12.14-122.225.1.s390x as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x"
},
"product_reference": "kernel-default-man-4.12.14-122.225.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-4.12.14-122.225.1.noarch as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch"
},
"product_reference": "kernel-devel-4.12.14-122.225.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-4.12.14-122.225.1.noarch as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch"
},
"product_reference": "kernel-macros-4.12.14-122.225.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-4.12.14-122.225.1.noarch as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch"
},
"product_reference": "kernel-source-4.12.14-122.225.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-122.225.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64"
},
"product_reference": "kernel-syms-4.12.14-122.225.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-122.225.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le"
},
"product_reference": "kernel-syms-4.12.14-122.225.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-122.225.1.s390x as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x"
},
"product_reference": "kernel-syms-4.12.14-122.225.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-122.225.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64"
},
"product_reference": "kernel-syms-4.12.14-122.225.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-122.225.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64"
},
"product_reference": "kernel-default-4.12.14-122.225.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-122.225.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le"
},
"product_reference": "kernel-default-4.12.14-122.225.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-122.225.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x"
},
"product_reference": "kernel-default-4.12.14-122.225.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-122.225.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64"
},
"product_reference": "kernel-default-4.12.14-122.225.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-122.225.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64"
},
"product_reference": "kernel-default-base-4.12.14-122.225.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-122.225.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le"
},
"product_reference": "kernel-default-base-4.12.14-122.225.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-122.225.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x"
},
"product_reference": "kernel-default-base-4.12.14-122.225.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-122.225.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64"
},
"product_reference": "kernel-default-base-4.12.14-122.225.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-122.225.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64"
},
"product_reference": "kernel-default-devel-4.12.14-122.225.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-122.225.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le"
},
"product_reference": "kernel-default-devel-4.12.14-122.225.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-122.225.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x"
},
"product_reference": "kernel-default-devel-4.12.14-122.225.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-122.225.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64"
},
"product_reference": "kernel-default-devel-4.12.14-122.225.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-man-4.12.14-122.225.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x"
},
"product_reference": "kernel-default-man-4.12.14-122.225.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-4.12.14-122.225.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch"
},
"product_reference": "kernel-devel-4.12.14-122.225.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-4.12.14-122.225.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch"
},
"product_reference": "kernel-macros-4.12.14-122.225.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-4.12.14-122.225.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch"
},
"product_reference": "kernel-source-4.12.14-122.225.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-122.225.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64"
},
"product_reference": "kernel-syms-4.12.14-122.225.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-122.225.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le"
},
"product_reference": "kernel-syms-4.12.14-122.225.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-122.225.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x"
},
"product_reference": "kernel-syms-4.12.14-122.225.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-122.225.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64"
},
"product_reference": "kernel-syms-4.12.14-122.225.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-extra-4.12.14-122.225.1.x86_64 as component of SUSE Linux Enterprise Workstation Extension 12 SP5",
"product_id": "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
},
"product_reference": "kernel-default-extra-4.12.14-122.225.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Workstation Extension 12 SP5"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2020-26558",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-26558"
}
],
"notes": [
{
"category": "general",
"text": "Bluetooth LE and BR/EDR secure pairing in Bluetooth Core Specification 2.1 through 5.2 may permit a nearby man-in-the-middle attacker to identify the Passkey used during pairing (in the Passkey authentication procedure) by reflection of the public key and the authentication evidence of the initiating device, potentially permitting this attacker to complete authenticated pairing with the responding device using the correct Passkey for the pairing session. The attack methodology determines the Passkey value one bit at a time.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-26558",
"url": "https://www.suse.com/security/cve/CVE-2020-26558"
},
{
"category": "external",
"summary": "SUSE Bug 1179610 for CVE-2020-26558",
"url": "https://bugzilla.suse.com/1179610"
},
{
"category": "external",
"summary": "SUSE Bug 1186463 for CVE-2020-26558",
"url": "https://bugzilla.suse.com/1186463"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-16T09:14:50Z",
"details": "moderate"
}
],
"title": "CVE-2020-26558"
},
{
"cve": "CVE-2021-0129",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-0129"
}
],
"notes": [
{
"category": "general",
"text": "Improper access control in BlueZ may allow an authenticated user to potentially enable information disclosure via adjacent access.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-0129",
"url": "https://www.suse.com/security/cve/CVE-2021-0129"
},
{
"category": "external",
"summary": "SUSE Bug 1186463 for CVE-2021-0129",
"url": "https://bugzilla.suse.com/1186463"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-16T09:14:50Z",
"details": "moderate"
}
],
"title": "CVE-2021-0129"
},
{
"cve": "CVE-2021-47191",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47191"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: scsi_debug: Fix out-of-bound read in resp_readcap16()\n\nThe following warning was observed running syzkaller:\n\n[ 3813.830724] sg_write: data in/out 65466/242 bytes for SCSI command 0x9e-- guessing data in;\n[ 3813.830724] program syz-executor not setting count and/or reply_len properly\n[ 3813.836956] ==================================================================\n[ 3813.839465] BUG: KASAN: stack-out-of-bounds in sg_copy_buffer+0x157/0x1e0\n[ 3813.841773] Read of size 4096 at addr ffff8883cf80f540 by task syz-executor/1549\n[ 3813.846612] Call Trace:\n[ 3813.846995] dump_stack+0x108/0x15f\n[ 3813.847524] print_address_description+0xa5/0x372\n[ 3813.848243] kasan_report.cold+0x236/0x2a8\n[ 3813.849439] check_memory_region+0x240/0x270\n[ 3813.850094] memcpy+0x30/0x80\n[ 3813.850553] sg_copy_buffer+0x157/0x1e0\n[ 3813.853032] sg_copy_from_buffer+0x13/0x20\n[ 3813.853660] fill_from_dev_buffer+0x135/0x370\n[ 3813.854329] resp_readcap16+0x1ac/0x280\n[ 3813.856917] schedule_resp+0x41f/0x1630\n[ 3813.858203] scsi_debug_queuecommand+0xb32/0x17e0\n[ 3813.862699] scsi_dispatch_cmd+0x330/0x950\n[ 3813.863329] scsi_request_fn+0xd8e/0x1710\n[ 3813.863946] __blk_run_queue+0x10b/0x230\n[ 3813.864544] blk_execute_rq_nowait+0x1d8/0x400\n[ 3813.865220] sg_common_write.isra.0+0xe61/0x2420\n[ 3813.871637] sg_write+0x6c8/0xef0\n[ 3813.878853] __vfs_write+0xe4/0x800\n[ 3813.883487] vfs_write+0x17b/0x530\n[ 3813.884008] ksys_write+0x103/0x270\n[ 3813.886268] __x64_sys_write+0x77/0xc0\n[ 3813.886841] do_syscall_64+0x106/0x360\n[ 3813.887415] entry_SYSCALL_64_after_hwframe+0x44/0xa9\n\nThis issue can be reproduced with the following syzkaller log:\n\nr0 = openat(0xffffffffffffff9c, \u0026(0x7f0000000040)=\u0027./file0\\x00\u0027, 0x26e1, 0x0)\nr1 = syz_open_procfs(0xffffffffffffffff, \u0026(0x7f0000000000)=\u0027fd/3\\x00\u0027)\nopen_by_handle_at(r1, \u0026(0x7f00000003c0)=ANY=[@ANYRESHEX], 0x602000)\nr2 = syz_open_dev$sg(\u0026(0x7f0000000000), 0x0, 0x40782)\nwrite$binfmt_aout(r2, \u0026(0x7f0000000340)=ANY=[@ANYBLOB=\"00000000deff000000000000000000000000000000000000000000000000000047f007af9e107a41ec395f1bded7be24277a1501ff6196a83366f4e6362bc0ff2b247f68a972989b094b2da4fb3607fcf611a22dd04310d28c75039d\"], 0x126)\n\nIn resp_readcap16() we get \"int alloc_len\" value -1104926854, and then pass\nthe huge arr_len to fill_from_dev_buffer(), but arr is only 32 bytes. This\nleads to OOB in sg_copy_buffer().\n\nTo solve this issue, define alloc_len as u32.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47191",
"url": "https://www.suse.com/security/cve/CVE-2021-47191"
},
{
"category": "external",
"summary": "SUSE Bug 1222866 for CVE-2021-47191",
"url": "https://bugzilla.suse.com/1222866"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-16T09:14:50Z",
"details": "moderate"
}
],
"title": "CVE-2021-47191"
},
{
"cve": "CVE-2021-47194",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47194"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncfg80211: call cfg80211_stop_ap when switch from P2P_GO type\n\nIf the userspace tools switch from NL80211_IFTYPE_P2P_GO to\nNL80211_IFTYPE_ADHOC via send_msg(NL80211_CMD_SET_INTERFACE), it\ndoes not call the cleanup cfg80211_stop_ap(), this leads to the\ninitialization of in-use data. For example, this path re-init the\nsdata-\u003eassigned_chanctx_list while it is still an element of\nassigned_vifs list, and makes that linked list corrupt.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47194",
"url": "https://www.suse.com/security/cve/CVE-2021-47194"
},
{
"category": "external",
"summary": "SUSE Bug 1222829 for CVE-2021-47194",
"url": "https://bugzilla.suse.com/1222829"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-16T09:14:50Z",
"details": "moderate"
}
],
"title": "CVE-2021-47194"
},
{
"cve": "CVE-2021-47197",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47197"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/mlx5e: nullify cq-\u003edbg pointer in mlx5_debug_cq_remove()\n\nPrior to this patch in case mlx5_core_destroy_cq() failed it proceeds\nto rest of destroy operations. mlx5_core_destroy_cq() could be called again\nby user and cause additional call of mlx5_debug_cq_remove().\ncq-\u003edbg was not nullify in previous call and cause the crash.\n\nFix it by nullify cq-\u003edbg pointer after removal.\n\nAlso proceed to destroy operations only if FW return 0\nfor MLX5_CMD_OP_DESTROY_CQ command.\n\ngeneral protection fault, probably for non-canonical address 0x2000300004058: 0000 [#1] SMP PTI\nCPU: 5 PID: 1228 Comm: python Not tainted 5.15.0-rc5_for_upstream_min_debug_2021_10_14_11_06 #1\nHardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS rel-1.13.0-0-gf21b5a4aeb02-prebuilt.qemu.org 04/01/2014\nRIP: 0010:lockref_get+0x1/0x60\nCode: 5d e9 53 ff ff ff 48 8d 7f 70 e8 0a 2e 48 00 c7 85 d0 00 00 00 02\n00 00 00 c6 45 70 00 fb 5d c3 c3 cc cc cc cc cc cc cc cc 53 \u003c48\u003e 8b 17\n48 89 fb 85 d2 75 3d 48 89 d0 bf 64 00 00 00 48 89 c1 48\nRSP: 0018:ffff888137dd7a38 EFLAGS: 00010206\nRAX: 0000000000000000 RBX: ffff888107d5f458 RCX: 00000000fffffffe\nRDX: 000000000002c2b0 RSI: ffffffff8155e2e0 RDI: 0002000300004058\nRBP: ffff888137dd7a88 R08: 0002000300004058 R09: ffff8881144a9f88\nR10: 0000000000000000 R11: 0000000000000000 R12: ffff8881141d4000\nR13: ffff888137dd7c68 R14: ffff888137dd7d58 R15: ffff888137dd7cc0\nFS: 00007f4644f2a4c0(0000) GS:ffff8887a2d40000(0000)\nknlGS:0000000000000000\nCS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 000055b4500f4380 CR3: 0000000114f7a003 CR4: 0000000000170ea0\nCall Trace:\n simple_recursive_removal+0x33/0x2e0\n ? debugfs_remove+0x60/0x60\n debugfs_remove+0x40/0x60\n mlx5_debug_cq_remove+0x32/0x70 [mlx5_core]\n mlx5_core_destroy_cq+0x41/0x1d0 [mlx5_core]\n devx_obj_cleanup+0x151/0x330 [mlx5_ib]\n ? __pollwait+0xd0/0xd0\n ? xas_load+0x5/0x70\n ? xa_load+0x62/0xa0\n destroy_hw_idr_uobject+0x20/0x80 [ib_uverbs]\n uverbs_destroy_uobject+0x3b/0x360 [ib_uverbs]\n uobj_destroy+0x54/0xa0 [ib_uverbs]\n ib_uverbs_cmd_verbs+0xaf2/0x1160 [ib_uverbs]\n ? uverbs_finalize_object+0xd0/0xd0 [ib_uverbs]\n ib_uverbs_ioctl+0xc4/0x1b0 [ib_uverbs]\n __x64_sys_ioctl+0x3e4/0x8e0",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47197",
"url": "https://www.suse.com/security/cve/CVE-2021-47197"
},
{
"category": "external",
"summary": "SUSE Bug 1222776 for CVE-2021-47197",
"url": "https://bugzilla.suse.com/1222776"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-16T09:14:50Z",
"details": "moderate"
}
],
"title": "CVE-2021-47197"
},
{
"cve": "CVE-2021-47219",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47219"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: scsi_debug: Fix out-of-bound read in resp_report_tgtpgs()\n\nThe following issue was observed running syzkaller:\n\nBUG: KASAN: slab-out-of-bounds in memcpy include/linux/string.h:377 [inline]\nBUG: KASAN: slab-out-of-bounds in sg_copy_buffer+0x150/0x1c0 lib/scatterlist.c:831\nRead of size 2132 at addr ffff8880aea95dc8 by task syz-executor.0/9815\n\nCPU: 0 PID: 9815 Comm: syz-executor.0 Not tainted 4.19.202-00874-gfc0fe04215a9 #2\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.10.2-1ubuntu1 04/01/2014\nCall Trace:\n __dump_stack lib/dump_stack.c:77 [inline]\n dump_stack+0xe4/0x14a lib/dump_stack.c:118\n print_address_description+0x73/0x280 mm/kasan/report.c:253\n kasan_report_error mm/kasan/report.c:352 [inline]\n kasan_report+0x272/0x370 mm/kasan/report.c:410\n memcpy+0x1f/0x50 mm/kasan/kasan.c:302\n memcpy include/linux/string.h:377 [inline]\n sg_copy_buffer+0x150/0x1c0 lib/scatterlist.c:831\n fill_from_dev_buffer+0x14f/0x340 drivers/scsi/scsi_debug.c:1021\n resp_report_tgtpgs+0x5aa/0x770 drivers/scsi/scsi_debug.c:1772\n schedule_resp+0x464/0x12f0 drivers/scsi/scsi_debug.c:4429\n scsi_debug_queuecommand+0x467/0x1390 drivers/scsi/scsi_debug.c:5835\n scsi_dispatch_cmd+0x3fc/0x9b0 drivers/scsi/scsi_lib.c:1896\n scsi_request_fn+0x1042/0x1810 drivers/scsi/scsi_lib.c:2034\n __blk_run_queue_uncond block/blk-core.c:464 [inline]\n __blk_run_queue+0x1a4/0x380 block/blk-core.c:484\n blk_execute_rq_nowait+0x1c2/0x2d0 block/blk-exec.c:78\n sg_common_write.isra.19+0xd74/0x1dc0 drivers/scsi/sg.c:847\n sg_write.part.23+0x6e0/0xd00 drivers/scsi/sg.c:716\n sg_write+0x64/0xa0 drivers/scsi/sg.c:622\n __vfs_write+0xed/0x690 fs/read_write.c:485\nkill_bdev:block_device:00000000e138492c\n vfs_write+0x184/0x4c0 fs/read_write.c:549\n ksys_write+0x107/0x240 fs/read_write.c:599\n do_syscall_64+0xc2/0x560 arch/x86/entry/common.c:293\n entry_SYSCALL_64_after_hwframe+0x49/0xbe\n\nWe get \u0027alen\u0027 from command its type is int. If userspace passes a large\nlength we will get a negative \u0027alen\u0027.\n\nSwitch n, alen, and rlen to u32.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47219",
"url": "https://www.suse.com/security/cve/CVE-2021-47219"
},
{
"category": "external",
"summary": "SUSE Bug 1222824 for CVE-2021-47219",
"url": "https://bugzilla.suse.com/1222824"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-16T09:14:50Z",
"details": "moderate"
}
],
"title": "CVE-2021-47219"
},
{
"cve": "CVE-2021-47295",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47295"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: sched: fix memory leak in tcindex_partial_destroy_work\n\nSyzbot reported memory leak in tcindex_set_parms(). The problem was in\nnon-freed perfect hash in tcindex_partial_destroy_work().\n\nIn tcindex_set_parms() new tcindex_data is allocated and some fields from\nold one are copied to new one, but not the perfect hash. Since\ntcindex_partial_destroy_work() is the destroy function for old\ntcindex_data, we need to free perfect hash to avoid memory leak.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47295",
"url": "https://www.suse.com/security/cve/CVE-2021-47295"
},
{
"category": "external",
"summary": "SUSE Bug 1224975 for CVE-2021-47295",
"url": "https://bugzilla.suse.com/1224975"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-16T09:14:50Z",
"details": "moderate"
}
],
"title": "CVE-2021-47295"
},
{
"cve": "CVE-2021-47388",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47388"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmac80211: fix use-after-free in CCMP/GCMP RX\n\nWhen PN checking is done in mac80211, for fragmentation we need\nto copy the PN to the RX struct so we can later use it to do a\ncomparison, since commit bf30ca922a0c (\"mac80211: check defrag\nPN against current frame\").\n\nUnfortunately, in that commit I used the \u0027hdr\u0027 variable without\nit being necessarily valid, so use-after-free could occur if it\nwas necessary to reallocate (parts of) the frame.\n\nFix this by reloading the variable after the code that results\nin the reallocations, if any.\n\nThis fixes https://bugzilla.kernel.org/show_bug.cgi?id=214401.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47388",
"url": "https://www.suse.com/security/cve/CVE-2021-47388"
},
{
"category": "external",
"summary": "SUSE Bug 1225214 for CVE-2021-47388",
"url": "https://bugzilla.suse.com/1225214"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-16T09:14:50Z",
"details": "moderate"
}
],
"title": "CVE-2021-47388"
},
{
"cve": "CVE-2021-47395",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47395"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmac80211: limit injected vht mcs/nss in ieee80211_parse_tx_radiotap\n\nLimit max values for vht mcs and nss in ieee80211_parse_tx_radiotap\nroutine in order to fix the following warning reported by syzbot:\n\nWARNING: CPU: 0 PID: 10717 at include/net/mac80211.h:989 ieee80211_rate_set_vht include/net/mac80211.h:989 [inline]\nWARNING: CPU: 0 PID: 10717 at include/net/mac80211.h:989 ieee80211_parse_tx_radiotap+0x101e/0x12d0 net/mac80211/tx.c:2244\nModules linked in:\nCPU: 0 PID: 10717 Comm: syz-executor.5 Not tainted 5.14.0-syzkaller #0\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011\nRIP: 0010:ieee80211_rate_set_vht include/net/mac80211.h:989 [inline]\nRIP: 0010:ieee80211_parse_tx_radiotap+0x101e/0x12d0 net/mac80211/tx.c:2244\nRSP: 0018:ffffc9000186f3e8 EFLAGS: 00010216\nRAX: 0000000000000618 RBX: ffff88804ef76500 RCX: ffffc900143a5000\nRDX: 0000000000040000 RSI: ffffffff888f478e RDI: 0000000000000003\nRBP: 00000000ffffffff R08: 0000000000000000 R09: 0000000000000100\nR10: ffffffff888f46f9 R11: 0000000000000000 R12: 00000000fffffff8\nR13: ffff88804ef7653c R14: 0000000000000001 R15: 0000000000000004\nFS: 00007fbf5718f700(0000) GS:ffff8880b9c00000(0000) knlGS:0000000000000000\nCS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 0000001b2de23000 CR3: 000000006a671000 CR4: 00000000001506f0\nDR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\nDR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000600\nCall Trace:\n ieee80211_monitor_select_queue+0xa6/0x250 net/mac80211/iface.c:740\n netdev_core_pick_tx+0x169/0x2e0 net/core/dev.c:4089\n __dev_queue_xmit+0x6f9/0x3710 net/core/dev.c:4165\n __bpf_tx_skb net/core/filter.c:2114 [inline]\n __bpf_redirect_no_mac net/core/filter.c:2139 [inline]\n __bpf_redirect+0x5ba/0xd20 net/core/filter.c:2162\n ____bpf_clone_redirect net/core/filter.c:2429 [inline]\n bpf_clone_redirect+0x2ae/0x420 net/core/filter.c:2401\n bpf_prog_eeb6f53a69e5c6a2+0x59/0x234\n bpf_dispatcher_nop_func include/linux/bpf.h:717 [inline]\n __bpf_prog_run include/linux/filter.h:624 [inline]\n bpf_prog_run include/linux/filter.h:631 [inline]\n bpf_test_run+0x381/0xa30 net/bpf/test_run.c:119\n bpf_prog_test_run_skb+0xb84/0x1ee0 net/bpf/test_run.c:663\n bpf_prog_test_run kernel/bpf/syscall.c:3307 [inline]\n __sys_bpf+0x2137/0x5df0 kernel/bpf/syscall.c:4605\n __do_sys_bpf kernel/bpf/syscall.c:4691 [inline]\n __se_sys_bpf kernel/bpf/syscall.c:4689 [inline]\n __x64_sys_bpf+0x75/0xb0 kernel/bpf/syscall.c:4689\n do_syscall_x64 arch/x86/entry/common.c:50 [inline]\n do_syscall_64+0x35/0xb0 arch/x86/entry/common.c:80\n entry_SYSCALL_64_after_hwframe+0x44/0xae\nRIP: 0033:0x4665f9",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47395",
"url": "https://www.suse.com/security/cve/CVE-2021-47395"
},
{
"category": "external",
"summary": "SUSE Bug 1225326 for CVE-2021-47395",
"url": "https://bugzilla.suse.com/1225326"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-16T09:14:50Z",
"details": "moderate"
}
],
"title": "CVE-2021-47395"
},
{
"cve": "CVE-2021-47399",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47399"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nixgbe: Fix NULL pointer dereference in ixgbe_xdp_setup\n\nThe ixgbe driver currently generates a NULL pointer dereference with\nsome machine (online cpus \u003c 63). This is due to the fact that the\nmaximum value of num_xdp_queues is nr_cpu_ids. Code is in\n\"ixgbe_set_rss_queues\"\".\n\nHere\u0027s how the problem repeats itself:\nSome machine (online cpus \u003c 63), And user set num_queues to 63 through\nethtool. Code is in the \"ixgbe_set_channels\",\n\tadapter-\u003ering_feature[RING_F_FDIR].limit = count;\n\nIt becomes 63.\n\nWhen user use xdp, \"ixgbe_set_rss_queues\" will set queues num.\n\tadapter-\u003enum_rx_queues = rss_i;\n\tadapter-\u003enum_tx_queues = rss_i;\n\tadapter-\u003enum_xdp_queues = ixgbe_xdp_queues(adapter);\n\nAnd rss_i\u0027s value is from\n\tf = \u0026adapter-\u003ering_feature[RING_F_FDIR];\n\trss_i = f-\u003eindices = f-\u003elimit;\n\nSo \"num_rx_queues\" \u003e \"num_xdp_queues\", when run to \"ixgbe_xdp_setup\",\n\tfor (i = 0; i \u003c adapter-\u003enum_rx_queues; i++)\n\t\tif (adapter-\u003exdp_ring[i]-\u003exsk_umem)\n\nIt leads to panic.\n\nCall trace:\n[exception RIP: ixgbe_xdp+368]\nRIP: ffffffffc02a76a0 RSP: ffff9fe16202f8d0 RFLAGS: 00010297\nRAX: 0000000000000000 RBX: 0000000000000020 RCX: 0000000000000000\nRDX: 0000000000000000 RSI: 000000000000001c RDI: ffffffffa94ead90\nRBP: ffff92f8f24c0c18 R8: 0000000000000000 R9: 0000000000000000\nR10: ffff9fe16202f830 R11: 0000000000000000 R12: ffff92f8f24c0000\nR13: ffff9fe16202fc01 R14: 000000000000000a R15: ffffffffc02a7530\nORIG_RAX: ffffffffffffffff CS: 0010 SS: 0018\n 7 [ffff9fe16202f8f0] dev_xdp_install at ffffffffa89fbbcc\n 8 [ffff9fe16202f920] dev_change_xdp_fd at ffffffffa8a08808\n 9 [ffff9fe16202f960] do_setlink at ffffffffa8a20235\n10 [ffff9fe16202fa88] rtnl_setlink at ffffffffa8a20384\n11 [ffff9fe16202fc78] rtnetlink_rcv_msg at ffffffffa8a1a8dd\n12 [ffff9fe16202fcf0] netlink_rcv_skb at ffffffffa8a717eb\n13 [ffff9fe16202fd40] netlink_unicast at ffffffffa8a70f88\n14 [ffff9fe16202fd80] netlink_sendmsg at ffffffffa8a71319\n15 [ffff9fe16202fdf0] sock_sendmsg at ffffffffa89df290\n16 [ffff9fe16202fe08] __sys_sendto at ffffffffa89e19c8\n17 [ffff9fe16202ff30] __x64_sys_sendto at ffffffffa89e1a64\n18 [ffff9fe16202ff38] do_syscall_64 at ffffffffa84042b9\n19 [ffff9fe16202ff50] entry_SYSCALL_64_after_hwframe at ffffffffa8c0008c\n\nSo I fix ixgbe_max_channels so that it will not allow a setting of queues\nto be higher than the num_online_cpus(). And when run to ixgbe_xdp_setup,\ntake the smaller value of num_rx_queues and num_xdp_queues.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47399",
"url": "https://www.suse.com/security/cve/CVE-2021-47399"
},
{
"category": "external",
"summary": "SUSE Bug 1225328 for CVE-2021-47399",
"url": "https://bugzilla.suse.com/1225328"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-16T09:14:50Z",
"details": "moderate"
}
],
"title": "CVE-2021-47399"
},
{
"cve": "CVE-2021-47403",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47403"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nipack: ipoctal: fix module reference leak\n\nA reference to the carrier module was taken on every open but was only\nreleased once when the final reference to the tty struct was dropped.\n\nFix this by taking the module reference and initialising the tty driver\ndata when installing the tty.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47403",
"url": "https://www.suse.com/security/cve/CVE-2021-47403"
},
{
"category": "external",
"summary": "SUSE Bug 1225241 for CVE-2021-47403",
"url": "https://bugzilla.suse.com/1225241"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-16T09:14:50Z",
"details": "moderate"
}
],
"title": "CVE-2021-47403"
},
{
"cve": "CVE-2021-47405",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47405"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nHID: usbhid: free raw_report buffers in usbhid_stop\n\nFree the unsent raw_report buffers when the device is removed.\n\nFixes a memory leak reported by syzbot at:\nhttps://syzkaller.appspot.com/bug?id=7b4fa7cb1a7c2d3342a2a8a6c53371c8c418ab47",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47405",
"url": "https://www.suse.com/security/cve/CVE-2021-47405"
},
{
"category": "external",
"summary": "SUSE Bug 1225238 for CVE-2021-47405",
"url": "https://bugzilla.suse.com/1225238"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-16T09:14:50Z",
"details": "moderate"
}
],
"title": "CVE-2021-47405"
},
{
"cve": "CVE-2021-47438",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47438"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/mlx5e: Fix memory leak in mlx5_core_destroy_cq() error path\n\nPrior to this patch in case mlx5_core_destroy_cq() failed it returns\nwithout completing all destroy operations and that leads to memory leak.\nInstead, complete the destroy flow before return error.\n\nAlso move mlx5_debug_cq_remove() to the beginning of mlx5_core_destroy_cq()\nto be symmetrical with mlx5_core_create_cq().\n\nkmemleak complains on:\n\nunreferenced object 0xc000000038625100 (size 64):\n comm \"ethtool\", pid 28301, jiffies 4298062946 (age 785.380s)\n hex dump (first 32 bytes):\n 60 01 48 94 00 00 00 c0 b8 05 34 c3 00 00 00 c0 `.H.......4.....\n 02 00 00 00 00 00 00 00 00 db 7d c1 00 00 00 c0 ..........}.....\n backtrace:\n [\u003c000000009e8643cb\u003e] add_res_tree+0xd0/0x270 [mlx5_core]\n [\u003c00000000e7cb8e6c\u003e] mlx5_debug_cq_add+0x5c/0xc0 [mlx5_core]\n [\u003c000000002a12918f\u003e] mlx5_core_create_cq+0x1d0/0x2d0 [mlx5_core]\n [\u003c00000000cef0a696\u003e] mlx5e_create_cq+0x210/0x3f0 [mlx5_core]\n [\u003c000000009c642c26\u003e] mlx5e_open_cq+0xb4/0x130 [mlx5_core]\n [\u003c0000000058dfa578\u003e] mlx5e_ptp_open+0x7f4/0xe10 [mlx5_core]\n [\u003c0000000081839561\u003e] mlx5e_open_channels+0x9cc/0x13e0 [mlx5_core]\n [\u003c0000000009cf05d4\u003e] mlx5e_switch_priv_channels+0xa4/0x230\n[mlx5_core]\n [\u003c0000000042bbedd8\u003e] mlx5e_safe_switch_params+0x14c/0x300\n[mlx5_core]\n [\u003c0000000004bc9db8\u003e] set_pflag_tx_port_ts+0x9c/0x160 [mlx5_core]\n [\u003c00000000a0553443\u003e] mlx5e_set_priv_flags+0xd0/0x1b0 [mlx5_core]\n [\u003c00000000a8f3d84b\u003e] ethnl_set_privflags+0x234/0x2d0\n [\u003c00000000fd27f27c\u003e] genl_family_rcv_msg_doit+0x108/0x1d0\n [\u003c00000000f495e2bb\u003e] genl_family_rcv_msg+0xe4/0x1f0\n [\u003c00000000646c5c2c\u003e] genl_rcv_msg+0x78/0x120\n [\u003c00000000d53e384e\u003e] netlink_rcv_skb+0x74/0x1a0",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47438",
"url": "https://www.suse.com/security/cve/CVE-2021-47438"
},
{
"category": "external",
"summary": "SUSE Bug 1225229 for CVE-2021-47438",
"url": "https://bugzilla.suse.com/1225229"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-16T09:14:50Z",
"details": "moderate"
}
],
"title": "CVE-2021-47438"
},
{
"cve": "CVE-2021-47441",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47441"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmlxsw: thermal: Fix out-of-bounds memory accesses\n\nCurrently, mlxsw allows cooling states to be set above the maximum\ncooling state supported by the driver:\n\n # cat /sys/class/thermal/thermal_zone2/cdev0/type\n mlxsw_fan\n # cat /sys/class/thermal/thermal_zone2/cdev0/max_state\n 10\n # echo 18 \u003e /sys/class/thermal/thermal_zone2/cdev0/cur_state\n # echo $?\n 0\n\nThis results in out-of-bounds memory accesses when thermal state\ntransition statistics are enabled (CONFIG_THERMAL_STATISTICS=y), as the\ntransition table is accessed with a too large index (state) [1].\n\nAccording to the thermal maintainer, it is the responsibility of the\ndriver to reject such operations [2].\n\nTherefore, return an error when the state to be set exceeds the maximum\ncooling state supported by the driver.\n\nTo avoid dead code, as suggested by the thermal maintainer [3],\npartially revert commit a421ce088ac8 (\"mlxsw: core: Extend cooling\ndevice with cooling levels\") that tried to interpret these invalid\ncooling states (above the maximum) in a special way. The cooling levels\narray is not removed in order to prevent the fans going below 20% PWM,\nwhich would cause them to get stuck at 0% PWM.\n\n[1]\nBUG: KASAN: slab-out-of-bounds in thermal_cooling_device_stats_update+0x271/0x290\nRead of size 4 at addr ffff8881052f7bf8 by task kworker/0:0/5\n\nCPU: 0 PID: 5 Comm: kworker/0:0 Not tainted 5.15.0-rc3-custom-45935-gce1adf704b14 #122\nHardware name: Mellanox Technologies Ltd. \"MSN2410-CB2FO\"/\"SA000874\", BIOS 4.6.5 03/08/2016\nWorkqueue: events_freezable_power_ thermal_zone_device_check\nCall Trace:\n dump_stack_lvl+0x8b/0xb3\n print_address_description.constprop.0+0x1f/0x140\n kasan_report.cold+0x7f/0x11b\n thermal_cooling_device_stats_update+0x271/0x290\n __thermal_cdev_update+0x15e/0x4e0\n thermal_cdev_update+0x9f/0xe0\n step_wise_throttle+0x770/0xee0\n thermal_zone_device_update+0x3f6/0xdf0\n process_one_work+0xa42/0x1770\n worker_thread+0x62f/0x13e0\n kthread+0x3ee/0x4e0\n ret_from_fork+0x1f/0x30\n\nAllocated by task 1:\n kasan_save_stack+0x1b/0x40\n __kasan_kmalloc+0x7c/0x90\n thermal_cooling_device_setup_sysfs+0x153/0x2c0\n __thermal_cooling_device_register.part.0+0x25b/0x9c0\n thermal_cooling_device_register+0xb3/0x100\n mlxsw_thermal_init+0x5c5/0x7e0\n __mlxsw_core_bus_device_register+0xcb3/0x19c0\n mlxsw_core_bus_device_register+0x56/0xb0\n mlxsw_pci_probe+0x54f/0x710\n local_pci_probe+0xc6/0x170\n pci_device_probe+0x2b2/0x4d0\n really_probe+0x293/0xd10\n __driver_probe_device+0x2af/0x440\n driver_probe_device+0x51/0x1e0\n __driver_attach+0x21b/0x530\n bus_for_each_dev+0x14c/0x1d0\n bus_add_driver+0x3ac/0x650\n driver_register+0x241/0x3d0\n mlxsw_sp_module_init+0xa2/0x174\n do_one_initcall+0xee/0x5f0\n kernel_init_freeable+0x45a/0x4de\n kernel_init+0x1f/0x210\n ret_from_fork+0x1f/0x30\n\nThe buggy address belongs to the object at ffff8881052f7800\n which belongs to the cache kmalloc-1k of size 1024\nThe buggy address is located 1016 bytes inside of\n 1024-byte region [ffff8881052f7800, ffff8881052f7c00)\nThe buggy address belongs to the page:\npage:0000000052355272 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1052f0\nhead:0000000052355272 order:3 compound_mapcount:0 compound_pincount:0\nflags: 0x200000000010200(slab|head|node=0|zone=2)\nraw: 0200000000010200 ffffea0005034800 0000000300000003 ffff888100041dc0\nraw: 0000000000000000 0000000000100010 00000001ffffffff 0000000000000000\npage dumped because: kasan: bad access detected\n\nMemory state around the buggy address:\n ffff8881052f7a80: 00 00 00 00 00 00 04 fc fc fc fc fc fc fc fc fc\n ffff8881052f7b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n\u003effff8881052f7b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n ^\n ffff8881052f7c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n ffff8881052f7c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n\n[2] https://lore.kernel.org/linux-pm/9aca37cb-1629-5c67-\n---truncated---",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47441",
"url": "https://www.suse.com/security/cve/CVE-2021-47441"
},
{
"category": "external",
"summary": "SUSE Bug 1225224 for CVE-2021-47441",
"url": "https://bugzilla.suse.com/1225224"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-16T09:14:50Z",
"details": "moderate"
}
],
"title": "CVE-2021-47441"
},
{
"cve": "CVE-2021-47468",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47468"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nisdn: mISDN: Fix sleeping function called from invalid context\n\nThe driver can call card-\u003eisac.release() function from an atomic\ncontext.\n\nFix this by calling this function after releasing the lock.\n\nThe following log reveals it:\n\n[ 44.168226 ] BUG: sleeping function called from invalid context at kernel/workqueue.c:3018\n[ 44.168941 ] in_atomic(): 1, irqs_disabled(): 1, non_block: 0, pid: 5475, name: modprobe\n[ 44.169574 ] INFO: lockdep is turned off.\n[ 44.169899 ] irq event stamp: 0\n[ 44.170160 ] hardirqs last enabled at (0): [\u003c0000000000000000\u003e] 0x0\n[ 44.170627 ] hardirqs last disabled at (0): [\u003cffffffff814209ed\u003e] copy_process+0x132d/0x3e00\n[ 44.171240 ] softirqs last enabled at (0): [\u003cffffffff81420a1a\u003e] copy_process+0x135a/0x3e00\n[ 44.171852 ] softirqs last disabled at (0): [\u003c0000000000000000\u003e] 0x0\n[ 44.172318 ] Preemption disabled at:\n[ 44.172320 ] [\u003cffffffffa009b0a9\u003e] nj_release+0x69/0x500 [netjet]\n[ 44.174441 ] Call Trace:\n[ 44.174630 ] dump_stack_lvl+0xa8/0xd1\n[ 44.174912 ] dump_stack+0x15/0x17\n[ 44.175166 ] ___might_sleep+0x3a2/0x510\n[ 44.175459 ] ? nj_release+0x69/0x500 [netjet]\n[ 44.175791 ] __might_sleep+0x82/0xe0\n[ 44.176063 ] ? start_flush_work+0x20/0x7b0\n[ 44.176375 ] start_flush_work+0x33/0x7b0\n[ 44.176672 ] ? trace_irq_enable_rcuidle+0x85/0x170\n[ 44.177034 ] ? kasan_quarantine_put+0xaa/0x1f0\n[ 44.177372 ] ? kasan_quarantine_put+0xaa/0x1f0\n[ 44.177711 ] __flush_work+0x11a/0x1a0\n[ 44.177991 ] ? flush_work+0x20/0x20\n[ 44.178257 ] ? lock_release+0x13c/0x8f0\n[ 44.178550 ] ? __kasan_check_write+0x14/0x20\n[ 44.178872 ] ? do_raw_spin_lock+0x148/0x360\n[ 44.179187 ] ? read_lock_is_recursive+0x20/0x20\n[ 44.179530 ] ? __kasan_check_read+0x11/0x20\n[ 44.179846 ] ? do_raw_spin_unlock+0x55/0x900\n[ 44.180168 ] ? ____kasan_slab_free+0x116/0x140\n[ 44.180505 ] ? _raw_spin_unlock_irqrestore+0x41/0x60\n[ 44.180878 ] ? skb_queue_purge+0x1a3/0x1c0\n[ 44.181189 ] ? kfree+0x13e/0x290\n[ 44.181438 ] flush_work+0x17/0x20\n[ 44.181695 ] mISDN_freedchannel+0xe8/0x100\n[ 44.182006 ] isac_release+0x210/0x260 [mISDNipac]\n[ 44.182366 ] nj_release+0xf6/0x500 [netjet]\n[ 44.182685 ] nj_remove+0x48/0x70 [netjet]\n[ 44.182989 ] pci_device_remove+0xa9/0x250",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47468",
"url": "https://www.suse.com/security/cve/CVE-2021-47468"
},
{
"category": "external",
"summary": "SUSE Bug 1225346 for CVE-2021-47468",
"url": "https://bugzilla.suse.com/1225346"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-16T09:14:50Z",
"details": "moderate"
}
],
"title": "CVE-2021-47468"
},
{
"cve": "CVE-2021-47501",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47501"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ni40e: Fix NULL pointer dereference in i40e_dbg_dump_desc\n\nWhen trying to dump VFs VSI RX/TX descriptors\nusing debugfs there was a crash\ndue to NULL pointer dereference in i40e_dbg_dump_desc.\nAdded a check to i40e_dbg_dump_desc that checks if\nVSI type is correct for dumping RX/TX descriptors.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47501",
"url": "https://www.suse.com/security/cve/CVE-2021-47501"
},
{
"category": "external",
"summary": "SUSE Bug 1225361 for CVE-2021-47501",
"url": "https://bugzilla.suse.com/1225361"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-16T09:14:50Z",
"details": "moderate"
}
],
"title": "CVE-2021-47501"
},
{
"cve": "CVE-2021-47516",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47516"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnfp: Fix memory leak in nfp_cpp_area_cache_add()\n\nIn line 800 (#1), nfp_cpp_area_alloc() allocates and initializes a\nCPP area structure. But in line 807 (#2), when the cache is allocated\nfailed, this CPP area structure is not freed, which will result in\nmemory leak.\n\nWe can fix it by freeing the CPP area when the cache is allocated\nfailed (#2).\n\n792 int nfp_cpp_area_cache_add(struct nfp_cpp *cpp, size_t size)\n793 {\n794 \tstruct nfp_cpp_area_cache *cache;\n795 \tstruct nfp_cpp_area *area;\n\n800\tarea = nfp_cpp_area_alloc(cpp, NFP_CPP_ID(7, NFP_CPP_ACTION_RW, 0),\n801 \t\t\t\t 0, size);\n\t// #1: allocates and initializes\n\n802 \tif (!area)\n803 \t\treturn -ENOMEM;\n\n805 \tcache = kzalloc(sizeof(*cache), GFP_KERNEL);\n806 \tif (!cache)\n807 \t\treturn -ENOMEM; // #2: missing free\n\n817\treturn 0;\n818 }",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47516",
"url": "https://www.suse.com/security/cve/CVE-2021-47516"
},
{
"category": "external",
"summary": "SUSE Bug 1225427 for CVE-2021-47516",
"url": "https://bugzilla.suse.com/1225427"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-16T09:14:50Z",
"details": "low"
}
],
"title": "CVE-2021-47516"
},
{
"cve": "CVE-2021-47542",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47542"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: qlogic: qlcnic: Fix a NULL pointer dereference in qlcnic_83xx_add_rings()\n\nIn qlcnic_83xx_add_rings(), the indirect function of\nahw-\u003ehw_ops-\u003ealloc_mbx_args will be called to allocate memory for\ncmd.req.arg, and there is a dereference of it in qlcnic_83xx_add_rings(),\nwhich could lead to a NULL pointer dereference on failure of the\nindirect function like qlcnic_83xx_alloc_mbx_args().\n\nFix this bug by adding a check of alloc_mbx_args(), this patch\nimitates the logic of mbx_cmd()\u0027s failure handling.\n\nThis bug was found by a static analyzer. The analysis employs\ndifferential checking to identify inconsistent security operations\n(e.g., checks or kfrees) between two code paths and confirms that the\ninconsistent operations are not recovered in the current function or\nthe callers, so they constitute bugs.\n\nNote that, as a bug found by static analysis, it can be a false\npositive or hard to trigger. Multiple researchers have cross-reviewed\nthe bug.\n\nBuilds with CONFIG_QLCNIC=m show no new warnings, and our\nstatic analyzer no longer warns about this code.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47542",
"url": "https://www.suse.com/security/cve/CVE-2021-47542"
},
{
"category": "external",
"summary": "SUSE Bug 1225455 for CVE-2021-47542",
"url": "https://bugzilla.suse.com/1225455"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-16T09:14:50Z",
"details": "moderate"
}
],
"title": "CVE-2021-47542"
},
{
"cve": "CVE-2021-47559",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47559"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/smc: Fix NULL pointer dereferencing in smc_vlan_by_tcpsk()\n\nCoverity reports a possible NULL dereferencing problem:\n\nin smc_vlan_by_tcpsk():\n6. returned_null: netdev_lower_get_next returns NULL (checked 29 out of 30 times).\n7. var_assigned: Assigning: ndev = NULL return value from netdev_lower_get_next.\n1623 ndev = (struct net_device *)netdev_lower_get_next(ndev, \u0026lower);\nCID 1468509 (#1 of 1): Dereference null return value (NULL_RETURNS)\n8. dereference: Dereferencing a pointer that might be NULL ndev when calling is_vlan_dev.\n1624 if (is_vlan_dev(ndev)) {\n\nRemove the manual implementation and use netdev_walk_all_lower_dev() to\niterate over the lower devices. While on it remove an obsolete function\nparameter comment.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47559",
"url": "https://www.suse.com/security/cve/CVE-2021-47559"
},
{
"category": "external",
"summary": "SUSE Bug 1225396 for CVE-2021-47559",
"url": "https://bugzilla.suse.com/1225396"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-16T09:14:50Z",
"details": "moderate"
}
],
"title": "CVE-2021-47559"
},
{
"cve": "CVE-2021-47580",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47580"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: scsi_debug: Fix type in min_t to avoid stack OOB\n\nChange min_t() to use type \"u32\" instead of type \"int\" to avoid stack out\nof bounds. With min_t() type \"int\" the values get sign extended and the\nlarger value gets used causing stack out of bounds.\n\nBUG: KASAN: stack-out-of-bounds in memcpy include/linux/fortify-string.h:191 [inline]\nBUG: KASAN: stack-out-of-bounds in sg_copy_buffer+0x1de/0x240 lib/scatterlist.c:976\nRead of size 127 at addr ffff888072607128 by task syz-executor.7/18707\n\nCPU: 1 PID: 18707 Comm: syz-executor.7 Not tainted 5.15.0-syzk #1\nHardware name: Red Hat KVM, BIOS 1.13.0-2\nCall Trace:\n __dump_stack lib/dump_stack.c:88 [inline]\n dump_stack_lvl+0x89/0xb5 lib/dump_stack.c:106\n print_address_description.constprop.9+0x28/0x160 mm/kasan/report.c:256\n __kasan_report mm/kasan/report.c:442 [inline]\n kasan_report.cold.14+0x7d/0x117 mm/kasan/report.c:459\n check_region_inline mm/kasan/generic.c:183 [inline]\n kasan_check_range+0x1a3/0x210 mm/kasan/generic.c:189\n memcpy+0x23/0x60 mm/kasan/shadow.c:65\n memcpy include/linux/fortify-string.h:191 [inline]\n sg_copy_buffer+0x1de/0x240 lib/scatterlist.c:976\n sg_copy_from_buffer+0x33/0x40 lib/scatterlist.c:1000\n fill_from_dev_buffer.part.34+0x82/0x130 drivers/scsi/scsi_debug.c:1162\n fill_from_dev_buffer drivers/scsi/scsi_debug.c:1888 [inline]\n resp_readcap16+0x365/0x3b0 drivers/scsi/scsi_debug.c:1887\n schedule_resp+0x4d8/0x1a70 drivers/scsi/scsi_debug.c:5478\n scsi_debug_queuecommand+0x8c9/0x1ec0 drivers/scsi/scsi_debug.c:7533\n scsi_dispatch_cmd drivers/scsi/scsi_lib.c:1520 [inline]\n scsi_queue_rq+0x16b0/0x2d40 drivers/scsi/scsi_lib.c:1699\n blk_mq_dispatch_rq_list+0xb9b/0x2700 block/blk-mq.c:1639\n __blk_mq_sched_dispatch_requests+0x28f/0x590 block/blk-mq-sched.c:325\n blk_mq_sched_dispatch_requests+0x105/0x190 block/blk-mq-sched.c:358\n __blk_mq_run_hw_queue+0xe5/0x150 block/blk-mq.c:1761\n __blk_mq_delay_run_hw_queue+0x4f8/0x5c0 block/blk-mq.c:1838\n blk_mq_run_hw_queue+0x18d/0x350 block/blk-mq.c:1891\n blk_mq_sched_insert_request+0x3db/0x4e0 block/blk-mq-sched.c:474\n blk_execute_rq_nowait+0x16b/0x1c0 block/blk-exec.c:62\n sg_common_write.isra.18+0xeb3/0x2000 drivers/scsi/sg.c:836\n sg_new_write.isra.19+0x570/0x8c0 drivers/scsi/sg.c:774\n sg_ioctl_common+0x14d6/0x2710 drivers/scsi/sg.c:939\n sg_ioctl+0xa2/0x180 drivers/scsi/sg.c:1165\n vfs_ioctl fs/ioctl.c:51 [inline]\n __do_sys_ioctl fs/ioctl.c:874 [inline]\n __se_sys_ioctl fs/ioctl.c:860 [inline]\n __x64_sys_ioctl+0x19d/0x220 fs/ioctl.c:860\n do_syscall_x64 arch/x86/entry/common.c:50 [inline]\n do_syscall_64+0x3a/0x80 arch/x86/entry/common.c:80\n entry_SYSCALL_64_after_hwframe+0x44/0xae",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47580",
"url": "https://www.suse.com/security/cve/CVE-2021-47580"
},
{
"category": "external",
"summary": "SUSE Bug 1226550 for CVE-2021-47580",
"url": "https://bugzilla.suse.com/1226550"
},
{
"category": "external",
"summary": "SUSE Bug 1227611 for CVE-2021-47580",
"url": "https://bugzilla.suse.com/1227611"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-16T09:14:50Z",
"details": "moderate"
}
],
"title": "CVE-2021-47580"
},
{
"cve": "CVE-2021-47582",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47582"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nUSB: core: Make do_proc_control() and do_proc_bulk() killable\n\nThe USBDEVFS_CONTROL and USBDEVFS_BULK ioctls invoke\nusb_start_wait_urb(), which contains an uninterruptible wait with a\nuser-specified timeout value. If timeout value is very large and the\ndevice being accessed does not respond in a reasonable amount of time,\nthe kernel will complain about \"Task X blocked for more than N\nseconds\", as found in testing by syzbot:\n\nINFO: task syz-executor.0:8700 blocked for more than 143 seconds.\n Not tainted 5.14.0-rc7-syzkaller #0\n\"echo 0 \u003e /proc/sys/kernel/hung_task_timeout_secs\" disables this message.\ntask:syz-executor.0 state:D stack:23192 pid: 8700 ppid: 8455 flags:0x00004004\nCall Trace:\n context_switch kernel/sched/core.c:4681 [inline]\n __schedule+0xc07/0x11f0 kernel/sched/core.c:5938\n schedule+0x14b/0x210 kernel/sched/core.c:6017\n schedule_timeout+0x98/0x2f0 kernel/time/timer.c:1857\n do_wait_for_common+0x2da/0x480 kernel/sched/completion.c:85\n __wait_for_common kernel/sched/completion.c:106 [inline]\n wait_for_common kernel/sched/completion.c:117 [inline]\n wait_for_completion_timeout+0x46/0x60 kernel/sched/completion.c:157\n usb_start_wait_urb+0x167/0x550 drivers/usb/core/message.c:63\n do_proc_bulk+0x978/0x1080 drivers/usb/core/devio.c:1236\n proc_bulk drivers/usb/core/devio.c:1273 [inline]\n usbdev_do_ioctl drivers/usb/core/devio.c:2547 [inline]\n usbdev_ioctl+0x3441/0x6b10 drivers/usb/core/devio.c:2713\n...\n\nTo fix this problem, this patch replaces usbfs\u0027s calls to\nusb_control_msg() and usb_bulk_msg() with special-purpose code that\ndoes essentially the same thing (as recommended in the comment for\nusb_start_wait_urb()), except that it always uses a killable wait and\nit uses GFP_KERNEL rather than GFP_NOIO.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47582",
"url": "https://www.suse.com/security/cve/CVE-2021-47582"
},
{
"category": "external",
"summary": "SUSE Bug 1226559 for CVE-2021-47582",
"url": "https://bugzilla.suse.com/1226559"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-16T09:14:50Z",
"details": "moderate"
}
],
"title": "CVE-2021-47582"
},
{
"cve": "CVE-2021-47588",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47588"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsit: do not call ipip6_dev_free() from sit_init_net()\n\nipip6_dev_free is sit dev-\u003epriv_destructor, already called\nby register_netdevice() if something goes wrong.\n\nAlternative would be to make ipip6_dev_free() robust against\nmultiple invocations, but other drivers do not implement this\nstrategy.\n\nsyzbot reported:\n\ndst_release underflow\nWARNING: CPU: 0 PID: 5059 at net/core/dst.c:173 dst_release+0xd8/0xe0 net/core/dst.c:173\nModules linked in:\nCPU: 1 PID: 5059 Comm: syz-executor.4 Not tainted 5.16.0-rc5-syzkaller #0\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011\nRIP: 0010:dst_release+0xd8/0xe0 net/core/dst.c:173\nCode: 4c 89 f2 89 d9 31 c0 5b 41 5e 5d e9 da d5 44 f9 e8 1d 90 5f f9 c6 05 87 48 c6 05 01 48 c7 c7 80 44 99 8b 31 c0 e8 e8 67 29 f9 \u003c0f\u003e 0b eb 85 0f 1f 40 00 53 48 89 fb e8 f7 8f 5f f9 48 83 c3 a8 48\nRSP: 0018:ffffc9000aa5faa0 EFLAGS: 00010246\nRAX: d6894a925dd15a00 RBX: 00000000ffffffff RCX: 0000000000040000\nRDX: ffffc90005e19000 RSI: 000000000003ffff RDI: 0000000000040000\nRBP: 0000000000000000 R08: ffffffff816a1f42 R09: ffffed1017344f2c\nR10: ffffed1017344f2c R11: 0000000000000000 R12: 0000607f462b1358\nR13: 1ffffffff1bfd305 R14: ffffe8ffffcb1358 R15: dffffc0000000000\nFS: 00007f66c71a2700(0000) GS:ffff8880b9a00000(0000) knlGS:0000000000000000\nCS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 00007f88aaed5058 CR3: 0000000023e0f000 CR4: 00000000003506f0\nDR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\nDR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\nCall Trace:\n \u003cTASK\u003e\n dst_cache_destroy+0x107/0x1e0 net/core/dst_cache.c:160\n ipip6_dev_free net/ipv6/sit.c:1414 [inline]\n sit_init_net+0x229/0x550 net/ipv6/sit.c:1936\n ops_init+0x313/0x430 net/core/net_namespace.c:140\n setup_net+0x35b/0x9d0 net/core/net_namespace.c:326\n copy_net_ns+0x359/0x5c0 net/core/net_namespace.c:470\n create_new_namespaces+0x4ce/0xa00 kernel/nsproxy.c:110\n unshare_nsproxy_namespaces+0x11e/0x180 kernel/nsproxy.c:226\n ksys_unshare+0x57d/0xb50 kernel/fork.c:3075\n __do_sys_unshare kernel/fork.c:3146 [inline]\n __se_sys_unshare kernel/fork.c:3144 [inline]\n __x64_sys_unshare+0x34/0x40 kernel/fork.c:3144\n do_syscall_x64 arch/x86/entry/common.c:50 [inline]\n do_syscall_64+0x44/0xd0 arch/x86/entry/common.c:80\n entry_SYSCALL_64_after_hwframe+0x44/0xae\nRIP: 0033:0x7f66c882ce99\nCode: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 \u003c48\u003e 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48\nRSP: 002b:00007f66c71a2168 EFLAGS: 00000246 ORIG_RAX: 0000000000000110\nRAX: ffffffffffffffda RBX: 00007f66c893ff60 RCX: 00007f66c882ce99\nRDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000048040200\nRBP: 00007f66c8886ff1 R08: 0000000000000000 R09: 0000000000000000\nR10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000\nR13: 00007fff6634832f R14: 00007f66c71a2300 R15: 0000000000022000\n \u003c/TASK\u003e",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47588",
"url": "https://www.suse.com/security/cve/CVE-2021-47588"
},
{
"category": "external",
"summary": "SUSE Bug 1226568 for CVE-2021-47588",
"url": "https://bugzilla.suse.com/1226568"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-16T09:14:50Z",
"details": "moderate"
}
],
"title": "CVE-2021-47588"
},
{
"cve": "CVE-2021-47597",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47597"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ninet_diag: fix kernel-infoleak for UDP sockets\n\nKMSAN reported a kernel-infoleak [1], that can exploited\nby unpriv users.\n\nAfter analysis it turned out UDP was not initializing\nr-\u003eidiag_expires. Other users of inet_sk_diag_fill()\nmight make the same mistake in the future, so fix this\nin inet_sk_diag_fill().\n\n[1]\nBUG: KMSAN: kernel-infoleak in instrument_copy_to_user include/linux/instrumented.h:121 [inline]\nBUG: KMSAN: kernel-infoleak in copyout lib/iov_iter.c:156 [inline]\nBUG: KMSAN: kernel-infoleak in _copy_to_iter+0x69d/0x25c0 lib/iov_iter.c:670\n instrument_copy_to_user include/linux/instrumented.h:121 [inline]\n copyout lib/iov_iter.c:156 [inline]\n _copy_to_iter+0x69d/0x25c0 lib/iov_iter.c:670\n copy_to_iter include/linux/uio.h:155 [inline]\n simple_copy_to_iter+0xf3/0x140 net/core/datagram.c:519\n __skb_datagram_iter+0x2cb/0x1280 net/core/datagram.c:425\n skb_copy_datagram_iter+0xdc/0x270 net/core/datagram.c:533\n skb_copy_datagram_msg include/linux/skbuff.h:3657 [inline]\n netlink_recvmsg+0x660/0x1c60 net/netlink/af_netlink.c:1974\n sock_recvmsg_nosec net/socket.c:944 [inline]\n sock_recvmsg net/socket.c:962 [inline]\n sock_read_iter+0x5a9/0x630 net/socket.c:1035\n call_read_iter include/linux/fs.h:2156 [inline]\n new_sync_read fs/read_write.c:400 [inline]\n vfs_read+0x1631/0x1980 fs/read_write.c:481\n ksys_read+0x28c/0x520 fs/read_write.c:619\n __do_sys_read fs/read_write.c:629 [inline]\n __se_sys_read fs/read_write.c:627 [inline]\n __x64_sys_read+0xdb/0x120 fs/read_write.c:627\n do_syscall_x64 arch/x86/entry/common.c:51 [inline]\n do_syscall_64+0x54/0xd0 arch/x86/entry/common.c:82\n entry_SYSCALL_64_after_hwframe+0x44/0xae\n\nUninit was created at:\n slab_post_alloc_hook mm/slab.h:524 [inline]\n slab_alloc_node mm/slub.c:3251 [inline]\n __kmalloc_node_track_caller+0xe0c/0x1510 mm/slub.c:4974\n kmalloc_reserve net/core/skbuff.c:354 [inline]\n __alloc_skb+0x545/0xf90 net/core/skbuff.c:426\n alloc_skb include/linux/skbuff.h:1126 [inline]\n netlink_dump+0x3d5/0x16a0 net/netlink/af_netlink.c:2245\n __netlink_dump_start+0xd1c/0xee0 net/netlink/af_netlink.c:2370\n netlink_dump_start include/linux/netlink.h:254 [inline]\n inet_diag_handler_cmd+0x2e7/0x400 net/ipv4/inet_diag.c:1343\n sock_diag_rcv_msg+0x24a/0x620\n netlink_rcv_skb+0x447/0x800 net/netlink/af_netlink.c:2491\n sock_diag_rcv+0x63/0x80 net/core/sock_diag.c:276\n netlink_unicast_kernel net/netlink/af_netlink.c:1319 [inline]\n netlink_unicast+0x1095/0x1360 net/netlink/af_netlink.c:1345\n netlink_sendmsg+0x16f3/0x1870 net/netlink/af_netlink.c:1916\n sock_sendmsg_nosec net/socket.c:704 [inline]\n sock_sendmsg net/socket.c:724 [inline]\n sock_write_iter+0x594/0x690 net/socket.c:1057\n do_iter_readv_writev+0xa7f/0xc70\n do_iter_write+0x52c/0x1500 fs/read_write.c:851\n vfs_writev fs/read_write.c:924 [inline]\n do_writev+0x63f/0xe30 fs/read_write.c:967\n __do_sys_writev fs/read_write.c:1040 [inline]\n __se_sys_writev fs/read_write.c:1037 [inline]\n __x64_sys_writev+0xe5/0x120 fs/read_write.c:1037\n do_syscall_x64 arch/x86/entry/common.c:51 [inline]\n do_syscall_64+0x54/0xd0 arch/x86/entry/common.c:82\n entry_SYSCALL_64_after_hwframe+0x44/0xae\n\nBytes 68-71 of 312 are uninitialized\nMemory access of size 312 starts at ffff88812ab54000\nData copied to user address 0000000020001440\n\nCPU: 1 PID: 6365 Comm: syz-executor801 Not tainted 5.16.0-rc3-syzkaller #0\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47597",
"url": "https://www.suse.com/security/cve/CVE-2021-47597"
},
{
"category": "external",
"summary": "SUSE Bug 1226553 for CVE-2021-47597",
"url": "https://bugzilla.suse.com/1226553"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-16T09:14:50Z",
"details": "low"
}
],
"title": "CVE-2021-47597"
},
{
"cve": "CVE-2021-47599",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47599"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbtrfs: use latest_dev in btrfs_show_devname\n\nThe test case btrfs/238 reports the warning below:\n\n WARNING: CPU: 3 PID: 481 at fs/btrfs/super.c:2509 btrfs_show_devname+0x104/0x1e8 [btrfs]\n CPU: 2 PID: 1 Comm: systemd Tainted: G W O 5.14.0-rc1-custom #72\n Hardware name: QEMU QEMU Virtual Machine, BIOS 0.0.0 02/06/2015\n Call trace:\n btrfs_show_devname+0x108/0x1b4 [btrfs]\n show_mountinfo+0x234/0x2c4\n m_show+0x28/0x34\n seq_read_iter+0x12c/0x3c4\n vfs_read+0x29c/0x2c8\n ksys_read+0x80/0xec\n __arm64_sys_read+0x28/0x34\n invoke_syscall+0x50/0xf8\n do_el0_svc+0x88/0x138\n el0_svc+0x2c/0x8c\n el0t_64_sync_handler+0x84/0xe4\n el0t_64_sync+0x198/0x19c\n\nReason:\nWhile btrfs_prepare_sprout() moves the fs_devices::devices into\nfs_devices::seed_list, the btrfs_show_devname() searches for the devices\nand found none, leading to the warning as in above.\n\nFix:\nlatest_dev is updated according to the changes to the device list.\nThat means we could use the latest_dev-\u003ename to show the device name in\n/proc/self/mounts, the pointer will be always valid as it\u0027s assigned\nbefore the device is deleted from the list in remove or replace.\nThe RCU protection is sufficient as the device structure is freed after\nsynchronization.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47599",
"url": "https://www.suse.com/security/cve/CVE-2021-47599"
},
{
"category": "external",
"summary": "SUSE Bug 1226571 for CVE-2021-47599",
"url": "https://bugzilla.suse.com/1226571"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-16T09:14:50Z",
"details": "moderate"
}
],
"title": "CVE-2021-47599"
},
{
"cve": "CVE-2021-47606",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47606"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: netlink: af_netlink: Prevent empty skb by adding a check on len.\n\nAdding a check on len parameter to avoid empty skb. This prevents a\ndivision error in netem_enqueue function which is caused when skb-\u003elen=0\nand skb-\u003edata_len=0 in the randomized corruption step as shown below.\n\nskb-\u003edata[prandom_u32() % skb_headlen(skb)] ^= 1\u003c\u003c(prandom_u32() % 8);\n\nCrash Report:\n[ 343.170349] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family\n0 port 6081 - 0\n[ 343.216110] netem: version 1.3\n[ 343.235841] divide error: 0000 [#1] PREEMPT SMP KASAN NOPTI\n[ 343.236680] CPU: 3 PID: 4288 Comm: reproducer Not tainted 5.16.0-rc1+\n[ 343.237569] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996),\nBIOS 1.11.0-2.el7 04/01/2014\n[ 343.238707] RIP: 0010:netem_enqueue+0x1590/0x33c0 [sch_netem]\n[ 343.239499] Code: 89 85 58 ff ff ff e8 5f 5d e9 d3 48 8b b5 48 ff ff\nff 8b 8d 50 ff ff ff 8b 85 58 ff ff ff 48 8b bd 70 ff ff ff 31 d2 2b 4f\n74 \u003cf7\u003e f1 48 b8 00 00 00 00 00 fc ff df 49 01 d5 4c 89 e9 48 c1 e9 03\n[ 343.241883] RSP: 0018:ffff88800bcd7368 EFLAGS: 00010246\n[ 343.242589] RAX: 00000000ba7c0a9c RBX: 0000000000000001 RCX:\n0000000000000000\n[ 343.243542] RDX: 0000000000000000 RSI: ffff88800f8edb10 RDI:\nffff88800f8eda40\n[ 343.244474] RBP: ffff88800bcd7458 R08: 0000000000000000 R09:\nffffffff94fb8445\n[ 343.245403] R10: ffffffff94fb8336 R11: ffffffff94fb8445 R12:\n0000000000000000\n[ 343.246355] R13: ffff88800a5a7000 R14: ffff88800a5b5800 R15:\n0000000000000020\n[ 343.247291] FS: 00007fdde2bd7700(0000) GS:ffff888109780000(0000)\nknlGS:0000000000000000\n[ 343.248350] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n[ 343.249120] CR2: 00000000200000c0 CR3: 000000000ef4c000 CR4:\n00000000000006e0\n[ 343.250076] Call Trace:\n[ 343.250423] \u003cTASK\u003e\n[ 343.250713] ? memcpy+0x4d/0x60\n[ 343.251162] ? netem_init+0xa0/0xa0 [sch_netem]\n[ 343.251795] ? __sanitizer_cov_trace_pc+0x21/0x60\n[ 343.252443] netem_enqueue+0xe28/0x33c0 [sch_netem]\n[ 343.253102] ? stack_trace_save+0x87/0xb0\n[ 343.253655] ? filter_irq_stacks+0xb0/0xb0\n[ 343.254220] ? netem_init+0xa0/0xa0 [sch_netem]\n[ 343.254837] ? __kasan_check_write+0x14/0x20\n[ 343.255418] ? _raw_spin_lock+0x88/0xd6\n[ 343.255953] dev_qdisc_enqueue+0x50/0x180\n[ 343.256508] __dev_queue_xmit+0x1a7e/0x3090\n[ 343.257083] ? netdev_core_pick_tx+0x300/0x300\n[ 343.257690] ? check_kcov_mode+0x10/0x40\n[ 343.258219] ? _raw_spin_unlock_irqrestore+0x29/0x40\n[ 343.258899] ? __kasan_init_slab_obj+0x24/0x30\n[ 343.259529] ? setup_object.isra.71+0x23/0x90\n[ 343.260121] ? new_slab+0x26e/0x4b0\n[ 343.260609] ? kasan_poison+0x3a/0x50\n[ 343.261118] ? kasan_unpoison+0x28/0x50\n[ 343.261637] ? __kasan_slab_alloc+0x71/0x90\n[ 343.262214] ? memcpy+0x4d/0x60\n[ 343.262674] ? write_comp_data+0x2f/0x90\n[ 343.263209] ? __kasan_check_write+0x14/0x20\n[ 343.263802] ? __skb_clone+0x5d6/0x840\n[ 343.264329] ? __sanitizer_cov_trace_pc+0x21/0x60\n[ 343.264958] dev_queue_xmit+0x1c/0x20\n[ 343.265470] netlink_deliver_tap+0x652/0x9c0\n[ 343.266067] netlink_unicast+0x5a0/0x7f0\n[ 343.266608] ? netlink_attachskb+0x860/0x860\n[ 343.267183] ? __sanitizer_cov_trace_pc+0x21/0x60\n[ 343.267820] ? write_comp_data+0x2f/0x90\n[ 343.268367] netlink_sendmsg+0x922/0xe80\n[ 343.268899] ? netlink_unicast+0x7f0/0x7f0\n[ 343.269472] ? __sanitizer_cov_trace_pc+0x21/0x60\n[ 343.270099] ? write_comp_data+0x2f/0x90\n[ 343.270644] ? netlink_unicast+0x7f0/0x7f0\n[ 343.271210] sock_sendmsg+0x155/0x190\n[ 343.271721] ____sys_sendmsg+0x75f/0x8f0\n[ 343.272262] ? kernel_sendmsg+0x60/0x60\n[ 343.272788] ? write_comp_data+0x2f/0x90\n[ 343.273332] ? write_comp_data+0x2f/0x90\n[ 343.273869] ___sys_sendmsg+0x10f/0x190\n[ 343.274405] ? sendmsg_copy_msghdr+0x80/0x80\n[ 343.274984] ? slab_post_alloc_hook+0x70/0x230\n[ 343.275597] ? futex_wait_setup+0x240/0x240\n[ 343.276175] ? security_file_alloc+0x3e/0x170\n[ 343.276779] ? write_comp_d\n---truncated---",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47606",
"url": "https://www.suse.com/security/cve/CVE-2021-47606"
},
{
"category": "external",
"summary": "SUSE Bug 1226555 for CVE-2021-47606",
"url": "https://bugzilla.suse.com/1226555"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-16T09:14:50Z",
"details": "moderate"
}
],
"title": "CVE-2021-47606"
},
{
"cve": "CVE-2021-47619",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47619"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ni40e: Fix queues reservation for XDP\n\nWhen XDP was configured on a system with large number of CPUs\nand X722 NIC there was a call trace with NULL pointer dereference.\n\ni40e 0000:87:00.0: failed to get tracking for 256 queues for VSI 0 err -12\ni40e 0000:87:00.0: setup of MAIN VSI failed\n\nBUG: kernel NULL pointer dereference, address: 0000000000000000\nRIP: 0010:i40e_xdp+0xea/0x1b0 [i40e]\nCall Trace:\n? i40e_reconfig_rss_queues+0x130/0x130 [i40e]\ndev_xdp_install+0x61/0xe0\ndev_xdp_attach+0x18a/0x4c0\ndev_change_xdp_fd+0x1e6/0x220\ndo_setlink+0x616/0x1030\n? ahci_port_stop+0x80/0x80\n? ata_qc_issue+0x107/0x1e0\n? lock_timer_base+0x61/0x80\n? __mod_timer+0x202/0x380\nrtnl_setlink+0xe5/0x170\n? bpf_lsm_binder_transaction+0x10/0x10\n? security_capable+0x36/0x50\nrtnetlink_rcv_msg+0x121/0x350\n? rtnl_calcit.isra.0+0x100/0x100\nnetlink_rcv_skb+0x50/0xf0\nnetlink_unicast+0x1d3/0x2a0\nnetlink_sendmsg+0x22a/0x440\nsock_sendmsg+0x5e/0x60\n__sys_sendto+0xf0/0x160\n? __sys_getsockname+0x7e/0xc0\n? _copy_from_user+0x3c/0x80\n? __sys_setsockopt+0xc8/0x1a0\n__x64_sys_sendto+0x20/0x30\ndo_syscall_64+0x33/0x40\nentry_SYSCALL_64_after_hwframe+0x44/0xae\nRIP: 0033:0x7f83fa7a39e0\n\nThis was caused by PF queue pile fragmentation due to\nflow director VSI queue being placed right after main VSI.\nBecause of this main VSI was not able to resize its\nqueue allocation for XDP resulting in no queues allocated\nfor main VSI when XDP was turned on.\n\nFix this by always allocating last queue in PF queue pile\nfor a flow director VSI.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47619",
"url": "https://www.suse.com/security/cve/CVE-2021-47619"
},
{
"category": "external",
"summary": "SUSE Bug 1226645 for CVE-2021-47619",
"url": "https://bugzilla.suse.com/1226645"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-16T09:14:50Z",
"details": "moderate"
}
],
"title": "CVE-2021-47619"
},
{
"cve": "CVE-2022-20368",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-20368"
}
],
"notes": [
{
"category": "general",
"text": "Product: AndroidVersions: Android kernelAndroid ID: A-224546354References: Upstream kernel",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-20368",
"url": "https://www.suse.com/security/cve/CVE-2022-20368"
},
{
"category": "external",
"summary": "SUSE Bug 1202346 for CVE-2022-20368",
"url": "https://bugzilla.suse.com/1202346"
},
{
"category": "external",
"summary": "SUSE Bug 1212311 for CVE-2022-20368",
"url": "https://bugzilla.suse.com/1212311"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-16T09:14:50Z",
"details": "moderate"
}
],
"title": "CVE-2022-20368"
},
{
"cve": "CVE-2022-28748",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-28748"
}
],
"notes": [
{
"category": "general",
"text": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2022-2964. Reason: This candidate is a reservation duplicate of CVE-2022-2964. Notes: All CVE users should reference CVE-2022-2964 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-28748",
"url": "https://www.suse.com/security/cve/CVE-2022-28748"
},
{
"category": "external",
"summary": "SUSE Bug 1196018 for CVE-2022-28748",
"url": "https://bugzilla.suse.com/1196018"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.7,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-16T09:14:50Z",
"details": "low"
}
],
"title": "CVE-2022-28748"
},
{
"cve": "CVE-2022-2964",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-2964"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the Linux kernel\u0027s driver for the ASIX AX88179_178A-based USB 2.0/3.0 Gigabit Ethernet Devices. The vulnerability contains multiple out-of-bounds reads and possible out-of-bounds writes.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-2964",
"url": "https://www.suse.com/security/cve/CVE-2022-2964"
},
{
"category": "external",
"summary": "SUSE Bug 1202686 for CVE-2022-2964",
"url": "https://bugzilla.suse.com/1202686"
},
{
"category": "external",
"summary": "SUSE Bug 1203008 for CVE-2022-2964",
"url": "https://bugzilla.suse.com/1203008"
},
{
"category": "external",
"summary": "SUSE Bug 1208044 for CVE-2022-2964",
"url": "https://bugzilla.suse.com/1208044"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-16T09:14:50Z",
"details": "important"
}
],
"title": "CVE-2022-2964"
},
{
"cve": "CVE-2022-48775",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-48775"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nDrivers: hv: vmbus: Fix memory leak in vmbus_add_channel_kobj\n\nkobject_init_and_add() takes reference even when it fails.\nAccording to the doc of kobject_init_and_add():\n\n If this function returns an error, kobject_put() must be called to\n properly clean up the memory associated with the object.\n\nFix memory leak by calling kobject_put().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-48775",
"url": "https://www.suse.com/security/cve/CVE-2022-48775"
},
{
"category": "external",
"summary": "SUSE Bug 1227924 for CVE-2022-48775",
"url": "https://bugzilla.suse.com/1227924"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-16T09:14:50Z",
"details": "low"
}
],
"title": "CVE-2022-48775"
},
{
"cve": "CVE-2022-48792",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-48792"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: pm8001: Fix use-after-free for aborted SSP/STP sas_task\n\nCurrently a use-after-free may occur if a sas_task is aborted by the upper\nlayer before we handle the I/O completion in mpi_ssp_completion() or\nmpi_sata_completion().\n\nIn this case, the following are the two steps in handling those I/O\ncompletions:\n\n - Call complete() to inform the upper layer handler of completion of\n the I/O.\n\n - Release driver resources associated with the sas_task in\n pm8001_ccb_task_free() call.\n\nWhen complete() is called, the upper layer may free the sas_task. As such,\nwe should not touch the associated sas_task afterwards, but we do so in the\npm8001_ccb_task_free() call.\n\nFix by swapping the complete() and pm8001_ccb_task_free() calls ordering.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-48792",
"url": "https://www.suse.com/security/cve/CVE-2022-48792"
},
{
"category": "external",
"summary": "SUSE Bug 1228013 for CVE-2022-48792",
"url": "https://bugzilla.suse.com/1228013"
},
{
"category": "external",
"summary": "SUSE Bug 1228017 for CVE-2022-48792",
"url": "https://bugzilla.suse.com/1228017"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-16T09:14:50Z",
"details": "moderate"
}
],
"title": "CVE-2022-48792"
},
{
"cve": "CVE-2022-48794",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-48794"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: ieee802154: at86rf230: Stop leaking skb\u0027s\n\nUpon error the ieee802154_xmit_complete() helper is not called. Only\nieee802154_wake_queue() is called manually. In the Tx case we then leak\nthe skb structure.\n\nFree the skb structure upon error before returning when appropriate.\n\nAs the \u0027is_tx = 0\u0027 cannot be moved in the complete handler because of a\npossible race between the delay in switching to STATE_RX_AACK_ON and a\nnew interrupt, we introduce an intermediate \u0027was_tx\u0027 boolean just for\nthis purpose.\n\nThere is no Fixes tag applying here, many changes have been made on this\narea and the issue kind of always existed.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-48794",
"url": "https://www.suse.com/security/cve/CVE-2022-48794"
},
{
"category": "external",
"summary": "SUSE Bug 1228025 for CVE-2022-48794",
"url": "https://bugzilla.suse.com/1228025"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-16T09:14:50Z",
"details": "low"
}
],
"title": "CVE-2022-48794"
},
{
"cve": "CVE-2022-48804",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-48804"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nvt_ioctl: fix array_index_nospec in vt_setactivate\n\narray_index_nospec ensures that an out-of-bounds value is set to zero\non the transient path. Decreasing the value by one afterwards causes\na transient integer underflow. vsa.console should be decreased first\nand then sanitized with array_index_nospec.\n\nKasper Acknowledgements: Jakob Koschel, Brian Johannesmeyer, Kaveh\nRazavi, Herbert Bos, Cristiano Giuffrida from the VUSec group at VU\nAmsterdam.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-48804",
"url": "https://www.suse.com/security/cve/CVE-2022-48804"
},
{
"category": "external",
"summary": "SUSE Bug 1227968 for CVE-2022-48804",
"url": "https://bugzilla.suse.com/1227968"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-16T09:14:50Z",
"details": "moderate"
}
],
"title": "CVE-2022-48804"
},
{
"cve": "CVE-2022-48805",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-48805"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: usb: ax88179_178a: Fix out-of-bounds accesses in RX fixup\n\nax88179_rx_fixup() contains several out-of-bounds accesses that can be\ntriggered by a malicious (or defective) USB device, in particular:\n\n - The metadata array (hdr_off..hdr_off+2*pkt_cnt) can be out of bounds,\n causing OOB reads and (on big-endian systems) OOB endianness flips.\n - A packet can overlap the metadata array, causing a later OOB\n endianness flip to corrupt data used by a cloned SKB that has already\n been handed off into the network stack.\n - A packet SKB can be constructed whose tail is far beyond its end,\n causing out-of-bounds heap data to be considered part of the SKB\u0027s\n data.\n\nI have tested that this can be used by a malicious USB device to send a\nbogus ICMPv6 Echo Request and receive an ICMPv6 Echo Reply in response\nthat contains random kernel heap data.\nIt\u0027s probably also possible to get OOB writes from this on a\nlittle-endian system somehow - maybe by triggering skb_cow() via IP\noptions processing -, but I haven\u0027t tested that.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-48805",
"url": "https://www.suse.com/security/cve/CVE-2022-48805"
},
{
"category": "external",
"summary": "SUSE Bug 1227969 for CVE-2022-48805",
"url": "https://bugzilla.suse.com/1227969"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-16T09:14:50Z",
"details": "moderate"
}
],
"title": "CVE-2022-48805"
},
{
"cve": "CVE-2022-48810",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-48810"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nipmr,ip6mr: acquire RTNL before calling ip[6]mr_free_table() on failure path\n\nip[6]mr_free_table() can only be called under RTNL lock.\n\nRTNL: assertion failed at net/core/dev.c (10367)\nWARNING: CPU: 1 PID: 5890 at net/core/dev.c:10367 unregister_netdevice_many+0x1246/0x1850 net/core/dev.c:10367\nModules linked in:\nCPU: 1 PID: 5890 Comm: syz-executor.2 Not tainted 5.16.0-syzkaller-11627-g422ee58dc0ef #0\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011\nRIP: 0010:unregister_netdevice_many+0x1246/0x1850 net/core/dev.c:10367\nCode: 0f 85 9b ee ff ff e8 69 07 4b fa ba 7f 28 00 00 48 c7 c6 00 90 ae 8a 48 c7 c7 40 90 ae 8a c6 05 6d b1 51 06 01 e8 8c 90 d8 01 \u003c0f\u003e 0b e9 70 ee ff ff e8 3e 07 4b fa 4c 89 e7 e8 86 2a 59 fa e9 ee\nRSP: 0018:ffffc900046ff6e0 EFLAGS: 00010286\nRAX: 0000000000000000 RBX: 0000000000000000 RCX: 0000000000000000\nRDX: ffff888050f51d00 RSI: ffffffff815fa008 RDI: fffff520008dfece\nRBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000\nR10: ffffffff815f3d6e R11: 0000000000000000 R12: 00000000fffffff4\nR13: dffffc0000000000 R14: ffffc900046ff750 R15: ffff88807b7dc000\nFS: 00007f4ab736e700(0000) GS:ffff8880b9d00000(0000) knlGS:0000000000000000\nCS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 00007fee0b4f8990 CR3: 000000001e7d2000 CR4: 00000000003506e0\nDR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\nDR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\nCall Trace:\n \u003cTASK\u003e\n mroute_clean_tables+0x244/0xb40 net/ipv6/ip6mr.c:1509\n ip6mr_free_table net/ipv6/ip6mr.c:389 [inline]\n ip6mr_rules_init net/ipv6/ip6mr.c:246 [inline]\n ip6mr_net_init net/ipv6/ip6mr.c:1306 [inline]\n ip6mr_net_init+0x3f0/0x4e0 net/ipv6/ip6mr.c:1298\n ops_init+0xaf/0x470 net/core/net_namespace.c:140\n setup_net+0x54f/0xbb0 net/core/net_namespace.c:331\n copy_net_ns+0x318/0x760 net/core/net_namespace.c:475\n create_new_namespaces+0x3f6/0xb20 kernel/nsproxy.c:110\n copy_namespaces+0x391/0x450 kernel/nsproxy.c:178\n copy_process+0x2e0c/0x7300 kernel/fork.c:2167\n kernel_clone+0xe7/0xab0 kernel/fork.c:2555\n __do_sys_clone+0xc8/0x110 kernel/fork.c:2672\n do_syscall_x64 arch/x86/entry/common.c:50 [inline]\n do_syscall_64+0x35/0xb0 arch/x86/entry/common.c:80\n entry_SYSCALL_64_after_hwframe+0x44/0xae\nRIP: 0033:0x7f4ab89f9059\nCode: Unable to access opcode bytes at RIP 0x7f4ab89f902f.\nRSP: 002b:00007f4ab736e118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038\nRAX: ffffffffffffffda RBX: 00007f4ab8b0bf60 RCX: 00007f4ab89f9059\nRDX: 0000000020000280 RSI: 0000000020000270 RDI: 0000000040200000\nRBP: 00007f4ab8a5308d R08: 0000000020000300 R09: 0000000020000300\nR10: 00000000200002c0 R11: 0000000000000206 R12: 0000000000000000\nR13: 00007ffc3977cc1f R14: 00007f4ab736e300 R15: 0000000000022000\n \u003c/TASK\u003e",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-48810",
"url": "https://www.suse.com/security/cve/CVE-2022-48810"
},
{
"category": "external",
"summary": "SUSE Bug 1227936 for CVE-2022-48810",
"url": "https://bugzilla.suse.com/1227936"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-16T09:14:50Z",
"details": "moderate"
}
],
"title": "CVE-2022-48810"
},
{
"cve": "CVE-2022-48811",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-48811"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nibmvnic: don\u0027t release napi in __ibmvnic_open()\n\nIf __ibmvnic_open() encounters an error such as when setting link state,\nit calls release_resources() which frees the napi structures needlessly.\nInstead, have __ibmvnic_open() only clean up the work it did so far (i.e.\ndisable napi and irqs) and leave the rest to the callers.\n\nIf caller of __ibmvnic_open() is ibmvnic_open(), it should release the\nresources immediately. If the caller is do_reset() or do_hard_reset(),\nthey will release the resources on the next reset.\n\nThis fixes following crash that occurred when running the drmgr command\nseveral times to add/remove a vnic interface:\n\n\t[102056] ibmvnic 30000003 env3: Disabling rx_scrq[6] irq\n\t[102056] ibmvnic 30000003 env3: Disabling rx_scrq[7] irq\n\t[102056] ibmvnic 30000003 env3: Replenished 8 pools\n\tKernel attempted to read user page (10) - exploit attempt? (uid: 0)\n\tBUG: Kernel NULL pointer dereference on read at 0x00000010\n\tFaulting instruction address: 0xc000000000a3c840\n\tOops: Kernel access of bad area, sig: 11 [#1]\n\tLE PAGE_SIZE=64K MMU=Radix SMP NR_CPUS=2048 NUMA pSeries\n\t...\n\tCPU: 9 PID: 102056 Comm: kworker/9:2 Kdump: loaded Not tainted 5.16.0-rc5-autotest-g6441998e2e37 #1\n\tWorkqueue: events_long __ibmvnic_reset [ibmvnic]\n\tNIP: c000000000a3c840 LR: c0080000029b5378 CTR: c000000000a3c820\n\tREGS: c0000000548e37e0 TRAP: 0300 Not tainted (5.16.0-rc5-autotest-g6441998e2e37)\n\tMSR: 8000000000009033 \u003cSF,EE,ME,IR,DR,RI,LE\u003e CR: 28248484 XER: 00000004\n\tCFAR: c0080000029bdd24 DAR: 0000000000000010 DSISR: 40000000 IRQMASK: 0\n\tGPR00: c0080000029b55d0 c0000000548e3a80 c0000000028f0200 0000000000000000\n\t...\n\tNIP [c000000000a3c840] napi_enable+0x20/0xc0\n\tLR [c0080000029b5378] __ibmvnic_open+0xf0/0x430 [ibmvnic]\n\tCall Trace:\n\t[c0000000548e3a80] [0000000000000006] 0x6 (unreliable)\n\t[c0000000548e3ab0] [c0080000029b55d0] __ibmvnic_open+0x348/0x430 [ibmvnic]\n\t[c0000000548e3b40] [c0080000029bcc28] __ibmvnic_reset+0x500/0xdf0 [ibmvnic]\n\t[c0000000548e3c60] [c000000000176228] process_one_work+0x288/0x570\n\t[c0000000548e3d00] [c000000000176588] worker_thread+0x78/0x660\n\t[c0000000548e3da0] [c0000000001822f0] kthread+0x1c0/0x1d0\n\t[c0000000548e3e10] [c00000000000cf64] ret_from_kernel_thread+0x5c/0x64\n\tInstruction dump:\n\t7d2948f8 792307e0 4e800020 60000000 3c4c01eb 384239e0 f821ffd1 39430010\n\t38a0fff6 e92d1100 f9210028 39200000 \u003ce9030010\u003e f9010020 60420000 e9210020\n\t---[ end trace 5f8033b08fd27706 ]---",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-48811",
"url": "https://www.suse.com/security/cve/CVE-2022-48811"
},
{
"category": "external",
"summary": "SUSE Bug 1227928 for CVE-2022-48811",
"url": "https://bugzilla.suse.com/1227928"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-16T09:14:50Z",
"details": "moderate"
}
],
"title": "CVE-2022-48811"
},
{
"cve": "CVE-2022-48823",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-48823"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: qedf: Fix refcount issue when LOGO is received during TMF\n\nHung task call trace was seen during LOGO processing.\n\n[ 974.309060] [0000:00:00.0]:[qedf_eh_device_reset:868]: 1:0:2:0: LUN RESET Issued...\n[ 974.309065] [0000:00:00.0]:[qedf_initiate_tmf:2422]: tm_flags 0x10 sc_cmd 00000000c16b930f op = 0x2a target_id = 0x2 lun=0\n[ 974.309178] [0000:00:00.0]:[qedf_initiate_tmf:2431]: portid=016900 tm_flags =LUN RESET\n[ 974.309222] [0000:00:00.0]:[qedf_initiate_tmf:2438]: orig io_req = 00000000ec78df8f xid = 0x180 ref_cnt = 1.\n[ 974.309625] host1: rport 016900: Received LOGO request while in state Ready\n[ 974.309627] host1: rport 016900: Delete port\n[ 974.309642] host1: rport 016900: work event 3\n[ 974.309644] host1: rport 016900: lld callback ev 3\n[ 974.313243] [0000:61:00.2]:[qedf_execute_tmf:2383]:1: fcport is uploading, not executing flush.\n[ 974.313295] [0000:61:00.2]:[qedf_execute_tmf:2400]:1: task mgmt command success...\n[ 984.031088] INFO: task jbd2/dm-15-8:7645 blocked for more than 120 seconds.\n[ 984.031136] Not tainted 4.18.0-305.el8.x86_64 #1\n\n[ 984.031166] \"echo 0 \u003e /proc/sys/kernel/hung_task_timeout_secs\" disables this message.\n[ 984.031209] jbd2/dm-15-8 D 0 7645 2 0x80004080\n[ 984.031212] Call Trace:\n[ 984.031222] __schedule+0x2c4/0x700\n[ 984.031230] ? unfreeze_partials.isra.83+0x16e/0x1a0\n[ 984.031233] ? bit_wait_timeout+0x90/0x90\n[ 984.031235] schedule+0x38/0xa0\n[ 984.031238] io_schedule+0x12/0x40\n[ 984.031240] bit_wait_io+0xd/0x50\n[ 984.031243] __wait_on_bit+0x6c/0x80\n[ 984.031248] ? free_buffer_head+0x21/0x50\n[ 984.031251] out_of_line_wait_on_bit+0x91/0xb0\n[ 984.031257] ? init_wait_var_entry+0x50/0x50\n[ 984.031268] jbd2_journal_commit_transaction+0x112e/0x19f0 [jbd2]\n[ 984.031280] kjournald2+0xbd/0x270 [jbd2]\n[ 984.031284] ? finish_wait+0x80/0x80\n[ 984.031291] ? commit_timeout+0x10/0x10 [jbd2]\n[ 984.031294] kthread+0x116/0x130\n[ 984.031300] ? kthread_flush_work_fn+0x10/0x10\n[ 984.031305] ret_from_fork+0x1f/0x40\n\nThere was a ref count issue when LOGO is received during TMF. This leads to\none of the I/Os hanging with the driver. Fix the ref count.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-48823",
"url": "https://www.suse.com/security/cve/CVE-2022-48823"
},
{
"category": "external",
"summary": "SUSE Bug 1228045 for CVE-2022-48823",
"url": "https://bugzilla.suse.com/1228045"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-16T09:14:50Z",
"details": "low"
}
],
"title": "CVE-2022-48823"
},
{
"cve": "CVE-2022-48826",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-48826"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/vc4: Fix deadlock on DSI device attach error\n\nDSI device attach to DSI host will be done with host device\u0027s lock\nheld.\n\nUn-registering host in \"device attach\" error path (ex: probe retry)\nwill result in deadlock with below call trace and non operational\nDSI display.\n\nStartup Call trace:\n[ 35.043036] rt_mutex_slowlock.constprop.21+0x184/0x1b8\n[ 35.043048] mutex_lock_nested+0x7c/0xc8\n[ 35.043060] device_del+0x4c/0x3e8\n[ 35.043075] device_unregister+0x20/0x40\n[ 35.043082] mipi_dsi_remove_device_fn+0x18/0x28\n[ 35.043093] device_for_each_child+0x68/0xb0\n[ 35.043105] mipi_dsi_host_unregister+0x40/0x90\n[ 35.043115] vc4_dsi_host_attach+0xf0/0x120 [vc4]\n[ 35.043199] mipi_dsi_attach+0x30/0x48\n[ 35.043209] tc358762_probe+0x128/0x164 [tc358762]\n[ 35.043225] mipi_dsi_drv_probe+0x28/0x38\n[ 35.043234] really_probe+0xc0/0x318\n[ 35.043244] __driver_probe_device+0x80/0xe8\n[ 35.043254] driver_probe_device+0xb8/0x118\n[ 35.043263] __device_attach_driver+0x98/0xe8\n[ 35.043273] bus_for_each_drv+0x84/0xd8\n[ 35.043281] __device_attach+0xf0/0x150\n[ 35.043290] device_initial_probe+0x1c/0x28\n[ 35.043300] bus_probe_device+0xa4/0xb0\n[ 35.043308] deferred_probe_work_func+0xa0/0xe0\n[ 35.043318] process_one_work+0x254/0x700\n[ 35.043330] worker_thread+0x4c/0x448\n[ 35.043339] kthread+0x19c/0x1a8\n[ 35.043348] ret_from_fork+0x10/0x20\n\nShutdown Call trace:\n[ 365.565417] Call trace:\n[ 365.565423] __switch_to+0x148/0x200\n[ 365.565452] __schedule+0x340/0x9c8\n[ 365.565467] schedule+0x48/0x110\n[ 365.565479] schedule_timeout+0x3b0/0x448\n[ 365.565496] wait_for_completion+0xac/0x138\n[ 365.565509] __flush_work+0x218/0x4e0\n[ 365.565523] flush_work+0x1c/0x28\n[ 365.565536] wait_for_device_probe+0x68/0x158\n[ 365.565550] device_shutdown+0x24/0x348\n[ 365.565561] kernel_restart_prepare+0x40/0x50\n[ 365.565578] kernel_restart+0x20/0x70\n[ 365.565591] __do_sys_reboot+0x10c/0x220\n[ 365.565605] __arm64_sys_reboot+0x2c/0x38\n[ 365.565619] invoke_syscall+0x4c/0x110\n[ 365.565634] el0_svc_common.constprop.3+0xfc/0x120\n[ 365.565648] do_el0_svc+0x2c/0x90\n[ 365.565661] el0_svc+0x4c/0xf0\n[ 365.565671] el0t_64_sync_handler+0x90/0xb8\n[ 365.565682] el0t_64_sync+0x180/0x184",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-48826",
"url": "https://www.suse.com/security/cve/CVE-2022-48826"
},
{
"category": "external",
"summary": "SUSE Bug 1227975 for CVE-2022-48826",
"url": "https://bugzilla.suse.com/1227975"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-16T09:14:50Z",
"details": "moderate"
}
],
"title": "CVE-2022-48826"
},
{
"cve": "CVE-2022-48827",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-48827"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nNFSD: Fix the behavior of READ near OFFSET_MAX\n\nDan Aloni reports:\n\u003e Due to commit 8cfb9015280d (\"NFS: Always provide aligned buffers to\n\u003e the RPC read layers\") on the client, a read of 0xfff is aligned up\n\u003e to server rsize of 0x1000.\n\u003e\n\u003e As a result, in a test where the server has a file of size\n\u003e 0x7fffffffffffffff, and the client tries to read from the offset\n\u003e 0x7ffffffffffff000, the read causes loff_t overflow in the server\n\u003e and it returns an NFS code of EINVAL to the client. The client as\n\u003e a result indefinitely retries the request.\n\nThe Linux NFS client does not handle NFS?ERR_INVAL, even though all\nNFS specifications permit servers to return that status code for a\nREAD.\n\nInstead of NFS?ERR_INVAL, have out-of-range READ requests succeed\nand return a short result. Set the EOF flag in the result to prevent\nthe client from retrying the READ request. This behavior appears to\nbe consistent with Solaris NFS servers.\n\nNote that NFSv3 and NFSv4 use u64 offset values on the wire. These\nmust be converted to loff_t internally before use -- an implicit\ntype cast is not adequate for this purpose. Otherwise VFS checks\nagainst sb-\u003es_maxbytes do not work properly.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-48827",
"url": "https://www.suse.com/security/cve/CVE-2022-48827"
},
{
"category": "external",
"summary": "SUSE Bug 1228037 for CVE-2022-48827",
"url": "https://bugzilla.suse.com/1228037"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-16T09:14:50Z",
"details": "moderate"
}
],
"title": "CVE-2022-48827"
},
{
"cve": "CVE-2022-48828",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-48828"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nNFSD: Fix ia_size underflow\n\niattr::ia_size is a loff_t, which is a signed 64-bit type. NFSv3 and\nNFSv4 both define file size as an unsigned 64-bit type. Thus there\nis a range of valid file size values an NFS client can send that is\nalready larger than Linux can handle.\n\nCurrently decode_fattr4() dumps a full u64 value into ia_size. If\nthat value happens to be larger than S64_MAX, then ia_size\nunderflows. I\u0027m about to fix up the NFSv3 behavior as well, so let\u0027s\ncatch the underflow in the common code path: nfsd_setattr().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-48828",
"url": "https://www.suse.com/security/cve/CVE-2022-48828"
},
{
"category": "external",
"summary": "SUSE Bug 1228054 for CVE-2022-48828",
"url": "https://bugzilla.suse.com/1228054"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-16T09:14:50Z",
"details": "moderate"
}
],
"title": "CVE-2022-48828"
},
{
"cve": "CVE-2022-48829",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-48829"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nNFSD: Fix NFSv3 SETATTR/CREATE\u0027s handling of large file sizes\n\niattr::ia_size is a loff_t, so these NFSv3 procedures must be\ncareful to deal with incoming client size values that are larger\nthan s64_max without corrupting the value.\n\nSilently capping the value results in storing a different value\nthan the client passed in which is unexpected behavior, so remove\nthe min_t() check in decode_sattr3().\n\nNote that RFC 1813 permits only the WRITE procedure to return\nNFS3ERR_FBIG. We believe that NFSv3 reference implementations\nalso return NFS3ERR_FBIG when ia_size is too large.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-48829",
"url": "https://www.suse.com/security/cve/CVE-2022-48829"
},
{
"category": "external",
"summary": "SUSE Bug 1228055 for CVE-2022-48829",
"url": "https://bugzilla.suse.com/1228055"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-16T09:14:50Z",
"details": "moderate"
}
],
"title": "CVE-2022-48829"
},
{
"cve": "CVE-2022-48836",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-48836"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nInput: aiptek - properly check endpoint type\n\nSyzbot reported warning in usb_submit_urb() which is caused by wrong\nendpoint type. There was a check for the number of endpoints, but not\nfor the type of endpoint.\n\nFix it by replacing old desc.bNumEndpoints check with\nusb_find_common_endpoints() helper for finding endpoints\n\nFail log:\n\nusb 5-1: BOGUS urb xfer, pipe 1 != type 3\nWARNING: CPU: 2 PID: 48 at drivers/usb/core/urb.c:502 usb_submit_urb+0xed2/0x18a0 drivers/usb/core/urb.c:502\nModules linked in:\nCPU: 2 PID: 48 Comm: kworker/2:2 Not tainted 5.17.0-rc6-syzkaller-00226-g07ebd38a0da2 #0\nHardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.14.0-2 04/01/2014\nWorkqueue: usb_hub_wq hub_event\n...\nCall Trace:\n \u003cTASK\u003e\n aiptek_open+0xd5/0x130 drivers/input/tablet/aiptek.c:830\n input_open_device+0x1bb/0x320 drivers/input/input.c:629\n kbd_connect+0xfe/0x160 drivers/tty/vt/keyboard.c:1593",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-48836",
"url": "https://www.suse.com/security/cve/CVE-2022-48836"
},
{
"category": "external",
"summary": "SUSE Bug 1227989 for CVE-2022-48836",
"url": "https://bugzilla.suse.com/1227989"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-16T09:14:50Z",
"details": "moderate"
}
],
"title": "CVE-2022-48836"
},
{
"cve": "CVE-2022-48839",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-48839"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/packet: fix slab-out-of-bounds access in packet_recvmsg()\n\nsyzbot found that when an AF_PACKET socket is using PACKET_COPY_THRESH\nand mmap operations, tpacket_rcv() is queueing skbs with\ngarbage in skb-\u003ecb[], triggering a too big copy [1]\n\nPresumably, users of af_packet using mmap() already gets correct\nmetadata from the mapped buffer, we can simply make sure\nto clear 12 bytes that might be copied to user space later.\n\nBUG: KASAN: stack-out-of-bounds in memcpy include/linux/fortify-string.h:225 [inline]\nBUG: KASAN: stack-out-of-bounds in packet_recvmsg+0x56c/0x1150 net/packet/af_packet.c:3489\nWrite of size 165 at addr ffffc9000385fb78 by task syz-executor233/3631\n\nCPU: 0 PID: 3631 Comm: syz-executor233 Not tainted 5.17.0-rc7-syzkaller-02396-g0b3660695e80 #0\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011\nCall Trace:\n \u003cTASK\u003e\n __dump_stack lib/dump_stack.c:88 [inline]\n dump_stack_lvl+0xcd/0x134 lib/dump_stack.c:106\n print_address_description.constprop.0.cold+0xf/0x336 mm/kasan/report.c:255\n __kasan_report mm/kasan/report.c:442 [inline]\n kasan_report.cold+0x83/0xdf mm/kasan/report.c:459\n check_region_inline mm/kasan/generic.c:183 [inline]\n kasan_check_range+0x13d/0x180 mm/kasan/generic.c:189\n memcpy+0x39/0x60 mm/kasan/shadow.c:66\n memcpy include/linux/fortify-string.h:225 [inline]\n packet_recvmsg+0x56c/0x1150 net/packet/af_packet.c:3489\n sock_recvmsg_nosec net/socket.c:948 [inline]\n sock_recvmsg net/socket.c:966 [inline]\n sock_recvmsg net/socket.c:962 [inline]\n ____sys_recvmsg+0x2c4/0x600 net/socket.c:2632\n ___sys_recvmsg+0x127/0x200 net/socket.c:2674\n __sys_recvmsg+0xe2/0x1a0 net/socket.c:2704\n do_syscall_x64 arch/x86/entry/common.c:50 [inline]\n do_syscall_64+0x35/0xb0 arch/x86/entry/common.c:80\n entry_SYSCALL_64_after_hwframe+0x44/0xae\nRIP: 0033:0x7fdfd5954c29\nCode: 28 00 00 00 75 05 48 83 c4 28 c3 e8 41 15 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 \u003c48\u003e 3d 01 f0 ff ff 73 01 c3 48 c7 c1 c0 ff ff ff f7 d8 64 89 01 48\nRSP: 002b:00007ffcf8e71e48 EFLAGS: 00000246 ORIG_RAX: 000000000000002f\nRAX: ffffffffffffffda RBX: 0000000000000003 RCX: 00007fdfd5954c29\nRDX: 0000000000000000 RSI: 0000000020000500 RDI: 0000000000000005\nRBP: 0000000000000000 R08: 000000000000000d R09: 000000000000000d\nR10: 0000000000000000 R11: 0000000000000246 R12: 00007ffcf8e71e60\nR13: 00000000000f4240 R14: 000000000000c1ff R15: 00007ffcf8e71e54\n \u003c/TASK\u003e\n\naddr ffffc9000385fb78 is located in stack of task syz-executor233/3631 at offset 32 in frame:\n ____sys_recvmsg+0x0/0x600 include/linux/uio.h:246\n\nthis frame has 1 object:\n [32, 160) \u0027addr\u0027\n\nMemory state around the buggy address:\n ffffc9000385fa80: 00 04 f3 f3 f3 f3 f3 00 00 00 00 00 00 00 00 00\n ffffc9000385fb00: 00 00 00 00 00 00 00 00 00 00 00 f1 f1 f1 f1 00\n\u003effffc9000385fb80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 f3\n ^\n ffffc9000385fc00: f3 f3 f3 00 00 00 00 00 00 00 00 00 00 00 00 f1\n ffffc9000385fc80: f1 f1 f1 00 f2 f2 f2 00 f2 f2 f2 00 00 00 00 00\n==================================================================",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-48839",
"url": "https://www.suse.com/security/cve/CVE-2022-48839"
},
{
"category": "external",
"summary": "SUSE Bug 1227985 for CVE-2022-48839",
"url": "https://bugzilla.suse.com/1227985"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-16T09:14:50Z",
"details": "moderate"
}
],
"title": "CVE-2022-48839"
},
{
"cve": "CVE-2022-48850",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-48850"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet-sysfs: add check for netdevice being present to speed_show\n\nWhen bringing down the netdevice or system shutdown, a panic can be\ntriggered while accessing the sysfs path because the device is already\nremoved.\n\n [ 755.549084] mlx5_core 0000:12:00.1: Shutdown was called\n [ 756.404455] mlx5_core 0000:12:00.0: Shutdown was called\n ...\n [ 757.937260] BUG: unable to handle kernel NULL pointer dereference at (null)\n [ 758.031397] IP: [\u003cffffffff8ee11acb\u003e] dma_pool_alloc+0x1ab/0x280\n\n crash\u003e bt\n ...\n PID: 12649 TASK: ffff8924108f2100 CPU: 1 COMMAND: \"amsd\"\n ...\n #9 [ffff89240e1a38b0] page_fault at ffffffff8f38c778\n [exception RIP: dma_pool_alloc+0x1ab]\n RIP: ffffffff8ee11acb RSP: ffff89240e1a3968 RFLAGS: 00010046\n RAX: 0000000000000246 RBX: ffff89243d874100 RCX: 0000000000001000\n RDX: 0000000000000000 RSI: 0000000000000246 RDI: ffff89243d874090\n RBP: ffff89240e1a39c0 R8: 000000000001f080 R9: ffff8905ffc03c00\n R10: ffffffffc04680d4 R11: ffffffff8edde9fd R12: 00000000000080d0\n R13: ffff89243d874090 R14: ffff89243d874080 R15: 0000000000000000\n ORIG_RAX: ffffffffffffffff CS: 0010 SS: 0018\n #10 [ffff89240e1a39c8] mlx5_alloc_cmd_msg at ffffffffc04680f3 [mlx5_core]\n #11 [ffff89240e1a3a18] cmd_exec at ffffffffc046ad62 [mlx5_core]\n #12 [ffff89240e1a3ab8] mlx5_cmd_exec at ffffffffc046b4fb [mlx5_core]\n #13 [ffff89240e1a3ae8] mlx5_core_access_reg at ffffffffc0475434 [mlx5_core]\n #14 [ffff89240e1a3b40] mlx5e_get_fec_caps at ffffffffc04a7348 [mlx5_core]\n #15 [ffff89240e1a3bb0] get_fec_supported_advertised at ffffffffc04992bf [mlx5_core]\n #16 [ffff89240e1a3c08] mlx5e_get_link_ksettings at ffffffffc049ab36 [mlx5_core]\n #17 [ffff89240e1a3ce8] __ethtool_get_link_ksettings at ffffffff8f25db46\n #18 [ffff89240e1a3d48] speed_show at ffffffff8f277208\n #19 [ffff89240e1a3dd8] dev_attr_show at ffffffff8f0b70e3\n #20 [ffff89240e1a3df8] sysfs_kf_seq_show at ffffffff8eedbedf\n #21 [ffff89240e1a3e18] kernfs_seq_show at ffffffff8eeda596\n #22 [ffff89240e1a3e28] seq_read at ffffffff8ee76d10\n #23 [ffff89240e1a3e98] kernfs_fop_read at ffffffff8eedaef5\n #24 [ffff89240e1a3ed8] vfs_read at ffffffff8ee4e3ff\n #25 [ffff89240e1a3f08] sys_read at ffffffff8ee4f27f\n #26 [ffff89240e1a3f50] system_call_fastpath at ffffffff8f395f92\n\n crash\u003e net_device.state ffff89443b0c0000\n state = 0x5 (__LINK_STATE_START| __LINK_STATE_NOCARRIER)\n\nTo prevent this scenario, we also make sure that the netdevice is present.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-48850",
"url": "https://www.suse.com/security/cve/CVE-2022-48850"
},
{
"category": "external",
"summary": "SUSE Bug 1228071 for CVE-2022-48850",
"url": "https://bugzilla.suse.com/1228071"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-16T09:14:50Z",
"details": "moderate"
}
],
"title": "CVE-2022-48850"
},
{
"cve": "CVE-2022-48855",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-48855"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsctp: fix kernel-infoleak for SCTP sockets\n\nsyzbot reported a kernel infoleak [1] of 4 bytes.\n\nAfter analysis, it turned out r-\u003eidiag_expires is not initialized\nif inet_sctp_diag_fill() calls inet_diag_msg_common_fill()\n\nMake sure to clear idiag_timer/idiag_retrans/idiag_expires\nand let inet_diag_msg_sctpasoc_fill() fill them again if needed.\n\n[1]\n\nBUG: KMSAN: kernel-infoleak in instrument_copy_to_user include/linux/instrumented.h:121 [inline]\nBUG: KMSAN: kernel-infoleak in copyout lib/iov_iter.c:154 [inline]\nBUG: KMSAN: kernel-infoleak in _copy_to_iter+0x6ef/0x25a0 lib/iov_iter.c:668\n instrument_copy_to_user include/linux/instrumented.h:121 [inline]\n copyout lib/iov_iter.c:154 [inline]\n _copy_to_iter+0x6ef/0x25a0 lib/iov_iter.c:668\n copy_to_iter include/linux/uio.h:162 [inline]\n simple_copy_to_iter+0xf3/0x140 net/core/datagram.c:519\n __skb_datagram_iter+0x2d5/0x11b0 net/core/datagram.c:425\n skb_copy_datagram_iter+0xdc/0x270 net/core/datagram.c:533\n skb_copy_datagram_msg include/linux/skbuff.h:3696 [inline]\n netlink_recvmsg+0x669/0x1c80 net/netlink/af_netlink.c:1977\n sock_recvmsg_nosec net/socket.c:948 [inline]\n sock_recvmsg net/socket.c:966 [inline]\n __sys_recvfrom+0x795/0xa10 net/socket.c:2097\n __do_sys_recvfrom net/socket.c:2115 [inline]\n __se_sys_recvfrom net/socket.c:2111 [inline]\n __x64_sys_recvfrom+0x19d/0x210 net/socket.c:2111\n do_syscall_x64 arch/x86/entry/common.c:51 [inline]\n do_syscall_64+0x54/0xd0 arch/x86/entry/common.c:82\n entry_SYSCALL_64_after_hwframe+0x44/0xae\n\nUninit was created at:\n slab_post_alloc_hook mm/slab.h:737 [inline]\n slab_alloc_node mm/slub.c:3247 [inline]\n __kmalloc_node_track_caller+0xe0c/0x1510 mm/slub.c:4975\n kmalloc_reserve net/core/skbuff.c:354 [inline]\n __alloc_skb+0x545/0xf90 net/core/skbuff.c:426\n alloc_skb include/linux/skbuff.h:1158 [inline]\n netlink_dump+0x3e5/0x16c0 net/netlink/af_netlink.c:2248\n __netlink_dump_start+0xcf8/0xe90 net/netlink/af_netlink.c:2373\n netlink_dump_start include/linux/netlink.h:254 [inline]\n inet_diag_handler_cmd+0x2e7/0x400 net/ipv4/inet_diag.c:1341\n sock_diag_rcv_msg+0x24a/0x620\n netlink_rcv_skb+0x40c/0x7e0 net/netlink/af_netlink.c:2494\n sock_diag_rcv+0x63/0x80 net/core/sock_diag.c:277\n netlink_unicast_kernel net/netlink/af_netlink.c:1317 [inline]\n netlink_unicast+0x1093/0x1360 net/netlink/af_netlink.c:1343\n netlink_sendmsg+0x14d9/0x1720 net/netlink/af_netlink.c:1919\n sock_sendmsg_nosec net/socket.c:705 [inline]\n sock_sendmsg net/socket.c:725 [inline]\n sock_write_iter+0x594/0x690 net/socket.c:1061\n do_iter_readv_writev+0xa7f/0xc70\n do_iter_write+0x52c/0x1500 fs/read_write.c:851\n vfs_writev fs/read_write.c:924 [inline]\n do_writev+0x645/0xe00 fs/read_write.c:967\n __do_sys_writev fs/read_write.c:1040 [inline]\n __se_sys_writev fs/read_write.c:1037 [inline]\n __x64_sys_writev+0xe5/0x120 fs/read_write.c:1037\n do_syscall_x64 arch/x86/entry/common.c:51 [inline]\n do_syscall_64+0x54/0xd0 arch/x86/entry/common.c:82\n entry_SYSCALL_64_after_hwframe+0x44/0xae\n\nBytes 68-71 of 2508 are uninitialized\nMemory access of size 2508 starts at ffff888114f9b000\nData copied to user address 00007f7fe09ff2e0\n\nCPU: 1 PID: 3478 Comm: syz-executor306 Not tainted 5.17.0-rc4-syzkaller #0\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-48855",
"url": "https://www.suse.com/security/cve/CVE-2022-48855"
},
{
"category": "external",
"summary": "SUSE Bug 1228003 for CVE-2022-48855",
"url": "https://bugzilla.suse.com/1228003"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-16T09:14:50Z",
"details": "moderate"
}
],
"title": "CVE-2022-48855"
},
{
"cve": "CVE-2022-48857",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-48857"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nNFC: port100: fix use-after-free in port100_send_complete\n\nSyzbot reported UAF in port100_send_complete(). The root case is in\nmissing usb_kill_urb() calls on error handling path of -\u003eprobe function.\n\nport100_send_complete() accesses devm allocated memory which will be\nfreed on probe failure. We should kill this urbs before returning an\nerror from probe function to prevent reported use-after-free\n\nFail log:\n\nBUG: KASAN: use-after-free in port100_send_complete+0x16e/0x1a0 drivers/nfc/port100.c:935\nRead of size 1 at addr ffff88801bb59540 by task ksoftirqd/2/26\n...\nCall Trace:\n \u003cTASK\u003e\n __dump_stack lib/dump_stack.c:88 [inline]\n dump_stack_lvl+0xcd/0x134 lib/dump_stack.c:106\n print_address_description.constprop.0.cold+0x8d/0x303 mm/kasan/report.c:255\n __kasan_report mm/kasan/report.c:442 [inline]\n kasan_report.cold+0x83/0xdf mm/kasan/report.c:459\n port100_send_complete+0x16e/0x1a0 drivers/nfc/port100.c:935\n __usb_hcd_giveback_urb+0x2b0/0x5c0 drivers/usb/core/hcd.c:1670\n\n...\n\nAllocated by task 1255:\n kasan_save_stack+0x1e/0x40 mm/kasan/common.c:38\n kasan_set_track mm/kasan/common.c:45 [inline]\n set_alloc_info mm/kasan/common.c:436 [inline]\n ____kasan_kmalloc mm/kasan/common.c:515 [inline]\n ____kasan_kmalloc mm/kasan/common.c:474 [inline]\n __kasan_kmalloc+0xa6/0xd0 mm/kasan/common.c:524\n alloc_dr drivers/base/devres.c:116 [inline]\n devm_kmalloc+0x96/0x1d0 drivers/base/devres.c:823\n devm_kzalloc include/linux/device.h:209 [inline]\n port100_probe+0x8a/0x1320 drivers/nfc/port100.c:1502\n\nFreed by task 1255:\n kasan_save_stack+0x1e/0x40 mm/kasan/common.c:38\n kasan_set_track+0x21/0x30 mm/kasan/common.c:45\n kasan_set_free_info+0x20/0x30 mm/kasan/generic.c:370\n ____kasan_slab_free mm/kasan/common.c:366 [inline]\n ____kasan_slab_free+0xff/0x140 mm/kasan/common.c:328\n kasan_slab_free include/linux/kasan.h:236 [inline]\n __cache_free mm/slab.c:3437 [inline]\n kfree+0xf8/0x2b0 mm/slab.c:3794\n release_nodes+0x112/0x1a0 drivers/base/devres.c:501\n devres_release_all+0x114/0x190 drivers/base/devres.c:530\n really_probe+0x626/0xcc0 drivers/base/dd.c:670",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-48857",
"url": "https://www.suse.com/security/cve/CVE-2022-48857"
},
{
"category": "external",
"summary": "SUSE Bug 1228005 for CVE-2022-48857",
"url": "https://bugzilla.suse.com/1228005"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-16T09:14:50Z",
"details": "moderate"
}
],
"title": "CVE-2022-48857"
},
{
"cve": "CVE-2022-48860",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-48860"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nethernet: Fix error handling in xemaclite_of_probe\n\nThis node pointer is returned by of_parse_phandle() with refcount\nincremented in this function. Calling of_node_put() to avoid the\nrefcount leak. As the remove function do.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-48860",
"url": "https://www.suse.com/security/cve/CVE-2022-48860"
},
{
"category": "external",
"summary": "SUSE Bug 1228008 for CVE-2022-48860",
"url": "https://bugzilla.suse.com/1228008"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-16T09:14:50Z",
"details": "moderate"
}
],
"title": "CVE-2022-48860"
},
{
"cve": "CVE-2022-48863",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-48863"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmISDN: Fix memory leak in dsp_pipeline_build()\n\ndsp_pipeline_build() allocates dup pointer by kstrdup(cfg),\nbut then it updates dup variable by strsep(\u0026dup, \"|\").\nAs a result when it calls kfree(dup), the dup variable contains NULL.\n\nFound by Linux Driver Verification project (linuxtesting.org) with SVACE.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-48863",
"url": "https://www.suse.com/security/cve/CVE-2022-48863"
},
{
"category": "external",
"summary": "SUSE Bug 1228063 for CVE-2022-48863",
"url": "https://bugzilla.suse.com/1228063"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-16T09:14:50Z",
"details": "moderate"
}
],
"title": "CVE-2022-48863"
},
{
"cve": "CVE-2023-52435",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-52435"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: prevent mss overflow in skb_segment()\n\nOnce again syzbot is able to crash the kernel in skb_segment() [1]\n\nGSO_BY_FRAGS is a forbidden value, but unfortunately the following\ncomputation in skb_segment() can reach it quite easily :\n\n\tmss = mss * partial_segs;\n\n65535 = 3 * 5 * 17 * 257, so many initial values of mss can lead to\na bad final result.\n\nMake sure to limit segmentation so that the new mss value is smaller\nthan GSO_BY_FRAGS.\n\n[1]\n\ngeneral protection fault, probably for non-canonical address 0xdffffc000000000e: 0000 [#1] PREEMPT SMP KASAN\nKASAN: null-ptr-deref in range [0x0000000000000070-0x0000000000000077]\nCPU: 1 PID: 5079 Comm: syz-executor993 Not tainted 6.7.0-rc4-syzkaller-00141-g1ae4cd3cbdd0 #0\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/10/2023\nRIP: 0010:skb_segment+0x181d/0x3f30 net/core/skbuff.c:4551\nCode: 83 e3 02 e9 fb ed ff ff e8 90 68 1c f9 48 8b 84 24 f8 00 00 00 48 8d 78 70 48 b8 00 00 00 00 00 fc ff df 48 89 fa 48 c1 ea 03 \u003c0f\u003e b6 04 02 84 c0 74 08 3c 03 0f 8e 8a 21 00 00 48 8b 84 24 f8 00\nRSP: 0018:ffffc900043473d0 EFLAGS: 00010202\nRAX: dffffc0000000000 RBX: 0000000000010046 RCX: ffffffff886b1597\nRDX: 000000000000000e RSI: ffffffff886b2520 RDI: 0000000000000070\nRBP: ffffc90004347578 R08: 0000000000000005 R09: 000000000000ffff\nR10: 000000000000ffff R11: 0000000000000002 R12: ffff888063202ac0\nR13: 0000000000010000 R14: 000000000000ffff R15: 0000000000000046\nFS: 0000555556e7e380(0000) GS:ffff8880b9900000(0000) knlGS:0000000000000000\nCS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 0000000020010000 CR3: 0000000027ee2000 CR4: 00000000003506f0\nDR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\nDR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\nCall Trace:\n\u003cTASK\u003e\nudp6_ufo_fragment+0xa0e/0xd00 net/ipv6/udp_offload.c:109\nipv6_gso_segment+0x534/0x17e0 net/ipv6/ip6_offload.c:120\nskb_mac_gso_segment+0x290/0x610 net/core/gso.c:53\n__skb_gso_segment+0x339/0x710 net/core/gso.c:124\nskb_gso_segment include/net/gso.h:83 [inline]\nvalidate_xmit_skb+0x36c/0xeb0 net/core/dev.c:3626\n__dev_queue_xmit+0x6f3/0x3d60 net/core/dev.c:4338\ndev_queue_xmit include/linux/netdevice.h:3134 [inline]\npacket_xmit+0x257/0x380 net/packet/af_packet.c:276\npacket_snd net/packet/af_packet.c:3087 [inline]\npacket_sendmsg+0x24c6/0x5220 net/packet/af_packet.c:3119\nsock_sendmsg_nosec net/socket.c:730 [inline]\n__sock_sendmsg+0xd5/0x180 net/socket.c:745\n__sys_sendto+0x255/0x340 net/socket.c:2190\n__do_sys_sendto net/socket.c:2202 [inline]\n__se_sys_sendto net/socket.c:2198 [inline]\n__x64_sys_sendto+0xe0/0x1b0 net/socket.c:2198\ndo_syscall_x64 arch/x86/entry/common.c:52 [inline]\ndo_syscall_64+0x40/0x110 arch/x86/entry/common.c:83\nentry_SYSCALL_64_after_hwframe+0x63/0x6b\nRIP: 0033:0x7f8692032aa9\nCode: 28 00 00 00 75 05 48 83 c4 28 c3 e8 d1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 \u003c48\u003e 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48\nRSP: 002b:00007fff8d685418 EFLAGS: 00000246 ORIG_RAX: 000000000000002c\nRAX: ffffffffffffffda RBX: 0000000000000003 RCX: 00007f8692032aa9\nRDX: 0000000000010048 RSI: 00000000200000c0 RDI: 0000000000000003\nRBP: 00000000000f4240 R08: 0000000020000540 R09: 0000000000000014\nR10: 0000000000000000 R11: 0000000000000246 R12: 00007fff8d685480\nR13: 0000000000000001 R14: 00007fff8d685480 R15: 0000000000000003\n\u003c/TASK\u003e\nModules linked in:\n---[ end trace 0000000000000000 ]---\nRIP: 0010:skb_segment+0x181d/0x3f30 net/core/skbuff.c:4551\nCode: 83 e3 02 e9 fb ed ff ff e8 90 68 1c f9 48 8b 84 24 f8 00 00 00 48 8d 78 70 48 b8 00 00 00 00 00 fc ff df 48 89 fa 48 c1 ea 03 \u003c0f\u003e b6 04 02 84 c0 74 08 3c 03 0f 8e 8a 21 00 00 48 8b 84 24 f8 00\nRSP: 0018:ffffc900043473d0 EFLAGS: 00010202\nRAX: dffffc0000000000 RBX: 0000000000010046 RCX: ffffffff886b1597\nRDX: 000000000000000e RSI: ffffffff886b2520 RDI: 0000000000000070\nRBP: ffffc90004347578 R0\n---truncated---",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-52435",
"url": "https://www.suse.com/security/cve/CVE-2023-52435"
},
{
"category": "external",
"summary": "SUSE Bug 1220138 for CVE-2023-52435",
"url": "https://bugzilla.suse.com/1220138"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-16T09:14:50Z",
"details": "moderate"
}
],
"title": "CVE-2023-52435"
},
{
"cve": "CVE-2023-52594",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-52594"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: ath9k: Fix potential array-index-out-of-bounds read in ath9k_htc_txstatus()\n\nFix an array-index-out-of-bounds read in ath9k_htc_txstatus(). The bug\noccurs when txs-\u003ecnt, data from a URB provided by a USB device, is\nbigger than the size of the array txs-\u003etxstatus, which is\nHTC_MAX_TX_STATUS. WARN_ON() already checks it, but there is no bug\nhandling code after the check. Make the function return if that is the\ncase.\n\nFound by a modified version of syzkaller.\n\nUBSAN: array-index-out-of-bounds in htc_drv_txrx.c\nindex 13 is out of range for type \u0027__wmi_event_txstatus [12]\u0027\nCall Trace:\n ath9k_htc_txstatus\n ath9k_wmi_event_tasklet\n tasklet_action_common\n __do_softirq\n irq_exit_rxu\n sysvec_apic_timer_interrupt",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-52594",
"url": "https://www.suse.com/security/cve/CVE-2023-52594"
},
{
"category": "external",
"summary": "SUSE Bug 1221045 for CVE-2023-52594",
"url": "https://bugzilla.suse.com/1221045"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-16T09:14:50Z",
"details": "moderate"
}
],
"title": "CVE-2023-52594"
},
{
"cve": "CVE-2023-52612",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-52612"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncrypto: scomp - fix req-\u003edst buffer overflow\n\nThe req-\u003edst buffer size should be checked before copying from the\nscomp_scratch-\u003edst to avoid req-\u003edst buffer overflow problem.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-52612",
"url": "https://www.suse.com/security/cve/CVE-2023-52612"
},
{
"category": "external",
"summary": "SUSE Bug 1221616 for CVE-2023-52612",
"url": "https://bugzilla.suse.com/1221616"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-16T09:14:50Z",
"details": "important"
}
],
"title": "CVE-2023-52612"
},
{
"cve": "CVE-2023-52615",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-52615"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nhwrng: core - Fix page fault dead lock on mmap-ed hwrng\n\nThere is a dead-lock in the hwrng device read path. This triggers\nwhen the user reads from /dev/hwrng into memory also mmap-ed from\n/dev/hwrng. The resulting page fault triggers a recursive read\nwhich then dead-locks.\n\nFix this by using a stack buffer when calling copy_to_user.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-52615",
"url": "https://www.suse.com/security/cve/CVE-2023-52615"
},
{
"category": "external",
"summary": "SUSE Bug 1221614 for CVE-2023-52615",
"url": "https://bugzilla.suse.com/1221614"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-16T09:14:50Z",
"details": "moderate"
}
],
"title": "CVE-2023-52615"
},
{
"cve": "CVE-2023-52619",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-52619"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\npstore/ram: Fix crash when setting number of cpus to an odd number\n\nWhen the number of cpu cores is adjusted to 7 or other odd numbers,\nthe zone size will become an odd number.\nThe address of the zone will become:\n addr of zone0 = BASE\n addr of zone1 = BASE + zone_size\n addr of zone2 = BASE + zone_size*2\n ...\nThe address of zone1/3/5/7 will be mapped to non-alignment va.\nEventually crashes will occur when accessing these va.\n\nSo, use ALIGN_DOWN() to make sure the zone size is even\nto avoid this bug.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-52619",
"url": "https://www.suse.com/security/cve/CVE-2023-52619"
},
{
"category": "external",
"summary": "SUSE Bug 1221618 for CVE-2023-52619",
"url": "https://bugzilla.suse.com/1221618"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-16T09:14:50Z",
"details": "moderate"
}
],
"title": "CVE-2023-52619"
},
{
"cve": "CVE-2023-52623",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-52623"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nSUNRPC: Fix a suspicious RCU usage warning\n\nI received the following warning while running cthon against an ontap\nserver running pNFS:\n\n[ 57.202521] =============================\n[ 57.202522] WARNING: suspicious RCU usage\n[ 57.202523] 6.7.0-rc3-g2cc14f52aeb7 #41492 Not tainted\n[ 57.202525] -----------------------------\n[ 57.202525] net/sunrpc/xprtmultipath.c:349 RCU-list traversed in non-reader section!!\n[ 57.202527]\n other info that might help us debug this:\n\n[ 57.202528]\n rcu_scheduler_active = 2, debug_locks = 1\n[ 57.202529] no locks held by test5/3567.\n[ 57.202530]\n stack backtrace:\n[ 57.202532] CPU: 0 PID: 3567 Comm: test5 Not tainted 6.7.0-rc3-g2cc14f52aeb7 #41492 5b09971b4965c0aceba19f3eea324a4a806e227e\n[ 57.202534] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS unknown 2/2/2022\n[ 57.202536] Call Trace:\n[ 57.202537] \u003cTASK\u003e\n[ 57.202540] dump_stack_lvl+0x77/0xb0\n[ 57.202551] lockdep_rcu_suspicious+0x154/0x1a0\n[ 57.202556] rpc_xprt_switch_has_addr+0x17c/0x190 [sunrpc ebe02571b9a8ceebf7d98e71675af20c19bdb1f6]\n[ 57.202596] rpc_clnt_setup_test_and_add_xprt+0x50/0x180 [sunrpc ebe02571b9a8ceebf7d98e71675af20c19bdb1f6]\n[ 57.202621] ? rpc_clnt_add_xprt+0x254/0x300 [sunrpc ebe02571b9a8ceebf7d98e71675af20c19bdb1f6]\n[ 57.202646] rpc_clnt_add_xprt+0x27a/0x300 [sunrpc ebe02571b9a8ceebf7d98e71675af20c19bdb1f6]\n[ 57.202671] ? __pfx_rpc_clnt_setup_test_and_add_xprt+0x10/0x10 [sunrpc ebe02571b9a8ceebf7d98e71675af20c19bdb1f6]\n[ 57.202696] nfs4_pnfs_ds_connect+0x345/0x760 [nfsv4 c716d88496ded0ea6d289bbea684fa996f9b57a9]\n[ 57.202728] ? __pfx_nfs4_test_session_trunk+0x10/0x10 [nfsv4 c716d88496ded0ea6d289bbea684fa996f9b57a9]\n[ 57.202754] nfs4_fl_prepare_ds+0x75/0xc0 [nfs_layout_nfsv41_files e3a4187f18ae8a27b630f9feae6831b584a9360a]\n[ 57.202760] filelayout_write_pagelist+0x4a/0x200 [nfs_layout_nfsv41_files e3a4187f18ae8a27b630f9feae6831b584a9360a]\n[ 57.202765] pnfs_generic_pg_writepages+0xbe/0x230 [nfsv4 c716d88496ded0ea6d289bbea684fa996f9b57a9]\n[ 57.202788] __nfs_pageio_add_request+0x3fd/0x520 [nfs 6c976fa593a7c2976f5a0aeb4965514a828e6902]\n[ 57.202813] nfs_pageio_add_request+0x18b/0x390 [nfs 6c976fa593a7c2976f5a0aeb4965514a828e6902]\n[ 57.202831] nfs_do_writepage+0x116/0x1e0 [nfs 6c976fa593a7c2976f5a0aeb4965514a828e6902]\n[ 57.202849] nfs_writepages_callback+0x13/0x30 [nfs 6c976fa593a7c2976f5a0aeb4965514a828e6902]\n[ 57.202866] write_cache_pages+0x265/0x450\n[ 57.202870] ? __pfx_nfs_writepages_callback+0x10/0x10 [nfs 6c976fa593a7c2976f5a0aeb4965514a828e6902]\n[ 57.202891] nfs_writepages+0x141/0x230 [nfs 6c976fa593a7c2976f5a0aeb4965514a828e6902]\n[ 57.202913] do_writepages+0xd2/0x230\n[ 57.202917] ? filemap_fdatawrite_wbc+0x5c/0x80\n[ 57.202921] filemap_fdatawrite_wbc+0x67/0x80\n[ 57.202924] filemap_write_and_wait_range+0xd9/0x170\n[ 57.202930] nfs_wb_all+0x49/0x180 [nfs 6c976fa593a7c2976f5a0aeb4965514a828e6902]\n[ 57.202947] nfs4_file_flush+0x72/0xb0 [nfsv4 c716d88496ded0ea6d289bbea684fa996f9b57a9]\n[ 57.202969] __se_sys_close+0x46/0xd0\n[ 57.202972] do_syscall_64+0x68/0x100\n[ 57.202975] ? do_syscall_64+0x77/0x100\n[ 57.202976] ? do_syscall_64+0x77/0x100\n[ 57.202979] entry_SYSCALL_64_after_hwframe+0x6e/0x76\n[ 57.202982] RIP: 0033:0x7fe2b12e4a94\n[ 57.202985] Code: 00 f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e fa 80 3d d5 18 0e 00 00 74 13 b8 03 00 00 00 0f 05 \u003c48\u003e 3d 00 f0 ff ff 77 44 c3 0f 1f 00 48 83 ec 18 89 7c 24 0c e8 c3\n[ 57.202987] RSP: 002b:00007ffe857ddb38 EFLAGS: 00000202 ORIG_RAX: 0000000000000003\n[ 57.202989] RAX: ffffffffffffffda RBX: 00007ffe857dfd68 RCX: 00007fe2b12e4a94\n[ 57.202991] RDX: 0000000000002000 RSI: 00007ffe857ddc40 RDI: 0000000000000003\n[ 57.202992] RBP: 00007ffe857dfc50 R08: 7fffffffffffffff R09: 0000000065650f49\n[ 57.202993] R10: 00007f\n---truncated---",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-52623",
"url": "https://www.suse.com/security/cve/CVE-2023-52623"
},
{
"category": "external",
"summary": "SUSE Bug 1222060 for CVE-2023-52623",
"url": "https://bugzilla.suse.com/1222060"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-16T09:14:50Z",
"details": "moderate"
}
],
"title": "CVE-2023-52623"
},
{
"cve": "CVE-2023-52669",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-52669"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncrypto: s390/aes - Fix buffer overread in CTR mode\n\nWhen processing the last block, the s390 ctr code will always read\na whole block, even if there isn\u0027t a whole block of data left. Fix\nthis by using the actual length left and copy it into a buffer first\nfor processing.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-52669",
"url": "https://www.suse.com/security/cve/CVE-2023-52669"
},
{
"category": "external",
"summary": "SUSE Bug 1224637 for CVE-2023-52669",
"url": "https://bugzilla.suse.com/1224637"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-16T09:14:50Z",
"details": "moderate"
}
],
"title": "CVE-2023-52669"
},
{
"cve": "CVE-2023-52743",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-52743"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nice: Do not use WQ_MEM_RECLAIM flag for workqueue\n\nWhen both ice and the irdma driver are loaded, a warning in\ncheck_flush_dependency is being triggered. This is due to ice driver\nworkqueue being allocated with the WQ_MEM_RECLAIM flag and the irdma one\nis not.\n\nAccording to kernel documentation, this flag should be set if the\nworkqueue will be involved in the kernel\u0027s memory reclamation flow.\nSince it is not, there is no need for the ice driver\u0027s WQ to have this\nflag set so remove it.\n\nExample trace:\n\n[ +0.000004] workqueue: WQ_MEM_RECLAIM ice:ice_service_task [ice] is flushing !WQ_MEM_RECLAIM infiniband:0x0\n[ +0.000139] WARNING: CPU: 0 PID: 728 at kernel/workqueue.c:2632 check_flush_dependency+0x178/0x1a0\n[ +0.000011] Modules linked in: bonding tls xt_CHECKSUM xt_MASQUERADE xt_conntrack ipt_REJECT nf_reject_ipv4 nft_compat nft_cha\nin_nat nf_nat nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 nf_tables nfnetlink bridge stp llc rfkill vfat fat intel_rapl_msr intel\n_rapl_common isst_if_common skx_edac nfit libnvdimm x86_pkg_temp_thermal intel_powerclamp coretemp kvm_intel kvm irqbypass crct1\n0dif_pclmul crc32_pclmul ghash_clmulni_intel rapl intel_cstate rpcrdma sunrpc rdma_ucm ib_srpt ib_isert iscsi_target_mod target_\ncore_mod ib_iser libiscsi scsi_transport_iscsi rdma_cm ib_cm iw_cm iTCO_wdt iTCO_vendor_support ipmi_ssif irdma mei_me ib_uverbs\nib_core intel_uncore joydev pcspkr i2c_i801 acpi_ipmi mei lpc_ich i2c_smbus intel_pch_thermal ioatdma ipmi_si acpi_power_meter\nacpi_pad xfs libcrc32c sd_mod t10_pi crc64_rocksoft crc64 sg ahci ixgbe libahci ice i40e igb crc32c_intel mdio i2c_algo_bit liba\nta dca wmi dm_mirror dm_region_hash dm_log dm_mod ipmi_devintf ipmi_msghandler fuse\n[ +0.000161] [last unloaded: bonding]\n[ +0.000006] CPU: 0 PID: 728 Comm: kworker/0:2 Tainted: G S 6.2.0-rc2_next-queue-13jan-00458-gc20aabd57164 #1\n[ +0.000006] Hardware name: Intel Corporation S2600WFT/S2600WFT, BIOS SE5C620.86B.02.01.0010.010620200716 01/06/2020\n[ +0.000003] Workqueue: ice ice_service_task [ice]\n[ +0.000127] RIP: 0010:check_flush_dependency+0x178/0x1a0\n[ +0.000005] Code: 89 8e 02 01 e8 49 3d 40 00 49 8b 55 18 48 8d 8d d0 00 00 00 48 8d b3 d0 00 00 00 4d 89 e0 48 c7 c7 e0 3b 08\n9f e8 bb d3 07 01 \u003c0f\u003e 0b e9 be fe ff ff 80 3d 24 89 8e 02 00 0f 85 6b ff ff ff e9 06\n[ +0.000004] RSP: 0018:ffff88810a39f990 EFLAGS: 00010282\n[ +0.000005] RAX: 0000000000000000 RBX: ffff888141bc2400 RCX: 0000000000000000\n[ +0.000004] RDX: 0000000000000001 RSI: dffffc0000000000 RDI: ffffffffa1213a80\n[ +0.000003] RBP: ffff888194bf3400 R08: ffffed117b306112 R09: ffffed117b306112\n[ +0.000003] R10: ffff888bd983088b R11: ffffed117b306111 R12: 0000000000000000\n[ +0.000003] R13: ffff888111f84d00 R14: ffff88810a3943ac R15: ffff888194bf3400\n[ +0.000004] FS: 0000000000000000(0000) GS:ffff888bd9800000(0000) knlGS:0000000000000000\n[ +0.000003] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n[ +0.000003] CR2: 000056035b208b60 CR3: 000000017795e005 CR4: 00000000007706f0\n[ +0.000003] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\n[ +0.000003] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\n[ +0.000002] PKRU: 55555554\n[ +0.000003] Call Trace:\n[ +0.000002] \u003cTASK\u003e\n[ +0.000003] __flush_workqueue+0x203/0x840\n[ +0.000006] ? mutex_unlock+0x84/0xd0\n[ +0.000008] ? __pfx_mutex_unlock+0x10/0x10\n[ +0.000004] ? __pfx___flush_workqueue+0x10/0x10\n[ +0.000006] ? mutex_lock+0xa3/0xf0\n[ +0.000005] ib_cache_cleanup_one+0x39/0x190 [ib_core]\n[ +0.000174] __ib_unregister_device+0x84/0xf0 [ib_core]\n[ +0.000094] ib_unregister_device+0x25/0x30 [ib_core]\n[ +0.000093] irdma_ib_unregister_device+0x97/0xc0 [irdma]\n[ +0.000064] ? __pfx_irdma_ib_unregister_device+0x10/0x10 [irdma]\n[ +0.000059] ? up_write+0x5c/0x90\n[ +0.000005] irdma_remove+0x36/0x90 [irdma]\n[ +0.000062] auxiliary_bus_remove+0x32/0x50\n[ +0.000007] device_r\n---truncated---",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-52743",
"url": "https://www.suse.com/security/cve/CVE-2023-52743"
},
{
"category": "external",
"summary": "SUSE Bug 1225003 for CVE-2023-52743",
"url": "https://bugzilla.suse.com/1225003"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-16T09:14:50Z",
"details": "low"
}
],
"title": "CVE-2023-52743"
},
{
"cve": "CVE-2023-52885",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-52885"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nSUNRPC: Fix UAF in svc_tcp_listen_data_ready()\n\nAfter the listener svc_sock is freed, and before invoking svc_tcp_accept()\nfor the established child sock, there is a window that the newsock\nretaining a freed listener svc_sock in sk_user_data which cloning from\nparent. In the race window, if data is received on the newsock, we will\nobserve use-after-free report in svc_tcp_listen_data_ready().\n\nReproduce by two tasks:\n\n1. while :; do rpc.nfsd 0 ; rpc.nfsd; done\n2. while :; do echo \"\" | ncat -4 127.0.0.1 2049 ; done\n\nKASAN report:\n\n ==================================================================\n BUG: KASAN: slab-use-after-free in svc_tcp_listen_data_ready+0x1cf/0x1f0 [sunrpc]\n Read of size 8 at addr ffff888139d96228 by task nc/102553\n CPU: 7 PID: 102553 Comm: nc Not tainted 6.3.0+ #18\n Hardware name: VMware, Inc. VMware Virtual Platform/440BX Desktop Reference Platform, BIOS 6.00 11/12/2020\n Call Trace:\n \u003cIRQ\u003e\n dump_stack_lvl+0x33/0x50\n print_address_description.constprop.0+0x27/0x310\n print_report+0x3e/0x70\n kasan_report+0xae/0xe0\n svc_tcp_listen_data_ready+0x1cf/0x1f0 [sunrpc]\n tcp_data_queue+0x9f4/0x20e0\n tcp_rcv_established+0x666/0x1f60\n tcp_v4_do_rcv+0x51c/0x850\n tcp_v4_rcv+0x23fc/0x2e80\n ip_protocol_deliver_rcu+0x62/0x300\n ip_local_deliver_finish+0x267/0x350\n ip_local_deliver+0x18b/0x2d0\n ip_rcv+0x2fb/0x370\n __netif_receive_skb_one_core+0x166/0x1b0\n process_backlog+0x24c/0x5e0\n __napi_poll+0xa2/0x500\n net_rx_action+0x854/0xc90\n __do_softirq+0x1bb/0x5de\n do_softirq+0xcb/0x100\n \u003c/IRQ\u003e\n \u003cTASK\u003e\n ...\n \u003c/TASK\u003e\n\n Allocated by task 102371:\n kasan_save_stack+0x1e/0x40\n kasan_set_track+0x21/0x30\n __kasan_kmalloc+0x7b/0x90\n svc_setup_socket+0x52/0x4f0 [sunrpc]\n svc_addsock+0x20d/0x400 [sunrpc]\n __write_ports_addfd+0x209/0x390 [nfsd]\n write_ports+0x239/0x2c0 [nfsd]\n nfsctl_transaction_write+0xac/0x110 [nfsd]\n vfs_write+0x1c3/0xae0\n ksys_write+0xed/0x1c0\n do_syscall_64+0x38/0x90\n entry_SYSCALL_64_after_hwframe+0x72/0xdc\n\n Freed by task 102551:\n kasan_save_stack+0x1e/0x40\n kasan_set_track+0x21/0x30\n kasan_save_free_info+0x2a/0x50\n __kasan_slab_free+0x106/0x190\n __kmem_cache_free+0x133/0x270\n svc_xprt_free+0x1e2/0x350 [sunrpc]\n svc_xprt_destroy_all+0x25a/0x440 [sunrpc]\n nfsd_put+0x125/0x240 [nfsd]\n nfsd_svc+0x2cb/0x3c0 [nfsd]\n write_threads+0x1ac/0x2a0 [nfsd]\n nfsctl_transaction_write+0xac/0x110 [nfsd]\n vfs_write+0x1c3/0xae0\n ksys_write+0xed/0x1c0\n do_syscall_64+0x38/0x90\n entry_SYSCALL_64_after_hwframe+0x72/0xdc\n\nFix the UAF by simply doing nothing in svc_tcp_listen_data_ready()\nif state != TCP_LISTEN, that will avoid dereferencing svsk for all\nchild socket.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-52885",
"url": "https://www.suse.com/security/cve/CVE-2023-52885"
},
{
"category": "external",
"summary": "SUSE Bug 1227750 for CVE-2023-52885",
"url": "https://bugzilla.suse.com/1227750"
},
{
"category": "external",
"summary": "SUSE Bug 1227753 for CVE-2023-52885",
"url": "https://bugzilla.suse.com/1227753"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-16T09:14:50Z",
"details": "important"
}
],
"title": "CVE-2023-52885"
},
{
"cve": "CVE-2024-26615",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-26615"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/smc: fix illegal rmb_desc access in SMC-D connection dump\n\nA crash was found when dumping SMC-D connections. It can be reproduced\nby following steps:\n\n- run nginx/wrk test:\n smc_run nginx\n smc_run wrk -t 16 -c 1000 -d \u003cduration\u003e -H \u0027Connection: Close\u0027 \u003cURL\u003e\n\n- continuously dump SMC-D connections in parallel:\n watch -n 1 \u0027smcss -D\u0027\n\n BUG: kernel NULL pointer dereference, address: 0000000000000030\n CPU: 2 PID: 7204 Comm: smcss Kdump: loaded Tainted: G\tE 6.7.0+ #55\n RIP: 0010:__smc_diag_dump.constprop.0+0x5e5/0x620 [smc_diag]\n Call Trace:\n \u003cTASK\u003e\n ? __die+0x24/0x70\n ? page_fault_oops+0x66/0x150\n ? exc_page_fault+0x69/0x140\n ? asm_exc_page_fault+0x26/0x30\n ? __smc_diag_dump.constprop.0+0x5e5/0x620 [smc_diag]\n ? __kmalloc_node_track_caller+0x35d/0x430\n ? __alloc_skb+0x77/0x170\n smc_diag_dump_proto+0xd0/0xf0 [smc_diag]\n smc_diag_dump+0x26/0x60 [smc_diag]\n netlink_dump+0x19f/0x320\n __netlink_dump_start+0x1dc/0x300\n smc_diag_handler_dump+0x6a/0x80 [smc_diag]\n ? __pfx_smc_diag_dump+0x10/0x10 [smc_diag]\n sock_diag_rcv_msg+0x121/0x140\n ? __pfx_sock_diag_rcv_msg+0x10/0x10\n netlink_rcv_skb+0x5a/0x110\n sock_diag_rcv+0x28/0x40\n netlink_unicast+0x22a/0x330\n netlink_sendmsg+0x1f8/0x420\n __sock_sendmsg+0xb0/0xc0\n ____sys_sendmsg+0x24e/0x300\n ? copy_msghdr_from_user+0x62/0x80\n ___sys_sendmsg+0x7c/0xd0\n ? __do_fault+0x34/0x160\n ? do_read_fault+0x5f/0x100\n ? do_fault+0xb0/0x110\n ? __handle_mm_fault+0x2b0/0x6c0\n __sys_sendmsg+0x4d/0x80\n do_syscall_64+0x69/0x180\n entry_SYSCALL_64_after_hwframe+0x6e/0x76\n\nIt is possible that the connection is in process of being established\nwhen we dump it. Assumed that the connection has been registered in a\nlink group by smc_conn_create() but the rmb_desc has not yet been\ninitialized by smc_buf_create(), thus causing the illegal access to\nconn-\u003ermb_desc. So fix it by checking before dump.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-26615",
"url": "https://www.suse.com/security/cve/CVE-2024-26615"
},
{
"category": "external",
"summary": "SUSE Bug 1220942 for CVE-2024-26615",
"url": "https://bugzilla.suse.com/1220942"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-16T09:14:50Z",
"details": "moderate"
}
],
"title": "CVE-2024-26615"
},
{
"cve": "CVE-2024-26659",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-26659"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nxhci: handle isoc Babble and Buffer Overrun events properly\n\nxHCI 4.9 explicitly forbids assuming that the xHC has released its\nownership of a multi-TRB TD when it reports an error on one of the\nearly TRBs. Yet the driver makes such assumption and releases the TD,\nallowing the remaining TRBs to be freed or overwritten by new TDs.\n\nThe xHC should also report completion of the final TRB due to its IOC\nflag being set by us, regardless of prior errors. This event cannot\nbe recognized if the TD has already been freed earlier, resulting in\n\"Transfer event TRB DMA ptr not part of current TD\" error message.\n\nFix this by reusing the logic for processing isoc Transaction Errors.\nThis also handles hosts which fail to report the final completion.\n\nFix transfer length reporting on Babble errors. They may be caused by\ndevice malfunction, no guarantee that the buffer has been filled.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-26659",
"url": "https://www.suse.com/security/cve/CVE-2024-26659"
},
{
"category": "external",
"summary": "SUSE Bug 1222317 for CVE-2024-26659",
"url": "https://bugzilla.suse.com/1222317"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-16T09:14:50Z",
"details": "moderate"
}
],
"title": "CVE-2024-26659"
},
{
"cve": "CVE-2024-26663",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-26663"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntipc: Check the bearer type before calling tipc_udp_nl_bearer_add()\n\nsyzbot reported the following general protection fault [1]:\n\ngeneral protection fault, probably for non-canonical address 0xdffffc0000000010: 0000 [#1] PREEMPT SMP KASAN\nKASAN: null-ptr-deref in range [0x0000000000000080-0x0000000000000087]\n...\nRIP: 0010:tipc_udp_is_known_peer+0x9c/0x250 net/tipc/udp_media.c:291\n...\nCall Trace:\n \u003cTASK\u003e\n tipc_udp_nl_bearer_add+0x212/0x2f0 net/tipc/udp_media.c:646\n tipc_nl_bearer_add+0x21e/0x360 net/tipc/bearer.c:1089\n genl_family_rcv_msg_doit+0x1fc/0x2e0 net/netlink/genetlink.c:972\n genl_family_rcv_msg net/netlink/genetlink.c:1052 [inline]\n genl_rcv_msg+0x561/0x800 net/netlink/genetlink.c:1067\n netlink_rcv_skb+0x16b/0x440 net/netlink/af_netlink.c:2544\n genl_rcv+0x28/0x40 net/netlink/genetlink.c:1076\n netlink_unicast_kernel net/netlink/af_netlink.c:1341 [inline]\n netlink_unicast+0x53b/0x810 net/netlink/af_netlink.c:1367\n netlink_sendmsg+0x8b7/0xd70 net/netlink/af_netlink.c:1909\n sock_sendmsg_nosec net/socket.c:730 [inline]\n __sock_sendmsg+0xd5/0x180 net/socket.c:745\n ____sys_sendmsg+0x6ac/0x940 net/socket.c:2584\n ___sys_sendmsg+0x135/0x1d0 net/socket.c:2638\n __sys_sendmsg+0x117/0x1e0 net/socket.c:2667\n do_syscall_x64 arch/x86/entry/common.c:52 [inline]\n do_syscall_64+0x40/0x110 arch/x86/entry/common.c:83\n entry_SYSCALL_64_after_hwframe+0x63/0x6b\n\nThe cause of this issue is that when tipc_nl_bearer_add() is called with\nthe TIPC_NLA_BEARER_UDP_OPTS attribute, tipc_udp_nl_bearer_add() is called\neven if the bearer is not UDP.\n\ntipc_udp_is_known_peer() called by tipc_udp_nl_bearer_add() assumes that\nthe media_ptr field of the tipc_bearer has an udp_bearer type object, so\nthe function goes crazy for non-UDP bearers.\n\nThis patch fixes the issue by checking the bearer type before calling\ntipc_udp_nl_bearer_add() in tipc_nl_bearer_add().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-26663",
"url": "https://www.suse.com/security/cve/CVE-2024-26663"
},
{
"category": "external",
"summary": "SUSE Bug 1222326 for CVE-2024-26663",
"url": "https://bugzilla.suse.com/1222326"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-16T09:14:50Z",
"details": "moderate"
}
],
"title": "CVE-2024-26663"
},
{
"cve": "CVE-2024-26735",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-26735"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nipv6: sr: fix possible use-after-free and null-ptr-deref\n\nThe pernet operations structure for the subsystem must be registered\nbefore registering the generic netlink family.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-26735",
"url": "https://www.suse.com/security/cve/CVE-2024-26735"
},
{
"category": "external",
"summary": "SUSE Bug 1222372 for CVE-2024-26735",
"url": "https://bugzilla.suse.com/1222372"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-16T09:14:50Z",
"details": "moderate"
}
],
"title": "CVE-2024-26735"
},
{
"cve": "CVE-2024-26830",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-26830"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ni40e: Do not allow untrusted VF to remove administratively set MAC\n\nCurrently when PF administratively sets VF\u0027s MAC address and the VF\nis put down (VF tries to delete all MACs) then the MAC is removed\nfrom MAC filters and primary VF MAC is zeroed.\n\nDo not allow untrusted VF to remove primary MAC when it was set\nadministratively by PF.\n\nReproducer:\n1) Create VF\n2) Set VF interface up\n3) Administratively set the VF\u0027s MAC\n4) Put VF interface down\n\n[root@host ~]# echo 1 \u003e /sys/class/net/enp2s0f0/device/sriov_numvfs\n[root@host ~]# ip link set enp2s0f0v0 up\n[root@host ~]# ip link set enp2s0f0 vf 0 mac fe:6c:b5:da:c7:7d\n[root@host ~]# ip link show enp2s0f0\n23: enp2s0f0: \u003cBROADCAST,MULTICAST,UP,LOWER_UP\u003e mtu 1500 qdisc mq state UP mode DEFAULT group default qlen 1000\n link/ether 3c:ec:ef:b7:dd:04 brd ff:ff:ff:ff:ff:ff\n vf 0 link/ether fe:6c:b5:da:c7:7d brd ff:ff:ff:ff:ff:ff, spoof checking on, link-state auto, trust off\n[root@host ~]# ip link set enp2s0f0v0 down\n[root@host ~]# ip link show enp2s0f0\n23: enp2s0f0: \u003cBROADCAST,MULTICAST,UP,LOWER_UP\u003e mtu 1500 qdisc mq state UP mode DEFAULT group default qlen 1000\n link/ether 3c:ec:ef:b7:dd:04 brd ff:ff:ff:ff:ff:ff\n vf 0 link/ether 00:00:00:00:00:00 brd ff:ff:ff:ff:ff:ff, spoof checking on, link-state auto, trust off",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-26830",
"url": "https://www.suse.com/security/cve/CVE-2024-26830"
},
{
"category": "external",
"summary": "SUSE Bug 1223012 for CVE-2024-26830",
"url": "https://bugzilla.suse.com/1223012"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-16T09:14:50Z",
"details": "moderate"
}
],
"title": "CVE-2024-26830"
},
{
"cve": "CVE-2024-26920",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-26920"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntracing/trigger: Fix to return error if failed to alloc snapshot\n\nFix register_snapshot_trigger() to return error code if it failed to\nallocate a snapshot instead of 0 (success). Unless that, it will register\nsnapshot trigger without an error.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-26920",
"url": "https://www.suse.com/security/cve/CVE-2024-26920"
},
{
"category": "external",
"summary": "SUSE Bug 1228237 for CVE-2024-26920",
"url": "https://bugzilla.suse.com/1228237"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-16T09:14:50Z",
"details": "moderate"
}
],
"title": "CVE-2024-26920"
},
{
"cve": "CVE-2024-26924",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-26924"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnetfilter: nft_set_pipapo: do not free live element\n\nPablo reports a crash with large batches of elements with a\nback-to-back add/remove pattern. Quoting Pablo:\n\n add_elem(\"00000000\") timeout 100 ms\n ...\n add_elem(\"0000000X\") timeout 100 ms\n del_elem(\"0000000X\") \u003c---------------- delete one that was just added\n ...\n add_elem(\"00005000\") timeout 100 ms\n\n 1) nft_pipapo_remove() removes element 0000000X\n Then, KASAN shows a splat.\n\nLooking at the remove function there is a chance that we will drop a\nrule that maps to a non-deactivated element.\n\nRemoval happens in two steps, first we do a lookup for key k and return the\nto-be-removed element and mark it as inactive in the next generation.\nThen, in a second step, the element gets removed from the set/map.\n\nThe _remove function does not work correctly if we have more than one\nelement that share the same key.\n\nThis can happen if we insert an element into a set when the set already\nholds an element with same key, but the element mapping to the existing\nkey has timed out or is not active in the next generation.\n\nIn such case its possible that removal will unmap the wrong element.\nIf this happens, we will leak the non-deactivated element, it becomes\nunreachable.\n\nThe element that got deactivated (and will be freed later) will\nremain reachable in the set data structure, this can result in\na crash when such an element is retrieved during lookup (stale\npointer).\n\nAdd a check that the fully matching key does in fact map to the element\nthat we have marked as inactive in the deactivation step.\nIf not, we need to continue searching.\n\nAdd a bug/warn trap at the end of the function as well, the remove\nfunction must not ever be called with an invisible/unreachable/non-existent\nelement.\n\nv2: avoid uneeded temporary variable (Stefano)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-26924",
"url": "https://www.suse.com/security/cve/CVE-2024-26924"
},
{
"category": "external",
"summary": "SUSE Bug 1223387 for CVE-2024-26924",
"url": "https://bugzilla.suse.com/1223387"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-16T09:14:50Z",
"details": "moderate"
}
],
"title": "CVE-2024-26924"
},
{
"cve": "CVE-2024-27019",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-27019"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnetfilter: nf_tables: Fix potential data-race in __nft_obj_type_get()\n\nnft_unregister_obj() can concurrent with __nft_obj_type_get(),\nand there is not any protection when iterate over nf_tables_objects\nlist in __nft_obj_type_get(). Therefore, there is potential data-race\nof nf_tables_objects list entry.\n\nUse list_for_each_entry_rcu() to iterate over nf_tables_objects\nlist in __nft_obj_type_get(), and use rcu_read_lock() in the caller\nnft_obj_type_get() to protect the entire type query process.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-27019",
"url": "https://www.suse.com/security/cve/CVE-2024-27019"
},
{
"category": "external",
"summary": "SUSE Bug 1223813 for CVE-2024-27019",
"url": "https://bugzilla.suse.com/1223813"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-16T09:14:50Z",
"details": "moderate"
}
],
"title": "CVE-2024-27019"
},
{
"cve": "CVE-2024-27020",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-27020"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnetfilter: nf_tables: Fix potential data-race in __nft_expr_type_get()\n\nnft_unregister_expr() can concurrent with __nft_expr_type_get(),\nand there is not any protection when iterate over nf_tables_expressions\nlist in __nft_expr_type_get(). Therefore, there is potential data-race\nof nf_tables_expressions list entry.\n\nUse list_for_each_entry_rcu() to iterate over nf_tables_expressions\nlist in __nft_expr_type_get(), and use rcu_read_lock() in the caller\nnft_expr_type_get() to protect the entire type query process.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-27020",
"url": "https://www.suse.com/security/cve/CVE-2024-27020"
},
{
"category": "external",
"summary": "SUSE Bug 1223815 for CVE-2024-27020",
"url": "https://bugzilla.suse.com/1223815"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-16T09:14:50Z",
"details": "moderate"
}
],
"title": "CVE-2024-27020"
},
{
"cve": "CVE-2024-27025",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-27025"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnbd: null check for nla_nest_start\n\nnla_nest_start() may fail and return NULL. Insert a check and set errno\nbased on other call sites within the same source code.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-27025",
"url": "https://www.suse.com/security/cve/CVE-2024-27025"
},
{
"category": "external",
"summary": "SUSE Bug 1223778 for CVE-2024-27025",
"url": "https://bugzilla.suse.com/1223778"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-16T09:14:50Z",
"details": "moderate"
}
],
"title": "CVE-2024-27025"
},
{
"cve": "CVE-2024-27437",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-27437"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nvfio/pci: Disable auto-enable of exclusive INTx IRQ\n\nCurrently for devices requiring masking at the irqchip for INTx, ie.\ndevices without DisINTx support, the IRQ is enabled in request_irq()\nand subsequently disabled as necessary to align with the masked status\nflag. This presents a window where the interrupt could fire between\nthese events, resulting in the IRQ incrementing the disable depth twice.\nThis would be unrecoverable for a user since the masked flag prevents\nnested enables through vfio.\n\nInstead, invert the logic using IRQF_NO_AUTOEN such that exclusive INTx\nis never auto-enabled, then unmask as required.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-27437",
"url": "https://www.suse.com/security/cve/CVE-2024-27437"
},
{
"category": "external",
"summary": "SUSE Bug 1222625 for CVE-2024-27437",
"url": "https://bugzilla.suse.com/1222625"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-16T09:14:50Z",
"details": "moderate"
}
],
"title": "CVE-2024-27437"
},
{
"cve": "CVE-2024-35806",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-35806"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsoc: fsl: qbman: Always disable interrupts when taking cgr_lock\n\nsmp_call_function_single disables IRQs when executing the callback. To\nprevent deadlocks, we must disable IRQs when taking cgr_lock elsewhere.\nThis is already done by qman_update_cgr and qman_delete_cgr; fix the\nother lockers.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-35806",
"url": "https://www.suse.com/security/cve/CVE-2024-35806"
},
{
"category": "external",
"summary": "SUSE Bug 1224699 for CVE-2024-35806",
"url": "https://bugzilla.suse.com/1224699"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-16T09:14:50Z",
"details": "moderate"
}
],
"title": "CVE-2024-35806"
},
{
"cve": "CVE-2024-35819",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-35819"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsoc: fsl: qbman: Use raw spinlock for cgr_lock\n\nsmp_call_function always runs its callback in hard IRQ context, even on\nPREEMPT_RT, where spinlocks can sleep. So we need to use a raw spinlock\nfor cgr_lock to ensure we aren\u0027t waiting on a sleeping task.\n\nAlthough this bug has existed for a while, it was not apparent until\ncommit ef2a8d5478b9 (\"net: dpaa: Adjust queue depth on rate change\")\nwhich invokes smp_call_function_single via qman_update_cgr_safe every\ntime a link goes up or down.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-35819",
"url": "https://www.suse.com/security/cve/CVE-2024-35819"
},
{
"category": "external",
"summary": "SUSE Bug 1224683 for CVE-2024-35819",
"url": "https://bugzilla.suse.com/1224683"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-16T09:14:50Z",
"details": "moderate"
}
],
"title": "CVE-2024-35819"
},
{
"cve": "CVE-2024-35837",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-35837"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: mvpp2: clear BM pool before initialization\n\nRegister value persist after booting the kernel using\nkexec which results in kernel panic. Thus clear the\nBM pool registers before initialisation to fix the issue.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-35837",
"url": "https://www.suse.com/security/cve/CVE-2024-35837"
},
{
"category": "external",
"summary": "SUSE Bug 1224500 for CVE-2024-35837",
"url": "https://bugzilla.suse.com/1224500"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-16T09:14:50Z",
"details": "moderate"
}
],
"title": "CVE-2024-35837"
},
{
"cve": "CVE-2024-35887",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-35887"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nax25: fix use-after-free bugs caused by ax25_ds_del_timer\n\nWhen the ax25 device is detaching, the ax25_dev_device_down()\ncalls ax25_ds_del_timer() to cleanup the slave_timer. When\nthe timer handler is running, the ax25_ds_del_timer() that\ncalls del_timer() in it will return directly. As a result,\nthe use-after-free bugs could happen, one of the scenarios\nis shown below:\n\n (Thread 1) | (Thread 2)\n | ax25_ds_timeout()\nax25_dev_device_down() |\n ax25_ds_del_timer() |\n del_timer() |\n ax25_dev_put() //FREE |\n | ax25_dev-\u003e //USE\n\nIn order to mitigate bugs, when the device is detaching, use\ntimer_shutdown_sync() to stop the timer.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-35887",
"url": "https://www.suse.com/security/cve/CVE-2024-35887"
},
{
"category": "external",
"summary": "SUSE Bug 1224663 for CVE-2024-35887",
"url": "https://bugzilla.suse.com/1224663"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-16T09:14:50Z",
"details": "moderate"
}
],
"title": "CVE-2024-35887"
},
{
"cve": "CVE-2024-35893",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-35893"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/sched: act_skbmod: prevent kernel-infoleak\n\nsyzbot found that tcf_skbmod_dump() was copying four bytes\nfrom kernel stack to user space [1].\n\nThe issue here is that \u0027struct tc_skbmod\u0027 has a four bytes hole.\n\nWe need to clear the structure before filling fields.\n\n[1]\nBUG: KMSAN: kernel-infoleak in instrument_copy_to_user include/linux/instrumented.h:114 [inline]\n BUG: KMSAN: kernel-infoleak in copy_to_user_iter lib/iov_iter.c:24 [inline]\n BUG: KMSAN: kernel-infoleak in iterate_ubuf include/linux/iov_iter.h:29 [inline]\n BUG: KMSAN: kernel-infoleak in iterate_and_advance2 include/linux/iov_iter.h:245 [inline]\n BUG: KMSAN: kernel-infoleak in iterate_and_advance include/linux/iov_iter.h:271 [inline]\n BUG: KMSAN: kernel-infoleak in _copy_to_iter+0x366/0x2520 lib/iov_iter.c:185\n instrument_copy_to_user include/linux/instrumented.h:114 [inline]\n copy_to_user_iter lib/iov_iter.c:24 [inline]\n iterate_ubuf include/linux/iov_iter.h:29 [inline]\n iterate_and_advance2 include/linux/iov_iter.h:245 [inline]\n iterate_and_advance include/linux/iov_iter.h:271 [inline]\n _copy_to_iter+0x366/0x2520 lib/iov_iter.c:185\n copy_to_iter include/linux/uio.h:196 [inline]\n simple_copy_to_iter net/core/datagram.c:532 [inline]\n __skb_datagram_iter+0x185/0x1000 net/core/datagram.c:420\n skb_copy_datagram_iter+0x5c/0x200 net/core/datagram.c:546\n skb_copy_datagram_msg include/linux/skbuff.h:4050 [inline]\n netlink_recvmsg+0x432/0x1610 net/netlink/af_netlink.c:1962\n sock_recvmsg_nosec net/socket.c:1046 [inline]\n sock_recvmsg+0x2c4/0x340 net/socket.c:1068\n __sys_recvfrom+0x35a/0x5f0 net/socket.c:2242\n __do_sys_recvfrom net/socket.c:2260 [inline]\n __se_sys_recvfrom net/socket.c:2256 [inline]\n __x64_sys_recvfrom+0x126/0x1d0 net/socket.c:2256\n do_syscall_64+0xd5/0x1f0\n entry_SYSCALL_64_after_hwframe+0x6d/0x75\n\nUninit was stored to memory at:\n pskb_expand_head+0x30f/0x19d0 net/core/skbuff.c:2253\n netlink_trim+0x2c2/0x330 net/netlink/af_netlink.c:1317\n netlink_unicast+0x9f/0x1260 net/netlink/af_netlink.c:1351\n nlmsg_unicast include/net/netlink.h:1144 [inline]\n nlmsg_notify+0x21d/0x2f0 net/netlink/af_netlink.c:2610\n rtnetlink_send+0x73/0x90 net/core/rtnetlink.c:741\n rtnetlink_maybe_send include/linux/rtnetlink.h:17 [inline]\n tcf_add_notify net/sched/act_api.c:2048 [inline]\n tcf_action_add net/sched/act_api.c:2071 [inline]\n tc_ctl_action+0x146e/0x19d0 net/sched/act_api.c:2119\n rtnetlink_rcv_msg+0x1737/0x1900 net/core/rtnetlink.c:6595\n netlink_rcv_skb+0x375/0x650 net/netlink/af_netlink.c:2559\n rtnetlink_rcv+0x34/0x40 net/core/rtnetlink.c:6613\n netlink_unicast_kernel net/netlink/af_netlink.c:1335 [inline]\n netlink_unicast+0xf4c/0x1260 net/netlink/af_netlink.c:1361\n netlink_sendmsg+0x10df/0x11f0 net/netlink/af_netlink.c:1905\n sock_sendmsg_nosec net/socket.c:730 [inline]\n __sock_sendmsg+0x30f/0x380 net/socket.c:745\n ____sys_sendmsg+0x877/0xb60 net/socket.c:2584\n ___sys_sendmsg+0x28d/0x3c0 net/socket.c:2638\n __sys_sendmsg net/socket.c:2667 [inline]\n __do_sys_sendmsg net/socket.c:2676 [inline]\n __se_sys_sendmsg net/socket.c:2674 [inline]\n __x64_sys_sendmsg+0x307/0x4a0 net/socket.c:2674\n do_syscall_64+0xd5/0x1f0\n entry_SYSCALL_64_after_hwframe+0x6d/0x75\n\nUninit was stored to memory at:\n __nla_put lib/nlattr.c:1041 [inline]\n nla_put+0x1c6/0x230 lib/nlattr.c:1099\n tcf_skbmod_dump+0x23f/0xc20 net/sched/act_skbmod.c:256\n tcf_action_dump_old net/sched/act_api.c:1191 [inline]\n tcf_action_dump_1+0x85e/0x970 net/sched/act_api.c:1227\n tcf_action_dump+0x1fd/0x460 net/sched/act_api.c:1251\n tca_get_fill+0x519/0x7a0 net/sched/act_api.c:1628\n tcf_add_notify_msg net/sched/act_api.c:2023 [inline]\n tcf_add_notify net/sched/act_api.c:2042 [inline]\n tcf_action_add net/sched/act_api.c:2071 [inline]\n tc_ctl_action+0x1365/0x19d0 net/sched/act_api.c:2119\n rtnetlink_rcv_msg+0x1737/0x1900 net/core/rtnetlink.c:6595\n netlink_rcv_skb+0x375/0x650 net/netlink/af_netli\n---truncated---",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-35893",
"url": "https://www.suse.com/security/cve/CVE-2024-35893"
},
{
"category": "external",
"summary": "SUSE Bug 1224512 for CVE-2024-35893",
"url": "https://bugzilla.suse.com/1224512"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-16T09:14:50Z",
"details": "moderate"
}
],
"title": "CVE-2024-35893"
},
{
"cve": "CVE-2024-35934",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-35934"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/smc: reduce rtnl pressure in smc_pnet_create_pnetids_list()\n\nMany syzbot reports show extreme rtnl pressure, and many of them hint\nthat smc acquires rtnl in netns creation for no good reason [1]\n\nThis patch returns early from smc_pnet_net_init()\nif there is no netdevice yet.\n\nI am not even sure why smc_pnet_create_pnetids_list() even exists,\nbecause smc_pnet_netdev_event() is also calling\nsmc_pnet_add_base_pnetid() when handling NETDEV_UP event.\n\n[1] extract of typical syzbot reports\n\n2 locks held by syz-executor.3/12252:\n #0: ffffffff8f369610 (pernet_ops_rwsem){++++}-{3:3}, at: copy_net_ns+0x4c7/0x7b0 net/core/net_namespace.c:491\n #1: ffffffff8f375b88 (rtnl_mutex){+.+.}-{3:3}, at: smc_pnet_create_pnetids_list net/smc/smc_pnet.c:809 [inline]\n #1: ffffffff8f375b88 (rtnl_mutex){+.+.}-{3:3}, at: smc_pnet_net_init+0x10a/0x1e0 net/smc/smc_pnet.c:878\n2 locks held by syz-executor.4/12253:\n #0: ffffffff8f369610 (pernet_ops_rwsem){++++}-{3:3}, at: copy_net_ns+0x4c7/0x7b0 net/core/net_namespace.c:491\n #1: ffffffff8f375b88 (rtnl_mutex){+.+.}-{3:3}, at: smc_pnet_create_pnetids_list net/smc/smc_pnet.c:809 [inline]\n #1: ffffffff8f375b88 (rtnl_mutex){+.+.}-{3:3}, at: smc_pnet_net_init+0x10a/0x1e0 net/smc/smc_pnet.c:878\n2 locks held by syz-executor.1/12257:\n #0: ffffffff8f369610 (pernet_ops_rwsem){++++}-{3:3}, at: copy_net_ns+0x4c7/0x7b0 net/core/net_namespace.c:491\n #1: ffffffff8f375b88 (rtnl_mutex){+.+.}-{3:3}, at: smc_pnet_create_pnetids_list net/smc/smc_pnet.c:809 [inline]\n #1: ffffffff8f375b88 (rtnl_mutex){+.+.}-{3:3}, at: smc_pnet_net_init+0x10a/0x1e0 net/smc/smc_pnet.c:878\n2 locks held by syz-executor.2/12261:\n #0: ffffffff8f369610 (pernet_ops_rwsem){++++}-{3:3}, at: copy_net_ns+0x4c7/0x7b0 net/core/net_namespace.c:491\n #1: ffffffff8f375b88 (rtnl_mutex){+.+.}-{3:3}, at: smc_pnet_create_pnetids_list net/smc/smc_pnet.c:809 [inline]\n #1: ffffffff8f375b88 (rtnl_mutex){+.+.}-{3:3}, at: smc_pnet_net_init+0x10a/0x1e0 net/smc/smc_pnet.c:878\n2 locks held by syz-executor.0/12265:\n #0: ffffffff8f369610 (pernet_ops_rwsem){++++}-{3:3}, at: copy_net_ns+0x4c7/0x7b0 net/core/net_namespace.c:491\n #1: ffffffff8f375b88 (rtnl_mutex){+.+.}-{3:3}, at: smc_pnet_create_pnetids_list net/smc/smc_pnet.c:809 [inline]\n #1: ffffffff8f375b88 (rtnl_mutex){+.+.}-{3:3}, at: smc_pnet_net_init+0x10a/0x1e0 net/smc/smc_pnet.c:878\n2 locks held by syz-executor.3/12268:\n #0: ffffffff8f369610 (pernet_ops_rwsem){++++}-{3:3}, at: copy_net_ns+0x4c7/0x7b0 net/core/net_namespace.c:491\n #1: ffffffff8f375b88 (rtnl_mutex){+.+.}-{3:3}, at: smc_pnet_create_pnetids_list net/smc/smc_pnet.c:809 [inline]\n #1: ffffffff8f375b88 (rtnl_mutex){+.+.}-{3:3}, at: smc_pnet_net_init+0x10a/0x1e0 net/smc/smc_pnet.c:878\n2 locks held by syz-executor.4/12271:\n #0: ffffffff8f369610 (pernet_ops_rwsem){++++}-{3:3}, at: copy_net_ns+0x4c7/0x7b0 net/core/net_namespace.c:491\n #1: ffffffff8f375b88 (rtnl_mutex){+.+.}-{3:3}, at: smc_pnet_create_pnetids_list net/smc/smc_pnet.c:809 [inline]\n #1: ffffffff8f375b88 (rtnl_mutex){+.+.}-{3:3}, at: smc_pnet_net_init+0x10a/0x1e0 net/smc/smc_pnet.c:878\n2 locks held by syz-executor.1/12274:\n #0: ffffffff8f369610 (pernet_ops_rwsem){++++}-{3:3}, at: copy_net_ns+0x4c7/0x7b0 net/core/net_namespace.c:491\n #1: ffffffff8f375b88 (rtnl_mutex){+.+.}-{3:3}, at: smc_pnet_create_pnetids_list net/smc/smc_pnet.c:809 [inline]\n #1: ffffffff8f375b88 (rtnl_mutex){+.+.}-{3:3}, at: smc_pnet_net_init+0x10a/0x1e0 net/smc/smc_pnet.c:878\n2 locks held by syz-executor.2/12280:\n #0: ffffffff8f369610 (pernet_ops_rwsem){++++}-{3:3}, at: copy_net_ns+0x4c7/0x7b0 net/core/net_namespace.c:491\n #1: ffffffff8f375b88 (rtnl_mutex){+.+.}-{3:3}, at: smc_pnet_create_pnetids_list net/smc/smc_pnet.c:809 [inline]\n #1: ffffffff8f375b88 (rtnl_mutex){+.+.}-{3:3}, at: smc_pnet_net_init+0x10a/0x1e0 net/smc/smc_pnet.c:878",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-35934",
"url": "https://www.suse.com/security/cve/CVE-2024-35934"
},
{
"category": "external",
"summary": "SUSE Bug 1224641 for CVE-2024-35934",
"url": "https://bugzilla.suse.com/1224641"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 2.5,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-16T09:14:50Z",
"details": "low"
}
],
"title": "CVE-2024-35934"
},
{
"cve": "CVE-2024-35949",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-35949"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbtrfs: make sure that WRITTEN is set on all metadata blocks\n\nWe previously would call btrfs_check_leaf() if we had the check\nintegrity code enabled, which meant that we could only run the extended\nleaf checks if we had WRITTEN set on the header flags.\n\nThis leaves a gap in our checking, because we could end up with\ncorruption on disk where WRITTEN isn\u0027t set on the leaf, and then the\nextended leaf checks don\u0027t get run which we rely on to validate all of\nthe item pointers to make sure we don\u0027t access memory outside of the\nextent buffer.\n\nHowever, since 732fab95abe2 (\"btrfs: check-integrity: remove\nCONFIG_BTRFS_FS_CHECK_INTEGRITY option\") we no longer call\nbtrfs_check_leaf() from btrfs_mark_buffer_dirty(), which means we only\never call it on blocks that are being written out, and thus have WRITTEN\nset, or that are being read in, which should have WRITTEN set.\n\nAdd checks to make sure we have WRITTEN set appropriately, and then make\nsure __btrfs_check_leaf() always does the item checking. This will\nprotect us from file systems that have been corrupted and no longer have\nWRITTEN set on some of the blocks.\n\nThis was hit on a crafted image tweaking the WRITTEN bit and reported by\nKASAN as out-of-bound access in the eb accessors. The example is a dir\nitem at the end of an eb.\n\n [2.042] BTRFS warning (device loop1): bad eb member start: ptr 0x3fff start 30572544 member offset 16410 size 2\n [2.040] general protection fault, probably for non-canonical address 0xe0009d1000000003: 0000 [#1] PREEMPT SMP KASAN NOPTI\n [2.537] KASAN: maybe wild-memory-access in range [0x0005088000000018-0x000508800000001f]\n [2.729] CPU: 0 PID: 2587 Comm: mount Not tainted 6.8.2 #1\n [2.729] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.15.0-1 04/01/2014\n [2.621] RIP: 0010:btrfs_get_16+0x34b/0x6d0\n [2.621] RSP: 0018:ffff88810871fab8 EFLAGS: 00000206\n [2.621] RAX: 0000a11000000003 RBX: ffff888104ff8720 RCX: ffff88811b2288c0\n [2.621] RDX: dffffc0000000000 RSI: ffffffff81dd8aca RDI: ffff88810871f748\n [2.621] RBP: 000000000000401a R08: 0000000000000001 R09: ffffed10210e3ee9\n [2.621] R10: ffff88810871f74f R11: 205d323430333737 R12: 000000000000001a\n [2.621] R13: 000508800000001a R14: 1ffff110210e3f5d R15: ffffffff850011e8\n [2.621] FS: 00007f56ea275840(0000) GS:ffff88811b200000(0000) knlGS:0000000000000000\n [2.621] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n [2.621] CR2: 00007febd13b75c0 CR3: 000000010bb50000 CR4: 00000000000006f0\n [2.621] Call Trace:\n [2.621] \u003cTASK\u003e\n [2.621] ? show_regs+0x74/0x80\n [2.621] ? die_addr+0x46/0xc0\n [2.621] ? exc_general_protection+0x161/0x2a0\n [2.621] ? asm_exc_general_protection+0x26/0x30\n [2.621] ? btrfs_get_16+0x33a/0x6d0\n [2.621] ? btrfs_get_16+0x34b/0x6d0\n [2.621] ? btrfs_get_16+0x33a/0x6d0\n [2.621] ? __pfx_btrfs_get_16+0x10/0x10\n [2.621] ? __pfx_mutex_unlock+0x10/0x10\n [2.621] btrfs_match_dir_item_name+0x101/0x1a0\n [2.621] btrfs_lookup_dir_item+0x1f3/0x280\n [2.621] ? __pfx_btrfs_lookup_dir_item+0x10/0x10\n [2.621] btrfs_get_tree+0xd25/0x1910\n\n[ copy more details from report ]",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-35949",
"url": "https://www.suse.com/security/cve/CVE-2024-35949"
},
{
"category": "external",
"summary": "SUSE Bug 1224700 for CVE-2024-35949",
"url": "https://bugzilla.suse.com/1224700"
},
{
"category": "external",
"summary": "SUSE Bug 1229273 for CVE-2024-35949",
"url": "https://bugzilla.suse.com/1229273"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-16T09:14:50Z",
"details": "moderate"
}
],
"title": "CVE-2024-35949"
},
{
"cve": "CVE-2024-35966",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-35966"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nBluetooth: RFCOMM: Fix not validating setsockopt user input\n\nsyzbot reported rfcomm_sock_setsockopt_old() is copying data without\nchecking user input length.\n\nBUG: KASAN: slab-out-of-bounds in copy_from_sockptr_offset\ninclude/linux/sockptr.h:49 [inline]\nBUG: KASAN: slab-out-of-bounds in copy_from_sockptr\ninclude/linux/sockptr.h:55 [inline]\nBUG: KASAN: slab-out-of-bounds in rfcomm_sock_setsockopt_old\nnet/bluetooth/rfcomm/sock.c:632 [inline]\nBUG: KASAN: slab-out-of-bounds in rfcomm_sock_setsockopt+0x893/0xa70\nnet/bluetooth/rfcomm/sock.c:673\nRead of size 4 at addr ffff8880209a8bc3 by task syz-executor632/5064",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-35966",
"url": "https://www.suse.com/security/cve/CVE-2024-35966"
},
{
"category": "external",
"summary": "SUSE Bug 1224576 for CVE-2024-35966",
"url": "https://bugzilla.suse.com/1224576"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-16T09:14:50Z",
"details": "moderate"
}
],
"title": "CVE-2024-35966"
},
{
"cve": "CVE-2024-35967",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-35967"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nBluetooth: SCO: Fix not validating setsockopt user input\n\nsyzbot reported sco_sock_setsockopt() is copying data without\nchecking user input length.\n\nBUG: KASAN: slab-out-of-bounds in copy_from_sockptr_offset\ninclude/linux/sockptr.h:49 [inline]\nBUG: KASAN: slab-out-of-bounds in copy_from_sockptr\ninclude/linux/sockptr.h:55 [inline]\nBUG: KASAN: slab-out-of-bounds in sco_sock_setsockopt+0xc0b/0xf90\nnet/bluetooth/sco.c:893\nRead of size 4 at addr ffff88805f7b15a3 by task syz-executor.5/12578",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-35967",
"url": "https://www.suse.com/security/cve/CVE-2024-35967"
},
{
"category": "external",
"summary": "SUSE Bug 1224587 for CVE-2024-35967",
"url": "https://bugzilla.suse.com/1224587"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-16T09:14:50Z",
"details": "moderate"
}
],
"title": "CVE-2024-35967"
},
{
"cve": "CVE-2024-35978",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-35978"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nBluetooth: Fix memory leak in hci_req_sync_complete()\n\nIn \u0027hci_req_sync_complete()\u0027, always free the previous sync\nrequest state before assigning reference to a new one.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-35978",
"url": "https://www.suse.com/security/cve/CVE-2024-35978"
},
{
"category": "external",
"summary": "SUSE Bug 1224571 for CVE-2024-35978",
"url": "https://bugzilla.suse.com/1224571"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-16T09:14:50Z",
"details": "moderate"
}
],
"title": "CVE-2024-35978"
},
{
"cve": "CVE-2024-35995",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-35995"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nACPI: CPPC: Use access_width over bit_width for system memory accesses\n\nTo align with ACPI 6.3+, since bit_width can be any 8-bit value, it\ncannot be depended on to be always on a clean 8b boundary. This was\nuncovered on the Cobalt 100 platform.\n\nSError Interrupt on CPU26, code 0xbe000011 -- SError\n CPU: 26 PID: 1510 Comm: systemd-udevd Not tainted 5.15.2.1-13 #1\n Hardware name: MICROSOFT CORPORATION, BIOS MICROSOFT CORPORATION\n pstate: 62400009 (nZCv daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--)\n pc : cppc_get_perf_caps+0xec/0x410\n lr : cppc_get_perf_caps+0xe8/0x410\n sp : ffff8000155ab730\n x29: ffff8000155ab730 x28: ffff0080139d0038 x27: ffff0080139d0078\n x26: 0000000000000000 x25: ffff0080139d0058 x24: 00000000ffffffff\n x23: ffff0080139d0298 x22: ffff0080139d0278 x21: 0000000000000000\n x20: ffff00802b251910 x19: ffff0080139d0000 x18: ffffffffffffffff\n x17: 0000000000000000 x16: ffffdc7e111bad04 x15: ffff00802b251008\n x14: ffffffffffffffff x13: ffff013f1fd63300 x12: 0000000000000006\n x11: ffffdc7e128f4420 x10: 0000000000000000 x9 : ffffdc7e111badec\n x8 : ffff00802b251980 x7 : 0000000000000000 x6 : ffff0080139d0028\n x5 : 0000000000000000 x4 : ffff0080139d0018 x3 : 00000000ffffffff\n x2 : 0000000000000008 x1 : ffff8000155ab7a0 x0 : 0000000000000000\n Kernel panic - not syncing: Asynchronous SError Interrupt\n CPU: 26 PID: 1510 Comm: systemd-udevd Not tainted\n5.15.2.1-13 #1\n Hardware name: MICROSOFT CORPORATION, BIOS MICROSOFT CORPORATION\n Call trace:\n dump_backtrace+0x0/0x1e0\n show_stack+0x24/0x30\n dump_stack_lvl+0x8c/0xb8\n dump_stack+0x18/0x34\n panic+0x16c/0x384\n add_taint+0x0/0xc0\n arm64_serror_panic+0x7c/0x90\n arm64_is_fatal_ras_serror+0x34/0xa4\n do_serror+0x50/0x6c\n el1h_64_error_handler+0x40/0x74\n el1h_64_error+0x7c/0x80\n cppc_get_perf_caps+0xec/0x410\n cppc_cpufreq_cpu_init+0x74/0x400 [cppc_cpufreq]\n cpufreq_online+0x2dc/0xa30\n cpufreq_add_dev+0xc0/0xd4\n subsys_interface_register+0x134/0x14c\n cpufreq_register_driver+0x1b0/0x354\n cppc_cpufreq_init+0x1a8/0x1000 [cppc_cpufreq]\n do_one_initcall+0x50/0x250\n do_init_module+0x60/0x27c\n load_module+0x2300/0x2570\n __do_sys_finit_module+0xa8/0x114\n __arm64_sys_finit_module+0x2c/0x3c\n invoke_syscall+0x78/0x100\n el0_svc_common.constprop.0+0x180/0x1a0\n do_el0_svc+0x84/0xa0\n el0_svc+0x2c/0xc0\n el0t_64_sync_handler+0xa4/0x12c\n el0t_64_sync+0x1a4/0x1a8\n\nInstead, use access_width to determine the size and use the offset and\nwidth to shift and mask the bits to read/write out. Make sure to add a\ncheck for system memory since pcc redefines the access_width to\nsubspace id.\n\nIf access_width is not set, then fall back to using bit_width.\n\n[ rjw: Subject and changelog edits, comment adjustments ]",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-35995",
"url": "https://www.suse.com/security/cve/CVE-2024-35995"
},
{
"category": "external",
"summary": "SUSE Bug 1224557 for CVE-2024-35995",
"url": "https://bugzilla.suse.com/1224557"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-16T09:14:50Z",
"details": "moderate"
}
],
"title": "CVE-2024-35995"
},
{
"cve": "CVE-2024-36004",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-36004"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ni40e: Do not use WQ_MEM_RECLAIM flag for workqueue\n\nIssue reported by customer during SRIOV testing, call trace:\nWhen both i40e and the i40iw driver are loaded, a warning\nin check_flush_dependency is being triggered. This seems\nto be because of the i40e driver workqueue is allocated with\nthe WQ_MEM_RECLAIM flag, and the i40iw one is not.\n\nSimilar error was encountered on ice too and it was fixed by\nremoving the flag. Do the same for i40e too.\n\n[Feb 9 09:08] ------------[ cut here ]------------\n[ +0.000004] workqueue: WQ_MEM_RECLAIM i40e:i40e_service_task [i40e] is\nflushing !WQ_MEM_RECLAIM infiniband:0x0\n[ +0.000060] WARNING: CPU: 0 PID: 937 at kernel/workqueue.c:2966\ncheck_flush_dependency+0x10b/0x120\n[ +0.000007] Modules linked in: snd_seq_dummy snd_hrtimer snd_seq\nsnd_timer snd_seq_device snd soundcore nls_utf8 cifs cifs_arc4\nnls_ucs2_utils rdma_cm iw_cm ib_cm cifs_md4 dns_resolver netfs qrtr\nrfkill sunrpc vfat fat intel_rapl_msr intel_rapl_common irdma\nintel_uncore_frequency intel_uncore_frequency_common ice ipmi_ssif\nisst_if_common skx_edac nfit libnvdimm x86_pkg_temp_thermal\nintel_powerclamp gnss coretemp ib_uverbs rapl intel_cstate ib_core\niTCO_wdt iTCO_vendor_support acpi_ipmi mei_me ipmi_si intel_uncore\nioatdma i2c_i801 joydev pcspkr mei ipmi_devintf lpc_ich\nintel_pch_thermal i2c_smbus ipmi_msghandler acpi_power_meter acpi_pad\nxfs libcrc32c ast sd_mod drm_shmem_helper t10_pi drm_kms_helper sg ixgbe\ndrm i40e ahci crct10dif_pclmul libahci crc32_pclmul igb crc32c_intel\nlibata ghash_clmulni_intel i2c_algo_bit mdio dca wmi dm_mirror\ndm_region_hash dm_log dm_mod fuse\n[ +0.000050] CPU: 0 PID: 937 Comm: kworker/0:3 Kdump: loaded Not\ntainted 6.8.0-rc2-Feb-net_dev-Qiueue-00279-gbd43c5687e05 #1\n[ +0.000003] Hardware name: Intel Corporation S2600BPB/S2600BPB, BIOS\nSE5C620.86B.02.01.0013.121520200651 12/15/2020\n[ +0.000001] Workqueue: i40e i40e_service_task [i40e]\n[ +0.000024] RIP: 0010:check_flush_dependency+0x10b/0x120\n[ +0.000003] Code: ff 49 8b 54 24 18 48 8d 8b b0 00 00 00 49 89 e8 48\n81 c6 b0 00 00 00 48 c7 c7 b0 97 fa 9f c6 05 8a cc 1f 02 01 e8 35 b3 fd\nff \u003c0f\u003e 0b e9 10 ff ff ff 80 3d 78 cc 1f 02 00 75 94 e9 46 ff ff ff 90\n[ +0.000002] RSP: 0018:ffffbd294976bcf8 EFLAGS: 00010282\n[ +0.000002] RAX: 0000000000000000 RBX: ffff94d4c483c000 RCX:\n0000000000000027\n[ +0.000001] RDX: ffff94d47f620bc8 RSI: 0000000000000001 RDI:\nffff94d47f620bc0\n[ +0.000001] RBP: 0000000000000000 R08: 0000000000000000 R09:\n00000000ffff7fff\n[ +0.000001] R10: ffffbd294976bb98 R11: ffffffffa0be65e8 R12:\nffff94c5451ea180\n[ +0.000001] R13: ffff94c5ab5e8000 R14: ffff94c5c20b6e05 R15:\nffff94c5f1330ab0\n[ +0.000001] FS: 0000000000000000(0000) GS:ffff94d47f600000(0000)\nknlGS:0000000000000000\n[ +0.000002] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n[ +0.000001] CR2: 00007f9e6f1fca70 CR3: 0000000038e20004 CR4:\n00000000007706f0\n[ +0.000000] DR0: 0000000000000000 DR1: 0000000000000000 DR2:\n0000000000000000\n[ +0.000001] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7:\n0000000000000400\n[ +0.000001] PKRU: 55555554\n[ +0.000001] Call Trace:\n[ +0.000001] \u003cTASK\u003e\n[ +0.000002] ? __warn+0x80/0x130\n[ +0.000003] ? check_flush_dependency+0x10b/0x120\n[ +0.000002] ? report_bug+0x195/0x1a0\n[ +0.000005] ? handle_bug+0x3c/0x70\n[ +0.000003] ? exc_invalid_op+0x14/0x70\n[ +0.000002] ? asm_exc_invalid_op+0x16/0x20\n[ +0.000006] ? check_flush_dependency+0x10b/0x120\n[ +0.000002] ? check_flush_dependency+0x10b/0x120\n[ +0.000002] __flush_workqueue+0x126/0x3f0\n[ +0.000015] ib_cache_cleanup_one+0x1c/0xe0 [ib_core]\n[ +0.000056] __ib_unregister_device+0x6a/0xb0 [ib_core]\n[ +0.000023] ib_unregister_device_and_put+0x34/0x50 [ib_core]\n[ +0.000020] i40iw_close+0x4b/0x90 [irdma]\n[ +0.000022] i40e_notify_client_of_netdev_close+0x54/0xc0 [i40e]\n[ +0.000035] i40e_service_task+0x126/0x190 [i40e]\n[ +0.000024] process_one_work+0x174/0x340\n[ +0.000003] worker_th\n---truncated---",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-36004",
"url": "https://www.suse.com/security/cve/CVE-2024-36004"
},
{
"category": "external",
"summary": "SUSE Bug 1224545 for CVE-2024-36004",
"url": "https://bugzilla.suse.com/1224545"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-16T09:14:50Z",
"details": "moderate"
}
],
"title": "CVE-2024-36004"
},
{
"cve": "CVE-2024-36288",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-36288"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nSUNRPC: Fix loop termination condition in gss_free_in_token_pages()\n\nThe in_token-\u003epages[] array is not NULL terminated. This results in\nthe following KASAN splat:\n\n KASAN: maybe wild-memory-access in range [0x04a2013400000008-0x04a201340000000f]",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-36288",
"url": "https://www.suse.com/security/cve/CVE-2024-36288"
},
{
"category": "external",
"summary": "SUSE Bug 1226834 for CVE-2024-36288",
"url": "https://bugzilla.suse.com/1226834"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-16T09:14:50Z",
"details": "moderate"
}
],
"title": "CVE-2024-36288"
},
{
"cve": "CVE-2024-36592",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-36592"
}
],
"notes": [
{
"category": "general",
"text": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-36592",
"url": "https://www.suse.com/security/cve/CVE-2024-36592"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-16T09:14:50Z",
"details": "important"
}
],
"title": "CVE-2024-36592"
},
{
"cve": "CVE-2024-36901",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-36901"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nipv6: prevent NULL dereference in ip6_output()\n\nAccording to syzbot, there is a chance that ip6_dst_idev()\nreturns NULL in ip6_output(). Most places in IPv6 stack\ndeal with a NULL idev just fine, but not here.\n\nsyzbot reported:\n\ngeneral protection fault, probably for non-canonical address 0xdffffc00000000bc: 0000 [#1] PREEMPT SMP KASAN PTI\nKASAN: null-ptr-deref in range [0x00000000000005e0-0x00000000000005e7]\nCPU: 0 PID: 9775 Comm: syz-executor.4 Not tainted 6.9.0-rc5-syzkaller-00157-g6a30653b604a #0\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/27/2024\n RIP: 0010:ip6_output+0x231/0x3f0 net/ipv6/ip6_output.c:237\nCode: 3c 1e 00 49 89 df 74 08 4c 89 ef e8 19 58 db f7 48 8b 44 24 20 49 89 45 00 49 89 c5 48 8d 9d e0 05 00 00 48 89 d8 48 c1 e8 03 \u003c42\u003e 0f b6 04 38 84 c0 4c 8b 74 24 28 0f 85 61 01 00 00 8b 1b 31 ff\nRSP: 0018:ffffc9000927f0d8 EFLAGS: 00010202\nRAX: 00000000000000bc RBX: 00000000000005e0 RCX: 0000000000040000\nRDX: ffffc900131f9000 RSI: 0000000000004f47 RDI: 0000000000004f48\nRBP: 0000000000000000 R08: ffffffff8a1f0b9a R09: 1ffffffff1f51fad\nR10: dffffc0000000000 R11: fffffbfff1f51fae R12: ffff8880293ec8c0\nR13: ffff88805d7fc000 R14: 1ffff1100527d91a R15: dffffc0000000000\nFS: 00007f135c6856c0(0000) GS:ffff8880b9400000(0000) knlGS:0000000000000000\nCS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 0000000020000080 CR3: 0000000064096000 CR4: 00000000003506f0\nDR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\nDR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\nCall Trace:\n \u003cTASK\u003e\n NF_HOOK include/linux/netfilter.h:314 [inline]\n ip6_xmit+0xefe/0x17f0 net/ipv6/ip6_output.c:358\n sctp_v6_xmit+0x9f2/0x13f0 net/sctp/ipv6.c:248\n sctp_packet_transmit+0x26ad/0x2ca0 net/sctp/output.c:653\n sctp_packet_singleton+0x22c/0x320 net/sctp/outqueue.c:783\n sctp_outq_flush_ctrl net/sctp/outqueue.c:914 [inline]\n sctp_outq_flush+0x6d5/0x3e20 net/sctp/outqueue.c:1212\n sctp_side_effects net/sctp/sm_sideeffect.c:1198 [inline]\n sctp_do_sm+0x59cc/0x60c0 net/sctp/sm_sideeffect.c:1169\n sctp_primitive_ASSOCIATE+0x95/0xc0 net/sctp/primitive.c:73\n __sctp_connect+0x9cd/0xe30 net/sctp/socket.c:1234\n sctp_connect net/sctp/socket.c:4819 [inline]\n sctp_inet_connect+0x149/0x1f0 net/sctp/socket.c:4834\n __sys_connect_file net/socket.c:2048 [inline]\n __sys_connect+0x2df/0x310 net/socket.c:2065\n __do_sys_connect net/socket.c:2075 [inline]\n __se_sys_connect net/socket.c:2072 [inline]\n __x64_sys_connect+0x7a/0x90 net/socket.c:2072\n do_syscall_x64 arch/x86/entry/common.c:52 [inline]\n do_syscall_64+0xf5/0x240 arch/x86/entry/common.c:83\n entry_SYSCALL_64_after_hwframe+0x77/0x7f",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-36901",
"url": "https://www.suse.com/security/cve/CVE-2024-36901"
},
{
"category": "external",
"summary": "SUSE Bug 1225711 for CVE-2024-36901",
"url": "https://bugzilla.suse.com/1225711"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-16T09:14:50Z",
"details": "moderate"
}
],
"title": "CVE-2024-36901"
},
{
"cve": "CVE-2024-36902",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-36902"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nipv6: fib6_rules: avoid possible NULL dereference in fib6_rule_action()\n\nsyzbot is able to trigger the following crash [1],\ncaused by unsafe ip6_dst_idev() use.\n\nIndeed ip6_dst_idev() can return NULL, and must always be checked.\n\n[1]\n\nOops: general protection fault, probably for non-canonical address 0xdffffc0000000000: 0000 [#1] PREEMPT SMP KASAN PTI\nKASAN: null-ptr-deref in range [0x0000000000000000-0x0000000000000007]\nCPU: 0 PID: 31648 Comm: syz-executor.0 Not tainted 6.9.0-rc4-next-20240417-syzkaller #0\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/27/2024\n RIP: 0010:__fib6_rule_action net/ipv6/fib6_rules.c:237 [inline]\n RIP: 0010:fib6_rule_action+0x241/0x7b0 net/ipv6/fib6_rules.c:267\nCode: 02 00 00 49 8d 9f d8 00 00 00 48 89 d8 48 c1 e8 03 42 80 3c 20 00 74 08 48 89 df e8 f9 32 bf f7 48 8b 1b 48 89 d8 48 c1 e8 03 \u003c42\u003e 80 3c 20 00 74 08 48 89 df e8 e0 32 bf f7 4c 8b 03 48 89 ef 4c\nRSP: 0018:ffffc9000fc1f2f0 EFLAGS: 00010246\nRAX: 0000000000000000 RBX: 0000000000000000 RCX: 1a772f98c8186700\nRDX: 0000000000000003 RSI: ffffffff8bcac4e0 RDI: ffffffff8c1f9760\nRBP: ffff8880673fb980 R08: ffffffff8fac15ef R09: 1ffffffff1f582bd\nR10: dffffc0000000000 R11: fffffbfff1f582be R12: dffffc0000000000\nR13: 0000000000000080 R14: ffff888076509000 R15: ffff88807a029a00\nFS: 00007f55e82ca6c0(0000) GS:ffff8880b9400000(0000) knlGS:0000000000000000\nCS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 0000001b31d23000 CR3: 0000000022b66000 CR4: 00000000003506f0\nDR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\nDR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\nCall Trace:\n \u003cTASK\u003e\n fib_rules_lookup+0x62c/0xdb0 net/core/fib_rules.c:317\n fib6_rule_lookup+0x1fd/0x790 net/ipv6/fib6_rules.c:108\n ip6_route_output_flags_noref net/ipv6/route.c:2637 [inline]\n ip6_route_output_flags+0x38e/0x610 net/ipv6/route.c:2649\n ip6_route_output include/net/ip6_route.h:93 [inline]\n ip6_dst_lookup_tail+0x189/0x11a0 net/ipv6/ip6_output.c:1120\n ip6_dst_lookup_flow+0xb9/0x180 net/ipv6/ip6_output.c:1250\n sctp_v6_get_dst+0x792/0x1e20 net/sctp/ipv6.c:326\n sctp_transport_route+0x12c/0x2e0 net/sctp/transport.c:455\n sctp_assoc_add_peer+0x614/0x15c0 net/sctp/associola.c:662\n sctp_connect_new_asoc+0x31d/0x6c0 net/sctp/socket.c:1099\n __sctp_connect+0x66d/0xe30 net/sctp/socket.c:1197\n sctp_connect net/sctp/socket.c:4819 [inline]\n sctp_inet_connect+0x149/0x1f0 net/sctp/socket.c:4834\n __sys_connect_file net/socket.c:2048 [inline]\n __sys_connect+0x2df/0x310 net/socket.c:2065\n __do_sys_connect net/socket.c:2075 [inline]\n __se_sys_connect net/socket.c:2072 [inline]\n __x64_sys_connect+0x7a/0x90 net/socket.c:2072\n do_syscall_x64 arch/x86/entry/common.c:52 [inline]\n do_syscall_64+0xf5/0x240 arch/x86/entry/common.c:83\n entry_SYSCALL_64_after_hwframe+0x77/0x7f",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-36902",
"url": "https://www.suse.com/security/cve/CVE-2024-36902"
},
{
"category": "external",
"summary": "SUSE Bug 1225719 for CVE-2024-36902",
"url": "https://bugzilla.suse.com/1225719"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-16T09:14:50Z",
"details": "moderate"
}
],
"title": "CVE-2024-36902"
},
{
"cve": "CVE-2024-36919",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-36919"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: bnx2fc: Remove spin_lock_bh while releasing resources after upload\n\nThe session resources are used by FW and driver when session is offloaded,\nonce session is uploaded these resources are not used. The lock is not\nrequired as these fields won\u0027t be used any longer. The offload and upload\ncalls are sequential, hence lock is not required.\n\nThis will suppress following BUG_ON():\n\n[ 449.843143] ------------[ cut here ]------------\n[ 449.848302] kernel BUG at mm/vmalloc.c:2727!\n[ 449.853072] invalid opcode: 0000 [#1] PREEMPT SMP PTI\n[ 449.858712] CPU: 5 PID: 1996 Comm: kworker/u24:2 Not tainted 5.14.0-118.el9.x86_64 #1\nRebooting.\n[ 449.867454] Hardware name: Dell Inc. PowerEdge R730/0WCJNT, BIOS 2.3.4 11/08/2016\n[ 449.876966] Workqueue: fc_rport_eq fc_rport_work [libfc]\n[ 449.882910] RIP: 0010:vunmap+0x2e/0x30\n[ 449.887098] Code: 00 65 8b 05 14 a2 f0 4a a9 00 ff ff 00 75 1b 55 48 89 fd e8 34 36 79 00 48 85 ed 74 0b 48 89 ef 31 f6 5d e9 14 fc ff ff 5d c3 \u003c0f\u003e 0b 0f 1f 44 00 00 41 57 41 56 49 89 ce 41 55 49 89 fd 41 54 41\n[ 449.908054] RSP: 0018:ffffb83d878b3d68 EFLAGS: 00010206\n[ 449.913887] RAX: 0000000080000201 RBX: ffff8f4355133550 RCX: 000000000d400005\n[ 449.921843] RDX: 0000000000000001 RSI: 0000000000001000 RDI: ffffb83da53f5000\n[ 449.929808] RBP: ffff8f4ac6675800 R08: ffffb83d878b3d30 R09: 00000000000efbdf\n[ 449.937774] R10: 0000000000000003 R11: ffff8f434573e000 R12: 0000000000001000\n[ 449.945736] R13: 0000000000001000 R14: ffffb83da53f5000 R15: ffff8f43d4ea3ae0\n[ 449.953701] FS: 0000000000000000(0000) GS:ffff8f529fc80000(0000) knlGS:0000000000000000\n[ 449.962732] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n[ 449.969138] CR2: 00007f8cf993e150 CR3: 0000000efbe10003 CR4: 00000000003706e0\n[ 449.977102] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\n[ 449.985065] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\n[ 449.993028] Call Trace:\n[ 449.995756] __iommu_dma_free+0x96/0x100\n[ 450.000139] bnx2fc_free_session_resc+0x67/0x240 [bnx2fc]\n[ 450.006171] bnx2fc_upload_session+0xce/0x100 [bnx2fc]\n[ 450.011910] bnx2fc_rport_event_handler+0x9f/0x240 [bnx2fc]\n[ 450.018136] fc_rport_work+0x103/0x5b0 [libfc]\n[ 450.023103] process_one_work+0x1e8/0x3c0\n[ 450.027581] worker_thread+0x50/0x3b0\n[ 450.031669] ? rescuer_thread+0x370/0x370\n[ 450.036143] kthread+0x149/0x170\n[ 450.039744] ? set_kthread_struct+0x40/0x40\n[ 450.044411] ret_from_fork+0x22/0x30\n[ 450.048404] Modules linked in: vfat msdos fat xfs nfs_layout_nfsv41_files rpcsec_gss_krb5 auth_rpcgss nfsv4 dns_resolver dm_service_time qedf qed crc8 bnx2fc libfcoe libfc scsi_transport_fc intel_rapl_msr intel_rapl_common x86_pkg_temp_thermal intel_powerclamp dcdbas rapl intel_cstate intel_uncore mei_me pcspkr mei ipmi_ssif lpc_ich ipmi_si fuse zram ext4 mbcache jbd2 loop nfsv3 nfs_acl nfs lockd grace fscache netfs irdma ice sd_mod t10_pi sg ib_uverbs ib_core 8021q garp mrp stp llc mgag200 i2c_algo_bit drm_kms_helper syscopyarea sysfillrect sysimgblt mxm_wmi fb_sys_fops cec crct10dif_pclmul ahci crc32_pclmul bnx2x drm ghash_clmulni_intel libahci rfkill i40e libata megaraid_sas mdio wmi sunrpc lrw dm_crypt dm_round_robin dm_multipath dm_snapshot dm_bufio dm_mirror dm_region_hash dm_log dm_zero dm_mod linear raid10 raid456 async_raid6_recov async_memcpy async_pq async_xor async_tx raid6_pq libcrc32c crc32c_intel raid1 raid0 iscsi_ibft squashfs be2iscsi bnx2i cnic uio cxgb4i cxgb4 tls\n[ 450.048497] libcxgbi libcxgb qla4xxx iscsi_boot_sysfs iscsi_tcp libiscsi_tcp libiscsi scsi_transport_iscsi edd ipmi_devintf ipmi_msghandler\n[ 450.159753] ---[ end trace 712de2c57c64abc8 ]---",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-36919",
"url": "https://www.suse.com/security/cve/CVE-2024-36919"
},
{
"category": "external",
"summary": "SUSE Bug 1225767 for CVE-2024-36919",
"url": "https://bugzilla.suse.com/1225767"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-16T09:14:50Z",
"details": "moderate"
}
],
"title": "CVE-2024-36919"
},
{
"cve": "CVE-2024-36924",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-36924"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: lpfc: Release hbalock before calling lpfc_worker_wake_up()\n\nlpfc_worker_wake_up() calls the lpfc_work_done() routine, which takes the\nhbalock. Thus, lpfc_worker_wake_up() should not be called while holding the\nhbalock to avoid potential deadlock.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-36924",
"url": "https://www.suse.com/security/cve/CVE-2024-36924"
},
{
"category": "external",
"summary": "SUSE Bug 1225820 for CVE-2024-36924",
"url": "https://bugzilla.suse.com/1225820"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-16T09:14:50Z",
"details": "moderate"
}
],
"title": "CVE-2024-36924"
},
{
"cve": "CVE-2024-36939",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-36939"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnfs: Handle error of rpc_proc_register() in nfs_net_init().\n\nsyzkaller reported a warning [0] triggered while destroying immature\nnetns.\n\nrpc_proc_register() was called in init_nfs_fs(), but its error\nhas been ignored since at least the initial commit 1da177e4c3f4\n(\"Linux-2.6.12-rc2\").\n\nRecently, commit d47151b79e32 (\"nfs: expose /proc/net/sunrpc/nfs\nin net namespaces\") converted the procfs to per-netns and made\nthe problem more visible.\n\nEven when rpc_proc_register() fails, nfs_net_init() could succeed,\nand thus nfs_net_exit() will be called while destroying the netns.\n\nThen, remove_proc_entry() will be called for non-existing proc\ndirectory and trigger the warning below.\n\nLet\u0027s handle the error of rpc_proc_register() properly in nfs_net_init().\n\n[0]:\nname \u0027nfs\u0027\nWARNING: CPU: 1 PID: 1710 at fs/proc/generic.c:711 remove_proc_entry+0x1bb/0x2d0 fs/proc/generic.c:711\nModules linked in:\nCPU: 1 PID: 1710 Comm: syz-executor.2 Not tainted 6.8.0-12822-gcd51db110a7e #12\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.16.0-0-gd239552ce722-prebuilt.qemu.org 04/01/2014\nRIP: 0010:remove_proc_entry+0x1bb/0x2d0 fs/proc/generic.c:711\nCode: 41 5d 41 5e c3 e8 85 09 b5 ff 48 c7 c7 88 58 64 86 e8 09 0e 71 02 e8 74 09 b5 ff 4c 89 e6 48 c7 c7 de 1b 80 84 e8 c5 ad 97 ff \u003c0f\u003e 0b eb b1 e8 5c 09 b5 ff 48 c7 c7 88 58 64 86 e8 e0 0d 71 02 eb\nRSP: 0018:ffffc9000c6d7ce0 EFLAGS: 00010286\nRAX: 0000000000000000 RBX: ffff8880422b8b00 RCX: ffffffff8110503c\nRDX: ffff888030652f00 RSI: ffffffff81105045 RDI: 0000000000000001\nRBP: 0000000000000000 R08: 0000000000000001 R09: 0000000000000000\nR10: 0000000000000001 R11: ffffffff81bb62cb R12: ffffffff84807ffc\nR13: ffff88804ad6fcc0 R14: ffffffff84807ffc R15: ffffffff85741ff8\nFS: 00007f30cfba8640(0000) GS:ffff88807dd00000(0000) knlGS:0000000000000000\nCS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 00007ff51afe8000 CR3: 000000005a60a005 CR4: 0000000000770ef0\nDR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\nDR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\nPKRU: 55555554\nCall Trace:\n \u003cTASK\u003e\n rpc_proc_unregister+0x64/0x70 net/sunrpc/stats.c:310\n nfs_net_exit+0x1c/0x30 fs/nfs/inode.c:2438\n ops_exit_list+0x62/0xb0 net/core/net_namespace.c:170\n setup_net+0x46c/0x660 net/core/net_namespace.c:372\n copy_net_ns+0x244/0x590 net/core/net_namespace.c:505\n create_new_namespaces+0x2ed/0x770 kernel/nsproxy.c:110\n unshare_nsproxy_namespaces+0xae/0x160 kernel/nsproxy.c:228\n ksys_unshare+0x342/0x760 kernel/fork.c:3322\n __do_sys_unshare kernel/fork.c:3393 [inline]\n __se_sys_unshare kernel/fork.c:3391 [inline]\n __x64_sys_unshare+0x1f/0x30 kernel/fork.c:3391\n do_syscall_x64 arch/x86/entry/common.c:52 [inline]\n do_syscall_64+0x4f/0x110 arch/x86/entry/common.c:83\n entry_SYSCALL_64_after_hwframe+0x46/0x4e\nRIP: 0033:0x7f30d0febe5d\nCode: ff c3 66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e fa 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 \u003c48\u003e 3d 01 f0 ff ff 73 01 c3 48 8b 0d 73 9f 1b 00 f7 d8 64 89 01 48\nRSP: 002b:00007f30cfba7cc8 EFLAGS: 00000246 ORIG_RAX: 0000000000000110\nRAX: ffffffffffffffda RBX: 00000000004bbf80 RCX: 00007f30d0febe5d\nRDX: 0000000000000000 RSI: 0000000000000000 RDI: 000000006c020600\nRBP: 00000000004bbf80 R08: 0000000000000000 R09: 0000000000000000\nR10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002\nR13: 000000000000000b R14: 00007f30d104c530 R15: 0000000000000000\n \u003c/TASK\u003e",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-36939",
"url": "https://www.suse.com/security/cve/CVE-2024-36939"
},
{
"category": "external",
"summary": "SUSE Bug 1225838 for CVE-2024-36939",
"url": "https://bugzilla.suse.com/1225838"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-16T09:14:50Z",
"details": "moderate"
}
],
"title": "CVE-2024-36939"
},
{
"cve": "CVE-2024-36952",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-36952"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: lpfc: Move NPIV\u0027s transport unregistration to after resource clean up\n\nThere are cases after NPIV deletion where the fabric switch still believes\nthe NPIV is logged into the fabric. This occurs when a vport is\nunregistered before the Remove All DA_ID CT and LOGO ELS are sent to the\nfabric.\n\nCurrently fc_remove_host(), which calls dev_loss_tmo for all D_IDs including\nthe fabric D_ID, removes the last ndlp reference and frees the ndlp rport\nobject. This sometimes causes the race condition where the final DA_ID and\nLOGO are skipped from being sent to the fabric switch.\n\nFix by moving the fc_remove_host() and scsi_remove_host() calls after DA_ID\nand LOGO are sent.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-36952",
"url": "https://www.suse.com/security/cve/CVE-2024-36952"
},
{
"category": "external",
"summary": "SUSE Bug 1225898 for CVE-2024-36952",
"url": "https://bugzilla.suse.com/1225898"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-16T09:14:50Z",
"details": "moderate"
}
],
"title": "CVE-2024-36952"
},
{
"cve": "CVE-2024-38558",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-38558"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: openvswitch: fix overwriting ct original tuple for ICMPv6\n\nOVS_PACKET_CMD_EXECUTE has 3 main attributes:\n - OVS_PACKET_ATTR_KEY - Packet metadata in a netlink format.\n - OVS_PACKET_ATTR_PACKET - Binary packet content.\n - OVS_PACKET_ATTR_ACTIONS - Actions to execute on the packet.\n\nOVS_PACKET_ATTR_KEY is parsed first to populate sw_flow_key structure\nwith the metadata like conntrack state, input port, recirculation id,\netc. Then the packet itself gets parsed to populate the rest of the\nkeys from the packet headers.\n\nWhenever the packet parsing code starts parsing the ICMPv6 header, it\nfirst zeroes out fields in the key corresponding to Neighbor Discovery\ninformation even if it is not an ND packet.\n\nIt is an \u0027ipv6.nd\u0027 field. However, the \u0027ipv6\u0027 is a union that shares\nthe space between \u0027nd\u0027 and \u0027ct_orig\u0027 that holds the original tuple\nconntrack metadata parsed from the OVS_PACKET_ATTR_KEY.\n\nND packets should not normally have conntrack state, so it\u0027s fine to\nshare the space, but normal ICMPv6 Echo packets or maybe other types of\nICMPv6 can have the state attached and it should not be overwritten.\n\nThe issue results in all but the last 4 bytes of the destination\naddress being wiped from the original conntrack tuple leading to\nincorrect packet matching and potentially executing wrong actions\nin case this packet recirculates within the datapath or goes back\nto userspace.\n\nND fields should not be accessed in non-ND packets, so not clearing\nthem should be fine. Executing memset() only for actual ND packets to\navoid the issue.\n\nInitializing the whole thing before parsing is needed because ND packet\nmay not contain all the options.\n\nThe issue only affects the OVS_PACKET_CMD_EXECUTE path and doesn\u0027t\naffect packets entering OVS datapath from network interfaces, because\nin this case CT metadata is populated from skb after the packet is\nalready parsed.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-38558",
"url": "https://www.suse.com/security/cve/CVE-2024-38558"
},
{
"category": "external",
"summary": "SUSE Bug 1226783 for CVE-2024-38558",
"url": "https://bugzilla.suse.com/1226783"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-16T09:14:50Z",
"details": "moderate"
}
],
"title": "CVE-2024-38558"
},
{
"cve": "CVE-2024-38560",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-38560"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: bfa: Ensure the copied buf is NUL terminated\n\nCurrently, we allocate a nbytes-sized kernel buffer and copy nbytes from\nuserspace to that buffer. Later, we use sscanf on this buffer but we don\u0027t\nensure that the string is terminated inside the buffer, this can lead to\nOOB read when using sscanf. Fix this issue by using memdup_user_nul instead\nof memdup_user.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-38560",
"url": "https://www.suse.com/security/cve/CVE-2024-38560"
},
{
"category": "external",
"summary": "SUSE Bug 1226786 for CVE-2024-38560",
"url": "https://bugzilla.suse.com/1226786"
},
{
"category": "external",
"summary": "SUSE Bug 1227319 for CVE-2024-38560",
"url": "https://bugzilla.suse.com/1227319"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-16T09:14:50Z",
"details": "moderate"
}
],
"title": "CVE-2024-38560"
},
{
"cve": "CVE-2024-38630",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-38630"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nwatchdog: cpu5wdt.c: Fix use-after-free bug caused by cpu5wdt_trigger\n\nWhen the cpu5wdt module is removing, the origin code uses del_timer() to\nde-activate the timer. If the timer handler is running, del_timer() could\nnot stop it and will return directly. If the port region is released by\nrelease_region() and then the timer handler cpu5wdt_trigger() calls outb()\nto write into the region that is released, the use-after-free bug will\nhappen.\n\nChange del_timer() to timer_shutdown_sync() in order that the timer handler\ncould be finished before the port region is released.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-38630",
"url": "https://www.suse.com/security/cve/CVE-2024-38630"
},
{
"category": "external",
"summary": "SUSE Bug 1226908 for CVE-2024-38630",
"url": "https://bugzilla.suse.com/1226908"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-16T09:14:50Z",
"details": "moderate"
}
],
"title": "CVE-2024-38630"
},
{
"cve": "CVE-2024-39487",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-39487"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbonding: Fix out-of-bounds read in bond_option_arp_ip_targets_set()\n\nIn function bond_option_arp_ip_targets_set(), if newval-\u003estring is an\nempty string, newval-\u003estring+1 will point to the byte after the\nstring, causing an out-of-bound read.\n\nBUG: KASAN: slab-out-of-bounds in strlen+0x7d/0xa0 lib/string.c:418\nRead of size 1 at addr ffff8881119c4781 by task syz-executor665/8107\nCPU: 1 PID: 8107 Comm: syz-executor665 Not tainted 6.7.0-rc7 #1\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.15.0-1 04/01/2014\nCall Trace:\n \u003cTASK\u003e\n __dump_stack lib/dump_stack.c:88 [inline]\n dump_stack_lvl+0xd9/0x150 lib/dump_stack.c:106\n print_address_description mm/kasan/report.c:364 [inline]\n print_report+0xc1/0x5e0 mm/kasan/report.c:475\n kasan_report+0xbe/0xf0 mm/kasan/report.c:588\n strlen+0x7d/0xa0 lib/string.c:418\n __fortify_strlen include/linux/fortify-string.h:210 [inline]\n in4_pton+0xa3/0x3f0 net/core/utils.c:130\n bond_option_arp_ip_targets_set+0xc2/0x910\ndrivers/net/bonding/bond_options.c:1201\n __bond_opt_set+0x2a4/0x1030 drivers/net/bonding/bond_options.c:767\n __bond_opt_set_notify+0x48/0x150 drivers/net/bonding/bond_options.c:792\n bond_opt_tryset_rtnl+0xda/0x160 drivers/net/bonding/bond_options.c:817\n bonding_sysfs_store_option+0xa1/0x120 drivers/net/bonding/bond_sysfs.c:156\n dev_attr_store+0x54/0x80 drivers/base/core.c:2366\n sysfs_kf_write+0x114/0x170 fs/sysfs/file.c:136\n kernfs_fop_write_iter+0x337/0x500 fs/kernfs/file.c:334\n call_write_iter include/linux/fs.h:2020 [inline]\n new_sync_write fs/read_write.c:491 [inline]\n vfs_write+0x96a/0xd80 fs/read_write.c:584\n ksys_write+0x122/0x250 fs/read_write.c:637\n do_syscall_x64 arch/x86/entry/common.c:52 [inline]\n do_syscall_64+0x40/0x110 arch/x86/entry/common.c:83\n entry_SYSCALL_64_after_hwframe+0x63/0x6b\n---[ end trace ]---\n\nFix it by adding a check of string length before using it.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-39487",
"url": "https://www.suse.com/security/cve/CVE-2024-39487"
},
{
"category": "external",
"summary": "SUSE Bug 1227573 for CVE-2024-39487",
"url": "https://bugzilla.suse.com/1227573"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-16T09:14:50Z",
"details": "moderate"
}
],
"title": "CVE-2024-39487"
},
{
"cve": "CVE-2024-39488",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-39488"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\narm64: asm-bug: Add .align 2 to the end of __BUG_ENTRY\n\nWhen CONFIG_DEBUG_BUGVERBOSE=n, we fail to add necessary padding bytes\nto bug_table entries, and as a result the last entry in a bug table will\nbe ignored, potentially leading to an unexpected panic(). All prior\nentries in the table will be handled correctly.\n\nThe arm64 ABI requires that struct fields of up to 8 bytes are\nnaturally-aligned, with padding added within a struct such that struct\nare suitably aligned within arrays.\n\nWhen CONFIG_DEBUG_BUGVERPOSE=y, the layout of a bug_entry is:\n\n\tstruct bug_entry {\n\t\tsigned int bug_addr_disp;\t// 4 bytes\n\t\tsigned int file_disp;\t// 4 bytes\n\t\tunsigned short line;\t\t// 2 bytes\n\t\tunsigned short flags;\t\t// 2 bytes\n\t}\n\n... with 12 bytes total, requiring 4-byte alignment.\n\nWhen CONFIG_DEBUG_BUGVERBOSE=n, the layout of a bug_entry is:\n\n\tstruct bug_entry {\n\t\tsigned int bug_addr_disp;\t// 4 bytes\n\t\tunsigned short flags;\t\t// 2 bytes\n\t\t\u003c implicit padding \u003e\t\t// 2 bytes\n\t}\n\n... with 8 bytes total, with 6 bytes of data and 2 bytes of trailing\npadding, requiring 4-byte alginment.\n\nWhen we create a bug_entry in assembly, we align the start of the entry\nto 4 bytes, which implicitly handles padding for any prior entries.\nHowever, we do not align the end of the entry, and so when\nCONFIG_DEBUG_BUGVERBOSE=n, the final entry lacks the trailing padding\nbytes.\n\nFor the main kernel image this is not a problem as find_bug() doesn\u0027t\ndepend on the trailing padding bytes when searching for entries:\n\n\tfor (bug = __start___bug_table; bug \u003c __stop___bug_table; ++bug)\n\t\tif (bugaddr == bug_addr(bug))\n\t\t\treturn bug;\n\nHowever for modules, module_bug_finalize() depends on the trailing\nbytes when calculating the number of entries:\n\n\tmod-\u003enum_bugs = sechdrs[i].sh_size / sizeof(struct bug_entry);\n\n... and as the last bug_entry lacks the necessary padding bytes, this entry\nwill not be counted, e.g. in the case of a single entry:\n\n\tsechdrs[i].sh_size == 6\n\tsizeof(struct bug_entry) == 8;\n\n\tsechdrs[i].sh_size / sizeof(struct bug_entry) == 0;\n\nConsequently module_find_bug() will miss the last bug_entry when it does:\n\n\tfor (i = 0; i \u003c mod-\u003enum_bugs; ++i, ++bug)\n\t\tif (bugaddr == bug_addr(bug))\n\t\t\tgoto out;\n\n... which can lead to a kenrel panic due to an unhandled bug.\n\nThis can be demonstrated with the following module:\n\n\tstatic int __init buginit(void)\n\t{\n\t\tWARN(1, \"hello\\n\");\n\t\treturn 0;\n\t}\n\n\tstatic void __exit bugexit(void)\n\t{\n\t}\n\n\tmodule_init(buginit);\n\tmodule_exit(bugexit);\n\tMODULE_LICENSE(\"GPL\");\n\n... which will trigger a kernel panic when loaded:\n\n\t------------[ cut here ]------------\n\thello\n\tUnexpected kernel BRK exception at EL1\n\tInternal error: BRK handler: 00000000f2000800 [#1] PREEMPT SMP\n\tModules linked in: hello(O+)\n\tCPU: 0 PID: 50 Comm: insmod Tainted: G O 6.9.1 #8\n\tHardware name: linux,dummy-virt (DT)\n\tpstate: 60400005 (nZCv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)\n\tpc : buginit+0x18/0x1000 [hello]\n\tlr : buginit+0x18/0x1000 [hello]\n\tsp : ffff800080533ae0\n\tx29: ffff800080533ae0 x28: 0000000000000000 x27: 0000000000000000\n\tx26: ffffaba8c4e70510 x25: ffff800080533c30 x24: ffffaba8c4a28a58\n\tx23: 0000000000000000 x22: 0000000000000000 x21: ffff3947c0eab3c0\n\tx20: ffffaba8c4e3f000 x19: ffffaba846464000 x18: 0000000000000006\n\tx17: 0000000000000000 x16: ffffaba8c2492834 x15: 0720072007200720\n\tx14: 0720072007200720 x13: ffffaba8c49b27c8 x12: 0000000000000312\n\tx11: 0000000000000106 x10: ffffaba8c4a0a7c8 x9 : ffffaba8c49b27c8\n\tx8 : 00000000ffffefff x7 : ffffaba8c4a0a7c8 x6 : 80000000fffff000\n\tx5 : 0000000000000107 x4 : 0000000000000000 x3 : 0000000000000000\n\tx2 : 0000000000000000 x1 : 0000000000000000 x0 : ffff3947c0eab3c0\n\tCall trace:\n\t buginit+0x18/0x1000 [hello]\n\t do_one_initcall+0x80/0x1c8\n\t do_init_module+0x60/0x218\n\t load_module+0x1ba4/0x1d70\n\t __do_sys_init_module+0x198/0x1d0\n\t __arm64_sys_init_module+0x1c/0x28\n\t invoke_syscall+0x48/0x114\n\t el0_svc\n---truncated---",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-39488",
"url": "https://www.suse.com/security/cve/CVE-2024-39488"
},
{
"category": "external",
"summary": "SUSE Bug 1227618 for CVE-2024-39488",
"url": "https://bugzilla.suse.com/1227618"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-16T09:14:50Z",
"details": "moderate"
}
],
"title": "CVE-2024-39488"
},
{
"cve": "CVE-2024-39490",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-39490"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nipv6: sr: fix missing sk_buff release in seg6_input_core\n\nThe seg6_input() function is responsible for adding the SRH into a\npacket, delegating the operation to the seg6_input_core(). This function\nuses the skb_cow_head() to ensure that there is sufficient headroom in\nthe sk_buff for accommodating the link-layer header.\nIn the event that the skb_cow_header() function fails, the\nseg6_input_core() catches the error but it does not release the sk_buff,\nwhich will result in a memory leak.\n\nThis issue was introduced in commit af3b5158b89d (\"ipv6: sr: fix BUG due\nto headroom too small after SRH push\") and persists even after commit\n7a3f5b0de364 (\"netfilter: add netfilter hooks to SRv6 data plane\"),\nwhere the entire seg6_input() code was refactored to deal with netfilter\nhooks.\n\nThe proposed patch addresses the identified memory leak by requiring the\nseg6_input_core() function to release the sk_buff in the event that\nskb_cow_head() fails.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-39490",
"url": "https://www.suse.com/security/cve/CVE-2024-39490"
},
{
"category": "external",
"summary": "SUSE Bug 1227626 for CVE-2024-39490",
"url": "https://bugzilla.suse.com/1227626"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-16T09:14:50Z",
"details": "low"
}
],
"title": "CVE-2024-39490"
},
{
"cve": "CVE-2024-39494",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-39494"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nima: Fix use-after-free on a dentry\u0027s dname.name\n\n-\u003ed_name.name can change on rename and the earlier value can be freed;\nthere are conditions sufficient to stabilize it (-\u003ed_lock on dentry,\n-\u003ed_lock on its parent, -\u003ei_rwsem exclusive on the parent\u0027s inode,\nrename_lock), but none of those are met at any of the sites. Take a stable\nsnapshot of the name instead.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-39494",
"url": "https://www.suse.com/security/cve/CVE-2024-39494"
},
{
"category": "external",
"summary": "SUSE Bug 1227716 for CVE-2024-39494",
"url": "https://bugzilla.suse.com/1227716"
},
{
"category": "external",
"summary": "SUSE Bug 1227901 for CVE-2024-39494",
"url": "https://bugzilla.suse.com/1227901"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-16T09:14:50Z",
"details": "important"
}
],
"title": "CVE-2024-39494"
},
{
"cve": "CVE-2024-39499",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-39499"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nvmci: prevent speculation leaks by sanitizing event in event_deliver()\n\nCoverity spotted that event_msg is controlled by user-space,\nevent_msg-\u003eevent_data.event is passed to event_deliver() and used\nas an index without sanitization.\n\nThis change ensures that the event index is sanitized to mitigate any\npossibility of speculative information leaks.\n\nThis bug was discovered and resolved using Coverity Static Analysis\nSecurity Testing (SAST) by Synopsys, Inc.\n\nOnly compile tested, no access to HW.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-39499",
"url": "https://www.suse.com/security/cve/CVE-2024-39499"
},
{
"category": "external",
"summary": "SUSE Bug 1227725 for CVE-2024-39499",
"url": "https://bugzilla.suse.com/1227725"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-16T09:14:50Z",
"details": "moderate"
}
],
"title": "CVE-2024-39499"
},
{
"cve": "CVE-2024-39501",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-39501"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrivers: core: synchronize really_probe() and dev_uevent()\n\nSynchronize the dev-\u003edriver usage in really_probe() and dev_uevent().\nThese can run in different threads, what can result in the following\nrace condition for dev-\u003edriver uninitialization:\n\nThread #1:\n==========\n\nreally_probe() {\n...\nprobe_failed:\n...\ndevice_unbind_cleanup(dev) {\n ...\n dev-\u003edriver = NULL; // \u003c= Failed probe sets dev-\u003edriver to NULL\n ...\n }\n...\n}\n\nThread #2:\n==========\n\ndev_uevent() {\n...\nif (dev-\u003edriver)\n // If dev-\u003edriver is NULLed from really_probe() from here on,\n // after above check, the system crashes\n add_uevent_var(env, \"DRIVER=%s\", dev-\u003edriver-\u003ename);\n...\n}\n\nreally_probe() holds the lock, already. So nothing needs to be done\nthere. dev_uevent() is called with lock held, often, too. But not\nalways. What implies that we can\u0027t add any locking in dev_uevent()\nitself. So fix this race by adding the lock to the non-protected\npath. This is the path where above race is observed:\n\n dev_uevent+0x235/0x380\n uevent_show+0x10c/0x1f0 \u003c= Add lock here\n dev_attr_show+0x3a/0xa0\n sysfs_kf_seq_show+0x17c/0x250\n kernfs_seq_show+0x7c/0x90\n seq_read_iter+0x2d7/0x940\n kernfs_fop_read_iter+0xc6/0x310\n vfs_read+0x5bc/0x6b0\n ksys_read+0xeb/0x1b0\n __x64_sys_read+0x42/0x50\n x64_sys_call+0x27ad/0x2d30\n do_syscall_64+0xcd/0x1d0\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\n\nSimilar cases are reported by syzkaller in\n\nhttps://syzkaller.appspot.com/bug?extid=ffa8143439596313a85a\n\nBut these are regarding the *initialization* of dev-\u003edriver\n\ndev-\u003edriver = drv;\n\nAs this switches dev-\u003edriver to non-NULL these reports can be considered\nto be false-positives (which should be \"fixed\" by this commit, as well,\nthough).\n\nThe same issue was reported and tried to be fixed back in 2015 in\n\nhttps://lore.kernel.org/lkml/1421259054-2574-1-git-send-email-a.sangwan@samsung.com/\n\nalready.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-39501",
"url": "https://www.suse.com/security/cve/CVE-2024-39501"
},
{
"category": "external",
"summary": "SUSE Bug 1227754 for CVE-2024-39501",
"url": "https://bugzilla.suse.com/1227754"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-16T09:14:50Z",
"details": "moderate"
}
],
"title": "CVE-2024-39501"
},
{
"cve": "CVE-2024-39506",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-39506"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nliquidio: Adjust a NULL pointer handling path in lio_vf_rep_copy_packet\n\nIn lio_vf_rep_copy_packet() pg_info-\u003epage is compared to a NULL value,\nbut then it is unconditionally passed to skb_add_rx_frag() which looks\nstrange and could lead to null pointer dereference.\n\nlio_vf_rep_copy_packet() call trace looks like:\n\tocteon_droq_process_packets\n\t octeon_droq_fast_process_packets\n\t octeon_droq_dispatch_pkt\n\t octeon_create_recv_info\n\t ...search in the dispatch_list...\n\t -\u003edisp_fn(rdisp-\u003erinfo, ...)\n\t lio_vf_rep_pkt_recv(struct octeon_recv_info *recv_info, ...)\nIn this path there is no code which sets pg_info-\u003epage to NULL.\nSo this check looks unneeded and doesn\u0027t solve potential problem.\nBut I guess the author had reason to add a check and I have no such card\nand can\u0027t do real test.\nIn addition, the code in the function liquidio_push_packet() in\nliquidio/lio_core.c does exactly the same.\n\nBased on this, I consider the most acceptable compromise solution to\nadjust this issue by moving skb_add_rx_frag() into conditional scope.\n\nFound by Linux Verification Center (linuxtesting.org) with SVACE.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-39506",
"url": "https://www.suse.com/security/cve/CVE-2024-39506"
},
{
"category": "external",
"summary": "SUSE Bug 1227729 for CVE-2024-39506",
"url": "https://bugzilla.suse.com/1227729"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-16T09:14:50Z",
"details": "moderate"
}
],
"title": "CVE-2024-39506"
},
{
"cve": "CVE-2024-39507",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-39507"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: hns3: fix kernel crash problem in concurrent scenario\n\nWhen link status change, the nic driver need to notify the roce\ndriver to handle this event, but at this time, the roce driver\nmay uninit, then cause kernel crash.\n\nTo fix the problem, when link status change, need to check\nwhether the roce registered, and when uninit, need to wait link\nupdate finish.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-39507",
"url": "https://www.suse.com/security/cve/CVE-2024-39507"
},
{
"category": "external",
"summary": "SUSE Bug 1227730 for CVE-2024-39507",
"url": "https://bugzilla.suse.com/1227730"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-16T09:14:50Z",
"details": "moderate"
}
],
"title": "CVE-2024-39507"
},
{
"cve": "CVE-2024-39509",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-39509"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nHID: core: remove unnecessary WARN_ON() in implement()\n\nSyzkaller hit a warning [1] in a call to implement() when trying\nto write a value into a field of smaller size in an output report.\n\nSince implement() already has a warn message printed out with the\nhelp of hid_warn() and value in question gets trimmed with:\n\t...\n\tvalue \u0026= m;\n\t...\nWARN_ON may be considered superfluous. Remove it to suppress future\nsyzkaller triggers.\n\n[1]\nWARNING: CPU: 0 PID: 5084 at drivers/hid/hid-core.c:1451 implement drivers/hid/hid-core.c:1451 [inline]\nWARNING: CPU: 0 PID: 5084 at drivers/hid/hid-core.c:1451 hid_output_report+0x548/0x760 drivers/hid/hid-core.c:1863\nModules linked in:\nCPU: 0 PID: 5084 Comm: syz-executor424 Not tainted 6.9.0-rc7-syzkaller-00183-gcf87f46fd34d #0\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/02/2024\nRIP: 0010:implement drivers/hid/hid-core.c:1451 [inline]\nRIP: 0010:hid_output_report+0x548/0x760 drivers/hid/hid-core.c:1863\n...\nCall Trace:\n \u003cTASK\u003e\n __usbhid_submit_report drivers/hid/usbhid/hid-core.c:591 [inline]\n usbhid_submit_report+0x43d/0x9e0 drivers/hid/usbhid/hid-core.c:636\n hiddev_ioctl+0x138b/0x1f00 drivers/hid/usbhid/hiddev.c:726\n vfs_ioctl fs/ioctl.c:51 [inline]\n __do_sys_ioctl fs/ioctl.c:904 [inline]\n __se_sys_ioctl+0xfc/0x170 fs/ioctl.c:890\n do_syscall_x64 arch/x86/entry/common.c:52 [inline]\n do_syscall_64+0xf5/0x240 arch/x86/entry/common.c:83\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\n...",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-39509",
"url": "https://www.suse.com/security/cve/CVE-2024-39509"
},
{
"category": "external",
"summary": "SUSE Bug 1227733 for CVE-2024-39509",
"url": "https://bugzilla.suse.com/1227733"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-16T09:14:50Z",
"details": "moderate"
}
],
"title": "CVE-2024-39509"
},
{
"cve": "CVE-2024-40901",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-40901"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: mpt3sas: Avoid test/set_bit() operating in non-allocated memory\n\nThere is a potential out-of-bounds access when using test_bit() on a single\nword. The test_bit() and set_bit() functions operate on long values, and\nwhen testing or setting a single word, they can exceed the word\nboundary. KASAN detects this issue and produces a dump:\n\n\t BUG: KASAN: slab-out-of-bounds in _scsih_add_device.constprop.0 (./arch/x86/include/asm/bitops.h:60 ./include/asm-generic/bitops/instrumented-atomic.h:29 drivers/scsi/mpt3sas/mpt3sas_scsih.c:7331) mpt3sas\n\n\t Write of size 8 at addr ffff8881d26e3c60 by task kworker/u1536:2/2965\n\nFor full log, please look at [1].\n\nMake the allocation at least the size of sizeof(unsigned long) so that\nset_bit() and test_bit() have sufficient room for read/write operations\nwithout overwriting unallocated memory.\n\n[1] Link: https://lore.kernel.org/all/ZkNcALr3W3KGYYJG@gmail.com/",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-40901",
"url": "https://www.suse.com/security/cve/CVE-2024-40901"
},
{
"category": "external",
"summary": "SUSE Bug 1227762 for CVE-2024-40901",
"url": "https://bugzilla.suse.com/1227762"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-16T09:14:50Z",
"details": "moderate"
}
],
"title": "CVE-2024-40901"
},
{
"cve": "CVE-2024-40904",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-40904"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nUSB: class: cdc-wdm: Fix CPU lockup caused by excessive log messages\n\nThe syzbot fuzzer found that the interrupt-URB completion callback in\nthe cdc-wdm driver was taking too long, and the driver\u0027s immediate\nresubmission of interrupt URBs with -EPROTO status combined with the\ndummy-hcd emulation to cause a CPU lockup:\n\ncdc_wdm 1-1:1.0: nonzero urb status received: -71\ncdc_wdm 1-1:1.0: wdm_int_callback - 0 bytes\nwatchdog: BUG: soft lockup - CPU#0 stuck for 26s! [syz-executor782:6625]\nCPU#0 Utilization every 4s during lockup:\n\t#1: 98% system,\t 0% softirq,\t 3% hardirq,\t 0% idle\n\t#2: 98% system,\t 0% softirq,\t 3% hardirq,\t 0% idle\n\t#3: 98% system,\t 0% softirq,\t 3% hardirq,\t 0% idle\n\t#4: 98% system,\t 0% softirq,\t 3% hardirq,\t 0% idle\n\t#5: 98% system,\t 1% softirq,\t 3% hardirq,\t 0% idle\nModules linked in:\nirq event stamp: 73096\nhardirqs last enabled at (73095): [\u003cffff80008037bc00\u003e] console_emit_next_record kernel/printk/printk.c:2935 [inline]\nhardirqs last enabled at (73095): [\u003cffff80008037bc00\u003e] console_flush_all+0x650/0xb74 kernel/printk/printk.c:2994\nhardirqs last disabled at (73096): [\u003cffff80008af10b00\u003e] __el1_irq arch/arm64/kernel/entry-common.c:533 [inline]\nhardirqs last disabled at (73096): [\u003cffff80008af10b00\u003e] el1_interrupt+0x24/0x68 arch/arm64/kernel/entry-common.c:551\nsoftirqs last enabled at (73048): [\u003cffff8000801ea530\u003e] softirq_handle_end kernel/softirq.c:400 [inline]\nsoftirqs last enabled at (73048): [\u003cffff8000801ea530\u003e] handle_softirqs+0xa60/0xc34 kernel/softirq.c:582\nsoftirqs last disabled at (73043): [\u003cffff800080020de8\u003e] __do_softirq+0x14/0x20 kernel/softirq.c:588\nCPU: 0 PID: 6625 Comm: syz-executor782 Tainted: G W 6.10.0-rc2-syzkaller-g8867bbd4a056 #0\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/02/2024\n\nTesting showed that the problem did not occur if the two error\nmessages -- the first two lines above -- were removed; apparently adding\nmaterial to the kernel log takes a surprisingly large amount of time.\n\nIn any case, the best approach for preventing these lockups and to\navoid spamming the log with thousands of error messages per second is\nto ratelimit the two dev_err() calls. Therefore we replace them with\ndev_err_ratelimited().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-40904",
"url": "https://www.suse.com/security/cve/CVE-2024-40904"
},
{
"category": "external",
"summary": "SUSE Bug 1227772 for CVE-2024-40904",
"url": "https://bugzilla.suse.com/1227772"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-16T09:14:50Z",
"details": "moderate"
}
],
"title": "CVE-2024-40904"
},
{
"cve": "CVE-2024-40912",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-40912"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: mac80211: Fix deadlock in ieee80211_sta_ps_deliver_wakeup()\n\nThe ieee80211_sta_ps_deliver_wakeup() function takes sta-\u003eps_lock to\nsynchronizes with ieee80211_tx_h_unicast_ps_buf() which is called from\nsoftirq context. However using only spin_lock() to get sta-\u003eps_lock in\nieee80211_sta_ps_deliver_wakeup() does not prevent softirq to execute\non this same CPU, to run ieee80211_tx_h_unicast_ps_buf() and try to\ntake this same lock ending in deadlock. Below is an example of rcu stall\nthat arises in such situation.\n\n rcu: INFO: rcu_sched self-detected stall on CPU\n rcu: 2-....: (42413413 ticks this GP) idle=b154/1/0x4000000000000000 softirq=1763/1765 fqs=21206996\n rcu: (t=42586894 jiffies g=2057 q=362405 ncpus=4)\n CPU: 2 PID: 719 Comm: wpa_supplicant Tainted: G W 6.4.0-02158-g1b062f552873 #742\n Hardware name: RPT (r1) (DT)\n pstate: 00000005 (nzcv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--)\n pc : queued_spin_lock_slowpath+0x58/0x2d0\n lr : invoke_tx_handlers_early+0x5b4/0x5c0\n sp : ffff00001ef64660\n x29: ffff00001ef64660 x28: ffff000009bc1070 x27: ffff000009bc0ad8\n x26: ffff000009bc0900 x25: ffff00001ef647a8 x24: 0000000000000000\n x23: ffff000009bc0900 x22: ffff000009bc0900 x21: ffff00000ac0e000\n x20: ffff00000a279e00 x19: ffff00001ef646e8 x18: 0000000000000000\n x17: ffff800016468000 x16: ffff00001ef608c0 x15: 0010533c93f64f80\n x14: 0010395c9faa3946 x13: 0000000000000000 x12: 00000000fa83b2da\n x11: 000000012edeceea x10: ffff0000010fbe00 x9 : 0000000000895440\n x8 : 000000000010533c x7 : ffff00000ad8b740 x6 : ffff00000c350880\n x5 : 0000000000000007 x4 : 0000000000000001 x3 : 0000000000000000\n x2 : 0000000000000000 x1 : 0000000000000001 x0 : ffff00000ac0e0e8\n Call trace:\n queued_spin_lock_slowpath+0x58/0x2d0\n ieee80211_tx+0x80/0x12c\n ieee80211_tx_pending+0x110/0x278\n tasklet_action_common.constprop.0+0x10c/0x144\n tasklet_action+0x20/0x28\n _stext+0x11c/0x284\n ____do_softirq+0xc/0x14\n call_on_irq_stack+0x24/0x34\n do_softirq_own_stack+0x18/0x20\n do_softirq+0x74/0x7c\n __local_bh_enable_ip+0xa0/0xa4\n _ieee80211_wake_txqs+0x3b0/0x4b8\n __ieee80211_wake_queue+0x12c/0x168\n ieee80211_add_pending_skbs+0xec/0x138\n ieee80211_sta_ps_deliver_wakeup+0x2a4/0x480\n ieee80211_mps_sta_status_update.part.0+0xd8/0x11c\n ieee80211_mps_sta_status_update+0x18/0x24\n sta_apply_parameters+0x3bc/0x4c0\n ieee80211_change_station+0x1b8/0x2dc\n nl80211_set_station+0x444/0x49c\n genl_family_rcv_msg_doit.isra.0+0xa4/0xfc\n genl_rcv_msg+0x1b0/0x244\n netlink_rcv_skb+0x38/0x10c\n genl_rcv+0x34/0x48\n netlink_unicast+0x254/0x2bc\n netlink_sendmsg+0x190/0x3b4\n ____sys_sendmsg+0x1e8/0x218\n ___sys_sendmsg+0x68/0x8c\n __sys_sendmsg+0x44/0x84\n __arm64_sys_sendmsg+0x20/0x28\n do_el0_svc+0x6c/0xe8\n el0_svc+0x14/0x48\n el0t_64_sync_handler+0xb0/0xb4\n el0t_64_sync+0x14c/0x150\n\nUsing spin_lock_bh()/spin_unlock_bh() instead prevents softirq to raise\non the same CPU that is holding the lock.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-40912",
"url": "https://www.suse.com/security/cve/CVE-2024-40912"
},
{
"category": "external",
"summary": "SUSE Bug 1227790 for CVE-2024-40912",
"url": "https://bugzilla.suse.com/1227790"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-16T09:14:50Z",
"details": "moderate"
}
],
"title": "CVE-2024-40912"
},
{
"cve": "CVE-2024-40923",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-40923"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nvmxnet3: disable rx data ring on dma allocation failure\n\nWhen vmxnet3_rq_create() fails to allocate memory for rq-\u003edata_ring.base,\nthe subsequent call to vmxnet3_rq_destroy_all_rxdataring does not reset\nrq-\u003edata_ring.desc_size for the data ring that failed, which presumably\ncauses the hypervisor to reference it on packet reception.\n\nTo fix this bug, rq-\u003edata_ring.desc_size needs to be set to 0 to tell\nthe hypervisor to disable this feature.\n\n[ 95.436876] kernel BUG at net/core/skbuff.c:207!\n[ 95.439074] invalid opcode: 0000 [#1] PREEMPT SMP NOPTI\n[ 95.440411] CPU: 7 PID: 0 Comm: swapper/7 Not tainted 6.9.3-dirty #1\n[ 95.441558] Hardware name: VMware, Inc. VMware Virtual\nPlatform/440BX Desktop Reference Platform, BIOS 6.00 12/12/2018\n[ 95.443481] RIP: 0010:skb_panic+0x4d/0x4f\n[ 95.444404] Code: 4f 70 50 8b 87 c0 00 00 00 50 8b 87 bc 00 00 00 50\nff b7 d0 00 00 00 4c 8b 8f c8 00 00 00 48 c7 c7 68 e8 be 9f e8 63 58 f9\nff \u003c0f\u003e 0b 48 8b 14 24 48 c7 c1 d0 73 65 9f e8 a1 ff ff ff 48 8b 14 24\n[ 95.447684] RSP: 0018:ffffa13340274dd0 EFLAGS: 00010246\n[ 95.448762] RAX: 0000000000000089 RBX: ffff8fbbc72b02d0 RCX: 000000000000083f\n[ 95.450148] RDX: 0000000000000000 RSI: 00000000000000f6 RDI: 000000000000083f\n[ 95.451520] RBP: 000000000000002d R08: 0000000000000000 R09: ffffa13340274c60\n[ 95.452886] R10: ffffffffa04ed468 R11: 0000000000000002 R12: 0000000000000000\n[ 95.454293] R13: ffff8fbbdab3c2d0 R14: ffff8fbbdbd829e0 R15: ffff8fbbdbd809e0\n[ 95.455682] FS: 0000000000000000(0000) GS:ffff8fbeefd80000(0000) knlGS:0000000000000000\n[ 95.457178] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n[ 95.458340] CR2: 00007fd0d1f650c8 CR3: 0000000115f28000 CR4: 00000000000406f0\n[ 95.459791] Call Trace:\n[ 95.460515] \u003cIRQ\u003e\n[ 95.461180] ? __die_body.cold+0x19/0x27\n[ 95.462150] ? die+0x2e/0x50\n[ 95.462976] ? do_trap+0xca/0x110\n[ 95.463973] ? do_error_trap+0x6a/0x90\n[ 95.464966] ? skb_panic+0x4d/0x4f\n[ 95.465901] ? exc_invalid_op+0x50/0x70\n[ 95.466849] ? skb_panic+0x4d/0x4f\n[ 95.467718] ? asm_exc_invalid_op+0x1a/0x20\n[ 95.468758] ? skb_panic+0x4d/0x4f\n[ 95.469655] skb_put.cold+0x10/0x10\n[ 95.470573] vmxnet3_rq_rx_complete+0x862/0x11e0 [vmxnet3]\n[ 95.471853] vmxnet3_poll_rx_only+0x36/0xb0 [vmxnet3]\n[ 95.473185] __napi_poll+0x2b/0x160\n[ 95.474145] net_rx_action+0x2c6/0x3b0\n[ 95.475115] handle_softirqs+0xe7/0x2a0\n[ 95.476122] __irq_exit_rcu+0x97/0xb0\n[ 95.477109] common_interrupt+0x85/0xa0\n[ 95.478102] \u003c/IRQ\u003e\n[ 95.478846] \u003cTASK\u003e\n[ 95.479603] asm_common_interrupt+0x26/0x40\n[ 95.480657] RIP: 0010:pv_native_safe_halt+0xf/0x20\n[ 95.481801] Code: 22 d7 e9 54 87 01 00 0f 1f 40 00 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 f3 0f 1e fa eb 07 0f 00 2d 93 ba 3b 00 fb f4 \u003ce9\u003e 2c 87 01 00 66 66 2e 0f 1f 84 00 00 00 00 00 90 90 90 90 90 90\n[ 95.485563] RSP: 0018:ffffa133400ffe58 EFLAGS: 00000246\n[ 95.486882] RAX: 0000000000004000 RBX: ffff8fbbc1d14064 RCX: 0000000000000000\n[ 95.488477] RDX: ffff8fbeefd80000 RSI: ffff8fbbc1d14000 RDI: 0000000000000001\n[ 95.490067] RBP: ffff8fbbc1d14064 R08: ffffffffa0652260 R09: 00000000000010d3\n[ 95.491683] R10: 0000000000000018 R11: ffff8fbeefdb4764 R12: ffffffffa0652260\n[ 95.493389] R13: ffffffffa06522e0 R14: 0000000000000001 R15: 0000000000000000\n[ 95.495035] acpi_safe_halt+0x14/0x20\n[ 95.496127] acpi_idle_do_entry+0x2f/0x50\n[ 95.497221] acpi_idle_enter+0x7f/0xd0\n[ 95.498272] cpuidle_enter_state+0x81/0x420\n[ 95.499375] cpuidle_enter+0x2d/0x40\n[ 95.500400] do_idle+0x1e5/0x240\n[ 95.501385] cpu_startup_entry+0x29/0x30\n[ 95.502422] start_secondary+0x11c/0x140\n[ 95.503454] common_startup_64+0x13e/0x141\n[ 95.504466] \u003c/TASK\u003e\n[ 95.505197] Modules linked in: nft_fib_inet nft_fib_ipv4\nnft_fib_ipv6 nft_fib nft_reject_inet nf_reject_ipv4 nf_reject_ipv6\nnft_reject nft_ct nft_chain_nat nf_nat nf_conntrack nf_defrag_ip\n---truncated---",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-40923",
"url": "https://www.suse.com/security/cve/CVE-2024-40923"
},
{
"category": "external",
"summary": "SUSE Bug 1227786 for CVE-2024-40923",
"url": "https://bugzilla.suse.com/1227786"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-16T09:14:50Z",
"details": "moderate"
}
],
"title": "CVE-2024-40923"
},
{
"cve": "CVE-2024-40929",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-40929"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: iwlwifi: mvm: check n_ssids before accessing the ssids\n\nIn some versions of cfg80211, the ssids poinet might be a valid one even\nthough n_ssids is 0. Accessing the pointer in this case will cuase an\nout-of-bound access. Fix this by checking n_ssids first.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-40929",
"url": "https://www.suse.com/security/cve/CVE-2024-40929"
},
{
"category": "external",
"summary": "SUSE Bug 1227774 for CVE-2024-40929",
"url": "https://bugzilla.suse.com/1227774"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-16T09:14:50Z",
"details": "moderate"
}
],
"title": "CVE-2024-40929"
},
{
"cve": "CVE-2024-40932",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-40932"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/exynos/vidi: fix memory leak in .get_modes()\n\nThe duplicated EDID is never freed. Fix it.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-40932",
"url": "https://www.suse.com/security/cve/CVE-2024-40932"
},
{
"category": "external",
"summary": "SUSE Bug 1227828 for CVE-2024-40932",
"url": "https://bugzilla.suse.com/1227828"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-16T09:14:50Z",
"details": "moderate"
}
],
"title": "CVE-2024-40932"
},
{
"cve": "CVE-2024-40937",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-40937"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ngve: Clear napi-\u003eskb before dev_kfree_skb_any()\n\ngve_rx_free_skb incorrectly leaves napi-\u003eskb referencing an skb after it\nis freed with dev_kfree_skb_any(). This can result in a subsequent call\nto napi_get_frags returning a dangling pointer.\n\nFix this by clearing napi-\u003eskb before the skb is freed.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-40937",
"url": "https://www.suse.com/security/cve/CVE-2024-40937"
},
{
"category": "external",
"summary": "SUSE Bug 1227836 for CVE-2024-40937",
"url": "https://bugzilla.suse.com/1227836"
},
{
"category": "external",
"summary": "SUSE Bug 1227903 for CVE-2024-40937",
"url": "https://bugzilla.suse.com/1227903"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-16T09:14:50Z",
"details": "important"
}
],
"title": "CVE-2024-40937"
},
{
"cve": "CVE-2024-40941",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-40941"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: iwlwifi: mvm: don\u0027t read past the mfuart notifcation\n\nIn case the firmware sends a notification that claims it has more data\nthan it has, we will read past that was allocated for the notification.\nRemove the print of the buffer, we won\u0027t see it by default. If needed,\nwe can see the content with tracing.\n\nThis was reported by KFENCE.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-40941",
"url": "https://www.suse.com/security/cve/CVE-2024-40941"
},
{
"category": "external",
"summary": "SUSE Bug 1227771 for CVE-2024-40941",
"url": "https://bugzilla.suse.com/1227771"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-16T09:14:50Z",
"details": "moderate"
}
],
"title": "CVE-2024-40941"
},
{
"cve": "CVE-2024-40942",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-40942"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: mac80211: mesh: Fix leak of mesh_preq_queue objects\n\nThe hwmp code use objects of type mesh_preq_queue, added to a list in\nieee80211_if_mesh, to keep track of mpath we need to resolve. If the mpath\ngets deleted, ex mesh interface is removed, the entries in that list will\nnever get cleaned. Fix this by flushing all corresponding items of the\npreq_queue in mesh_path_flush_pending().\n\nThis should take care of KASAN reports like this:\n\nunreferenced object 0xffff00000668d800 (size 128):\n comm \"kworker/u8:4\", pid 67, jiffies 4295419552 (age 1836.444s)\n hex dump (first 32 bytes):\n 00 1f 05 09 00 00 ff ff 00 d5 68 06 00 00 ff ff ..........h.....\n 8e 97 ea eb 3e b8 01 00 00 00 00 00 00 00 00 00 ....\u003e...........\n backtrace:\n [\u003c000000007302a0b6\u003e] __kmem_cache_alloc_node+0x1e0/0x35c\n [\u003c00000000049bd418\u003e] kmalloc_trace+0x34/0x80\n [\u003c0000000000d792bb\u003e] mesh_queue_preq+0x44/0x2a8\n [\u003c00000000c99c3696\u003e] mesh_nexthop_resolve+0x198/0x19c\n [\u003c00000000926bf598\u003e] ieee80211_xmit+0x1d0/0x1f4\n [\u003c00000000fc8c2284\u003e] __ieee80211_subif_start_xmit+0x30c/0x764\n [\u003c000000005926ee38\u003e] ieee80211_subif_start_xmit+0x9c/0x7a4\n [\u003c000000004c86e916\u003e] dev_hard_start_xmit+0x174/0x440\n [\u003c0000000023495647\u003e] __dev_queue_xmit+0xe24/0x111c\n [\u003c00000000cfe9ca78\u003e] batadv_send_skb_packet+0x180/0x1e4\n [\u003c000000007bacc5d5\u003e] batadv_v_elp_periodic_work+0x2f4/0x508\n [\u003c00000000adc3cd94\u003e] process_one_work+0x4b8/0xa1c\n [\u003c00000000b36425d1\u003e] worker_thread+0x9c/0x634\n [\u003c0000000005852dd5\u003e] kthread+0x1bc/0x1c4\n [\u003c000000005fccd770\u003e] ret_from_fork+0x10/0x20\nunreferenced object 0xffff000009051f00 (size 128):\n comm \"kworker/u8:4\", pid 67, jiffies 4295419553 (age 1836.440s)\n hex dump (first 32 bytes):\n 90 d6 92 0d 00 00 ff ff 00 d8 68 06 00 00 ff ff ..........h.....\n 36 27 92 e4 02 e0 01 00 00 58 79 06 00 00 ff ff 6\u0027.......Xy.....\n backtrace:\n [\u003c000000007302a0b6\u003e] __kmem_cache_alloc_node+0x1e0/0x35c\n [\u003c00000000049bd418\u003e] kmalloc_trace+0x34/0x80\n [\u003c0000000000d792bb\u003e] mesh_queue_preq+0x44/0x2a8\n [\u003c00000000c99c3696\u003e] mesh_nexthop_resolve+0x198/0x19c\n [\u003c00000000926bf598\u003e] ieee80211_xmit+0x1d0/0x1f4\n [\u003c00000000fc8c2284\u003e] __ieee80211_subif_start_xmit+0x30c/0x764\n [\u003c000000005926ee38\u003e] ieee80211_subif_start_xmit+0x9c/0x7a4\n [\u003c000000004c86e916\u003e] dev_hard_start_xmit+0x174/0x440\n [\u003c0000000023495647\u003e] __dev_queue_xmit+0xe24/0x111c\n [\u003c00000000cfe9ca78\u003e] batadv_send_skb_packet+0x180/0x1e4\n [\u003c000000007bacc5d5\u003e] batadv_v_elp_periodic_work+0x2f4/0x508\n [\u003c00000000adc3cd94\u003e] process_one_work+0x4b8/0xa1c\n [\u003c00000000b36425d1\u003e] worker_thread+0x9c/0x634\n [\u003c0000000005852dd5\u003e] kthread+0x1bc/0x1c4\n [\u003c000000005fccd770\u003e] ret_from_fork+0x10/0x20",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-40942",
"url": "https://www.suse.com/security/cve/CVE-2024-40942"
},
{
"category": "external",
"summary": "SUSE Bug 1227770 for CVE-2024-40942",
"url": "https://bugzilla.suse.com/1227770"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-16T09:14:50Z",
"details": "moderate"
}
],
"title": "CVE-2024-40942"
},
{
"cve": "CVE-2024-40943",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-40943"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nocfs2: fix races between hole punching and AIO+DIO\n\nAfter commit \"ocfs2: return real error code in ocfs2_dio_wr_get_block\",\nfstests/generic/300 become from always failed to sometimes failed:\n\n========================================================================\n[ 473.293420 ] run fstests generic/300\n\n[ 475.296983 ] JBD2: Ignoring recovery information on journal\n[ 475.302473 ] ocfs2: Mounting device (253,1) on (node local, slot 0) with ordered data mode.\n[ 494.290998 ] OCFS2: ERROR (device dm-1): ocfs2_change_extent_flag: Owner 5668 has an extent at cpos 78723 which can no longer be found\n[ 494.291609 ] On-disk corruption discovered. Please run fsck.ocfs2 once the filesystem is unmounted.\n[ 494.292018 ] OCFS2: File system is now read-only.\n[ 494.292224 ] (kworker/19:11,2628,19):ocfs2_mark_extent_written:5272 ERROR: status = -30\n[ 494.292602 ] (kworker/19:11,2628,19):ocfs2_dio_end_io_write:2374 ERROR: status = -3\nfio: io_u error on file /mnt/scratch/racer: Read-only file system: write offset=460849152, buflen=131072\n=========================================================================\n\nIn __blockdev_direct_IO, ocfs2_dio_wr_get_block is called to add unwritten\nextents to a list. extents are also inserted into extent tree in\nocfs2_write_begin_nolock. Then another thread call fallocate to puch a\nhole at one of the unwritten extent. The extent at cpos was removed by\nocfs2_remove_extent(). At end io worker thread, ocfs2_search_extent_list\nfound there is no such extent at the cpos.\n\n T1 T2 T3\n inode lock\n ...\n insert extents\n ...\n inode unlock\nocfs2_fallocate\n __ocfs2_change_file_space\n inode lock\n lock ip_alloc_sem\n ocfs2_remove_inode_range inode\n ocfs2_remove_btree_range\n ocfs2_remove_extent\n ^---remove the extent at cpos 78723\n ...\n unlock ip_alloc_sem\n inode unlock\n ocfs2_dio_end_io\n ocfs2_dio_end_io_write\n lock ip_alloc_sem\n ocfs2_mark_extent_written\n ocfs2_change_extent_flag\n ocfs2_search_extent_list\n ^---failed to find extent\n ...\n unlock ip_alloc_sem\n\nIn most filesystems, fallocate is not compatible with racing with AIO+DIO,\nso fix it by adding to wait for all dio before fallocate/punch_hole like\next4.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-40943",
"url": "https://www.suse.com/security/cve/CVE-2024-40943"
},
{
"category": "external",
"summary": "SUSE Bug 1227849 for CVE-2024-40943",
"url": "https://bugzilla.suse.com/1227849"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-16T09:14:50Z",
"details": "moderate"
}
],
"title": "CVE-2024-40943"
},
{
"cve": "CVE-2024-40953",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-40953"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nKVM: Fix a data race on last_boosted_vcpu in kvm_vcpu_on_spin()\n\nUse {READ,WRITE}_ONCE() to access kvm-\u003elast_boosted_vcpu to ensure the\nloads and stores are atomic. In the extremely unlikely scenario the\ncompiler tears the stores, it\u0027s theoretically possible for KVM to attempt\nto get a vCPU using an out-of-bounds index, e.g. if the write is split\ninto multiple 8-bit stores, and is paired with a 32-bit load on a VM with\n257 vCPUs:\n\n CPU0 CPU1\n last_boosted_vcpu = 0xff;\n\n (last_boosted_vcpu = 0x100)\n last_boosted_vcpu[15:8] = 0x01;\n i = (last_boosted_vcpu = 0x1ff)\n last_boosted_vcpu[7:0] = 0x00;\n\n vcpu = kvm-\u003evcpu_array[0x1ff];\n\nAs detected by KCSAN:\n\n BUG: KCSAN: data-race in kvm_vcpu_on_spin [kvm] / kvm_vcpu_on_spin [kvm]\n\n write to 0xffffc90025a92344 of 4 bytes by task 4340 on cpu 16:\n kvm_vcpu_on_spin (arch/x86/kvm/../../../virt/kvm/kvm_main.c:4112) kvm\n handle_pause (arch/x86/kvm/vmx/vmx.c:5929) kvm_intel\n vmx_handle_exit (arch/x86/kvm/vmx/vmx.c:?\n\t\t arch/x86/kvm/vmx/vmx.c:6606) kvm_intel\n vcpu_run (arch/x86/kvm/x86.c:11107 arch/x86/kvm/x86.c:11211) kvm\n kvm_arch_vcpu_ioctl_run (arch/x86/kvm/x86.c:?) kvm\n kvm_vcpu_ioctl (arch/x86/kvm/../../../virt/kvm/kvm_main.c:?) kvm\n __se_sys_ioctl (fs/ioctl.c:52 fs/ioctl.c:904 fs/ioctl.c:890)\n __x64_sys_ioctl (fs/ioctl.c:890)\n x64_sys_call (arch/x86/entry/syscall_64.c:33)\n do_syscall_64 (arch/x86/entry/common.c:?)\n entry_SYSCALL_64_after_hwframe (arch/x86/entry/entry_64.S:130)\n\n read to 0xffffc90025a92344 of 4 bytes by task 4342 on cpu 4:\n kvm_vcpu_on_spin (arch/x86/kvm/../../../virt/kvm/kvm_main.c:4069) kvm\n handle_pause (arch/x86/kvm/vmx/vmx.c:5929) kvm_intel\n vmx_handle_exit (arch/x86/kvm/vmx/vmx.c:?\n\t\t\tarch/x86/kvm/vmx/vmx.c:6606) kvm_intel\n vcpu_run (arch/x86/kvm/x86.c:11107 arch/x86/kvm/x86.c:11211) kvm\n kvm_arch_vcpu_ioctl_run (arch/x86/kvm/x86.c:?) kvm\n kvm_vcpu_ioctl (arch/x86/kvm/../../../virt/kvm/kvm_main.c:?) kvm\n __se_sys_ioctl (fs/ioctl.c:52 fs/ioctl.c:904 fs/ioctl.c:890)\n __x64_sys_ioctl (fs/ioctl.c:890)\n x64_sys_call (arch/x86/entry/syscall_64.c:33)\n do_syscall_64 (arch/x86/entry/common.c:?)\n entry_SYSCALL_64_after_hwframe (arch/x86/entry/entry_64.S:130)\n\n value changed: 0x00000012 -\u003e 0x00000000",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-40953",
"url": "https://www.suse.com/security/cve/CVE-2024-40953"
},
{
"category": "external",
"summary": "SUSE Bug 1227806 for CVE-2024-40953",
"url": "https://bugzilla.suse.com/1227806"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-16T09:14:50Z",
"details": "moderate"
}
],
"title": "CVE-2024-40953"
},
{
"cve": "CVE-2024-40959",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-40959"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nxfrm6: check ip6_dst_idev() return value in xfrm6_get_saddr()\n\nip6_dst_idev() can return NULL, xfrm6_get_saddr() must act accordingly.\n\nsyzbot reported:\n\nOops: general protection fault, probably for non-canonical address 0xdffffc0000000000: 0000 [#1] PREEMPT SMP KASAN PTI\nKASAN: null-ptr-deref in range [0x0000000000000000-0x0000000000000007]\nCPU: 1 PID: 12 Comm: kworker/u8:1 Not tainted 6.10.0-rc2-syzkaller-00383-gb8481381d4e2 #0\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/02/2024\nWorkqueue: wg-kex-wg1 wg_packet_handshake_send_worker\n RIP: 0010:xfrm6_get_saddr+0x93/0x130 net/ipv6/xfrm6_policy.c:64\nCode: df 48 89 fa 48 c1 ea 03 80 3c 02 00 0f 85 97 00 00 00 4c 8b ab d8 00 00 00 48 b8 00 00 00 00 00 fc ff df 4c 89 ea 48 c1 ea 03 \u003c80\u003e 3c 02 00 0f 85 86 00 00 00 4d 8b 6d 00 e8 ca 13 47 01 48 b8 00\nRSP: 0018:ffffc90000117378 EFLAGS: 00010246\nRAX: dffffc0000000000 RBX: ffff88807b079dc0 RCX: ffffffff89a0d6d7\nRDX: 0000000000000000 RSI: ffffffff89a0d6e9 RDI: ffff88807b079e98\nRBP: ffff88807ad73248 R08: 0000000000000007 R09: fffffffffffff000\nR10: ffff88807b079dc0 R11: 0000000000000007 R12: ffffc90000117480\nR13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000\nFS: 0000000000000000(0000) GS:ffff8880b9300000(0000) knlGS:0000000000000000\nCS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 00007f4586d00440 CR3: 0000000079042000 CR4: 00000000003506f0\nDR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\nDR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\nCall Trace:\n \u003cTASK\u003e\n xfrm_get_saddr net/xfrm/xfrm_policy.c:2452 [inline]\n xfrm_tmpl_resolve_one net/xfrm/xfrm_policy.c:2481 [inline]\n xfrm_tmpl_resolve+0xa26/0xf10 net/xfrm/xfrm_policy.c:2541\n xfrm_resolve_and_create_bundle+0x140/0x2570 net/xfrm/xfrm_policy.c:2835\n xfrm_bundle_lookup net/xfrm/xfrm_policy.c:3070 [inline]\n xfrm_lookup_with_ifid+0x4d1/0x1e60 net/xfrm/xfrm_policy.c:3201\n xfrm_lookup net/xfrm/xfrm_policy.c:3298 [inline]\n xfrm_lookup_route+0x3b/0x200 net/xfrm/xfrm_policy.c:3309\n ip6_dst_lookup_flow+0x15c/0x1d0 net/ipv6/ip6_output.c:1256\n send6+0x611/0xd20 drivers/net/wireguard/socket.c:139\n wg_socket_send_skb_to_peer+0xf9/0x220 drivers/net/wireguard/socket.c:178\n wg_socket_send_buffer_to_peer+0x12b/0x190 drivers/net/wireguard/socket.c:200\n wg_packet_send_handshake_initiation+0x227/0x360 drivers/net/wireguard/send.c:40\n wg_packet_handshake_send_worker+0x1c/0x30 drivers/net/wireguard/send.c:51\n process_one_work+0x9fb/0x1b60 kernel/workqueue.c:3231\n process_scheduled_works kernel/workqueue.c:3312 [inline]\n worker_thread+0x6c8/0xf70 kernel/workqueue.c:3393\n kthread+0x2c1/0x3a0 kernel/kthread.c:389\n ret_from_fork+0x45/0x80 arch/x86/kernel/process.c:147\n ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-40959",
"url": "https://www.suse.com/security/cve/CVE-2024-40959"
},
{
"category": "external",
"summary": "SUSE Bug 1227884 for CVE-2024-40959",
"url": "https://bugzilla.suse.com/1227884"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-16T09:14:50Z",
"details": "moderate"
}
],
"title": "CVE-2024-40959"
},
{
"cve": "CVE-2024-40966",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-40966"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntty: add the option to have a tty reject a new ldisc\n\n... and use it to limit the virtual terminals to just N_TTY. They are\nkind of special, and in particular, the \"con_write()\" routine violates\nthe \"writes cannot sleep\" rule that some ldiscs rely on.\n\nThis avoids the\n\n BUG: sleeping function called from invalid context at kernel/printk/printk.c:2659\n\nwhen N_GSM has been attached to a virtual console, and gsmld_write()\ncalls con_write() while holding a spinlock, and con_write() then tries\nto get the console lock.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-40966",
"url": "https://www.suse.com/security/cve/CVE-2024-40966"
},
{
"category": "external",
"summary": "SUSE Bug 1227886 for CVE-2024-40966",
"url": "https://bugzilla.suse.com/1227886"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-16T09:14:50Z",
"details": "moderate"
}
],
"title": "CVE-2024-40966"
},
{
"cve": "CVE-2024-40967",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-40967"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nserial: imx: Introduce timeout when waiting on transmitter empty\n\nBy waiting at most 1 second for USR2_TXDC to be set, we avoid a potential\ndeadlock.\n\nIn case of the timeout, there is not much we can do, so we simply ignore\nthe transmitter state and optimistically try to continue.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-40967",
"url": "https://www.suse.com/security/cve/CVE-2024-40967"
},
{
"category": "external",
"summary": "SUSE Bug 1227891 for CVE-2024-40967",
"url": "https://bugzilla.suse.com/1227891"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-16T09:14:50Z",
"details": "moderate"
}
],
"title": "CVE-2024-40967"
},
{
"cve": "CVE-2024-40978",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-40978"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: qedi: Fix crash while reading debugfs attribute\n\nThe qedi_dbg_do_not_recover_cmd_read() function invokes sprintf() directly\non a __user pointer, which results into the crash.\n\nTo fix this issue, use a small local stack buffer for sprintf() and then\ncall simple_read_from_buffer(), which in turns make the copy_to_user()\ncall.\n\nBUG: unable to handle page fault for address: 00007f4801111000\nPGD 8000000864df6067 P4D 8000000864df6067 PUD 864df7067 PMD 846028067 PTE 0\nOops: 0002 [#1] PREEMPT SMP PTI\nHardware name: HPE ProLiant DL380 Gen10/ProLiant DL380 Gen10, BIOS U30 06/15/2023\nRIP: 0010:memcpy_orig+0xcd/0x130\nRSP: 0018:ffffb7a18c3ffc40 EFLAGS: 00010202\nRAX: 00007f4801111000 RBX: 00007f4801111000 RCX: 000000000000000f\nRDX: 000000000000000f RSI: ffffffffc0bfd7a0 RDI: 00007f4801111000\nRBP: ffffffffc0bfd7a0 R08: 725f746f6e5f6f64 R09: 3d7265766f636572\nR10: ffffb7a18c3ffd08 R11: 0000000000000000 R12: 00007f4881110fff\nR13: 000000007fffffff R14: ffffb7a18c3ffca0 R15: ffffffffc0bfd7af\nFS: 00007f480118a740(0000) GS:ffff98e38af00000(0000) knlGS:0000000000000000\nCS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 00007f4801111000 CR3: 0000000864b8e001 CR4: 00000000007706e0\nDR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\nDR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\nPKRU: 55555554\nCall Trace:\n \u003cTASK\u003e\n ? __die_body+0x1a/0x60\n ? page_fault_oops+0x183/0x510\n ? exc_page_fault+0x69/0x150\n ? asm_exc_page_fault+0x22/0x30\n ? memcpy_orig+0xcd/0x130\n vsnprintf+0x102/0x4c0\n sprintf+0x51/0x80\n qedi_dbg_do_not_recover_cmd_read+0x2f/0x50 [qedi 6bcfdeeecdea037da47069eca2ba717c84a77324]\n full_proxy_read+0x50/0x80\n vfs_read+0xa5/0x2e0\n ? folio_add_new_anon_rmap+0x44/0xa0\n ? set_pte_at+0x15/0x30\n ? do_pte_missing+0x426/0x7f0\n ksys_read+0xa5/0xe0\n do_syscall_64+0x58/0x80\n ? __count_memcg_events+0x46/0x90\n ? count_memcg_event_mm+0x3d/0x60\n ? handle_mm_fault+0x196/0x2f0\n ? do_user_addr_fault+0x267/0x890\n ? exc_page_fault+0x69/0x150\n entry_SYSCALL_64_after_hwframe+0x72/0xdc\nRIP: 0033:0x7f4800f20b4d",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-40978",
"url": "https://www.suse.com/security/cve/CVE-2024-40978"
},
{
"category": "external",
"summary": "SUSE Bug 1227929 for CVE-2024-40978",
"url": "https://bugzilla.suse.com/1227929"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-16T09:14:50Z",
"details": "moderate"
}
],
"title": "CVE-2024-40978"
},
{
"cve": "CVE-2024-40982",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-40982"
}
],
"notes": [
{
"category": "general",
"text": "** REJECT ** This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-40982",
"url": "https://www.suse.com/security/cve/CVE-2024-40982"
},
{
"category": "external",
"summary": "SUSE Bug 1227865 for CVE-2024-40982",
"url": "https://bugzilla.suse.com/1227865"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-16T09:14:50Z",
"details": "moderate"
}
],
"title": "CVE-2024-40982"
},
{
"cve": "CVE-2024-40987",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-40987"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amdgpu: fix UBSAN warning in kv_dpm.c\n\nAdds bounds check for sumo_vid_mapping_entry.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-40987",
"url": "https://www.suse.com/security/cve/CVE-2024-40987"
},
{
"category": "external",
"summary": "SUSE Bug 1228235 for CVE-2024-40987",
"url": "https://bugzilla.suse.com/1228235"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-16T09:14:50Z",
"details": "moderate"
}
],
"title": "CVE-2024-40987"
},
{
"cve": "CVE-2024-40988",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-40988"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/radeon: fix UBSAN warning in kv_dpm.c\n\nAdds bounds check for sumo_vid_mapping_entry.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-40988",
"url": "https://www.suse.com/security/cve/CVE-2024-40988"
},
{
"category": "external",
"summary": "SUSE Bug 1227957 for CVE-2024-40988",
"url": "https://bugzilla.suse.com/1227957"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-16T09:14:50Z",
"details": "moderate"
}
],
"title": "CVE-2024-40988"
},
{
"cve": "CVE-2024-40990",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-40990"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nRDMA/mlx5: Add check for srq max_sge attribute\n\nmax_sge attribute is passed by the user, and is inserted and used\nunchecked, so verify that the value doesn\u0027t exceed maximum allowed value\nbefore using it.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-40990",
"url": "https://www.suse.com/security/cve/CVE-2024-40990"
},
{
"category": "external",
"summary": "SUSE Bug 1227824 for CVE-2024-40990",
"url": "https://bugzilla.suse.com/1227824"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-16T09:14:50Z",
"details": "moderate"
}
],
"title": "CVE-2024-40990"
},
{
"cve": "CVE-2024-40995",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-40995"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/sched: act_api: fix possible infinite loop in tcf_idr_check_alloc()\n\nsyzbot found hanging tasks waiting on rtnl_lock [1]\n\nA reproducer is available in the syzbot bug.\n\nWhen a request to add multiple actions with the same index is sent, the\nsecond request will block forever on the first request. This holds\nrtnl_lock, and causes tasks to hang.\n\nReturn -EAGAIN to prevent infinite looping, while keeping documented\nbehavior.\n\n[1]\n\nINFO: task kworker/1:0:5088 blocked for more than 143 seconds.\nNot tainted 6.9.0-rc4-syzkaller-00173-g3cdb45594619 #0\n\"echo 0 \u003e /proc/sys/kernel/hung_task_timeout_secs\" disables this message.\ntask:kworker/1:0 state:D stack:23744 pid:5088 tgid:5088 ppid:2 flags:0x00004000\nWorkqueue: events_power_efficient reg_check_chans_work\nCall Trace:\n\u003cTASK\u003e\ncontext_switch kernel/sched/core.c:5409 [inline]\n__schedule+0xf15/0x5d00 kernel/sched/core.c:6746\n__schedule_loop kernel/sched/core.c:6823 [inline]\nschedule+0xe7/0x350 kernel/sched/core.c:6838\nschedule_preempt_disabled+0x13/0x30 kernel/sched/core.c:6895\n__mutex_lock_common kernel/locking/mutex.c:684 [inline]\n__mutex_lock+0x5b8/0x9c0 kernel/locking/mutex.c:752\nwiphy_lock include/net/cfg80211.h:5953 [inline]\nreg_leave_invalid_chans net/wireless/reg.c:2466 [inline]\nreg_check_chans_work+0x10a/0x10e0 net/wireless/reg.c:2481",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-40995",
"url": "https://www.suse.com/security/cve/CVE-2024-40995"
},
{
"category": "external",
"summary": "SUSE Bug 1227830 for CVE-2024-40995",
"url": "https://bugzilla.suse.com/1227830"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-16T09:14:50Z",
"details": "moderate"
}
],
"title": "CVE-2024-40995"
},
{
"cve": "CVE-2024-40998",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-40998"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\next4: fix uninitialized ratelimit_state-\u003elock access in __ext4_fill_super()\n\nIn the following concurrency we will access the uninitialized rs-\u003elock:\n\next4_fill_super\n ext4_register_sysfs\n // sysfs registered msg_ratelimit_interval_ms\n // Other processes modify rs-\u003einterval to\n // non-zero via msg_ratelimit_interval_ms\n ext4_orphan_cleanup\n ext4_msg(sb, KERN_INFO, \"Errors on filesystem, \"\n __ext4_msg\n ___ratelimit(\u0026(EXT4_SB(sb)-\u003es_msg_ratelimit_state)\n if (!rs-\u003einterval) // do nothing if interval is 0\n return 1;\n raw_spin_trylock_irqsave(\u0026rs-\u003elock, flags)\n raw_spin_trylock(lock)\n _raw_spin_trylock\n __raw_spin_trylock\n spin_acquire(\u0026lock-\u003edep_map, 0, 1, _RET_IP_)\n lock_acquire\n __lock_acquire\n register_lock_class\n assign_lock_key\n dump_stack();\n ratelimit_state_init(\u0026sbi-\u003es_msg_ratelimit_state, 5 * HZ, 10);\n raw_spin_lock_init(\u0026rs-\u003elock);\n // init rs-\u003elock here\n\nand get the following dump_stack:\n\n=========================================================\nINFO: trying to register non-static key.\nThe code is fine but needs lockdep annotation, or maybe\nyou didn\u0027t initialize this object before use?\nturning off the locking correctness validator.\nCPU: 12 PID: 753 Comm: mount Tainted: G E 6.7.0-rc6-next-20231222 #504\n[...]\nCall Trace:\n dump_stack_lvl+0xc5/0x170\n dump_stack+0x18/0x30\n register_lock_class+0x740/0x7c0\n __lock_acquire+0x69/0x13a0\n lock_acquire+0x120/0x450\n _raw_spin_trylock+0x98/0xd0\n ___ratelimit+0xf6/0x220\n __ext4_msg+0x7f/0x160 [ext4]\n ext4_orphan_cleanup+0x665/0x740 [ext4]\n __ext4_fill_super+0x21ea/0x2b10 [ext4]\n ext4_fill_super+0x14d/0x360 [ext4]\n[...]\n=========================================================\n\nNormally interval is 0 until s_msg_ratelimit_state is initialized, so\n___ratelimit() does nothing. But registering sysfs precedes initializing\nrs-\u003elock, so it is possible to change rs-\u003einterval to a non-zero value\nvia the msg_ratelimit_interval_ms interface of sysfs while rs-\u003elock is\nuninitialized, and then a call to ext4_msg triggers the problem by\naccessing an uninitialized rs-\u003elock. Therefore register sysfs after all\ninitializations are complete to avoid such problems.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-40998",
"url": "https://www.suse.com/security/cve/CVE-2024-40998"
},
{
"category": "external",
"summary": "SUSE Bug 1227866 for CVE-2024-40998",
"url": "https://bugzilla.suse.com/1227866"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-16T09:14:50Z",
"details": "moderate"
}
],
"title": "CVE-2024-40998"
},
{
"cve": "CVE-2024-40999",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-40999"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: ena: Add validation for completion descriptors consistency\n\nValidate that `first` flag is set only for the first\ndescriptor in multi-buffer packets.\nIn case of an invalid descriptor, a reset will occur.\nA new reset reason for RX data corruption has been added.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-40999",
"url": "https://www.suse.com/security/cve/CVE-2024-40999"
},
{
"category": "external",
"summary": "SUSE Bug 1227913 for CVE-2024-40999",
"url": "https://bugzilla.suse.com/1227913"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.6,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-16T09:14:50Z",
"details": "low"
}
],
"title": "CVE-2024-40999"
},
{
"cve": "CVE-2024-41014",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-41014"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nxfs: add bounds checking to xlog_recover_process_data\n\nThere is a lack of verification of the space occupied by fixed members\nof xlog_op_header in the xlog_recover_process_data.\n\nWe can create a crafted image to trigger an out of bounds read by\nfollowing these steps:\n 1) Mount an image of xfs, and do some file operations to leave records\n 2) Before umounting, copy the image for subsequent steps to simulate\n abnormal exit. Because umount will ensure that tail_blk and\n head_blk are the same, which will result in the inability to enter\n xlog_recover_process_data\n 3) Write a tool to parse and modify the copied image in step 2\n 4) Make the end of the xlog_op_header entries only 1 byte away from\n xlog_rec_header-\u003eh_size\n 5) xlog_rec_header-\u003eh_num_logops++\n 6) Modify xlog_rec_header-\u003eh_crc\n\nFix:\nAdd a check to make sure there is sufficient space to access fixed members\nof xlog_op_header.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-41014",
"url": "https://www.suse.com/security/cve/CVE-2024-41014"
},
{
"category": "external",
"summary": "SUSE Bug 1228408 for CVE-2024-41014",
"url": "https://bugzilla.suse.com/1228408"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-16T09:14:50Z",
"details": "moderate"
}
],
"title": "CVE-2024-41014"
},
{
"cve": "CVE-2024-41015",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-41015"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nocfs2: add bounds checking to ocfs2_check_dir_entry()\n\nThis adds sanity checks for ocfs2_dir_entry to make sure all members of\nocfs2_dir_entry don\u0027t stray beyond valid memory region.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-41015",
"url": "https://www.suse.com/security/cve/CVE-2024-41015"
},
{
"category": "external",
"summary": "SUSE Bug 1228409 for CVE-2024-41015",
"url": "https://bugzilla.suse.com/1228409"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-16T09:14:50Z",
"details": "low"
}
],
"title": "CVE-2024-41015"
},
{
"cve": "CVE-2024-41016",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-41016"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nocfs2: strict bound check before memcmp in ocfs2_xattr_find_entry()\n\nxattr in ocfs2 maybe \u0027non-indexed\u0027, which saved with additional space\nrequested. It\u0027s better to check if the memory is out of bound before\nmemcmp, although this possibility mainly comes from crafted poisonous\nimages.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-41016",
"url": "https://www.suse.com/security/cve/CVE-2024-41016"
},
{
"category": "external",
"summary": "SUSE Bug 1228410 for CVE-2024-41016",
"url": "https://bugzilla.suse.com/1228410"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-16T09:14:50Z",
"details": "moderate"
}
],
"title": "CVE-2024-41016"
},
{
"cve": "CVE-2024-41044",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-41044"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nppp: reject claimed-as-LCP but actually malformed packets\n\nSince \u0027ppp_async_encode()\u0027 assumes valid LCP packets (with code\nfrom 1 to 7 inclusive), add \u0027ppp_check_packet()\u0027 to ensure that\nLCP packet has an actual body beyond PPP_LCP header bytes, and\nreject claimed-as-LCP but actually malformed data otherwise.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-41044",
"url": "https://www.suse.com/security/cve/CVE-2024-41044"
},
{
"category": "external",
"summary": "SUSE Bug 1228530 for CVE-2024-41044",
"url": "https://bugzilla.suse.com/1228530"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-16T09:14:50Z",
"details": "moderate"
}
],
"title": "CVE-2024-41044"
},
{
"cve": "CVE-2024-41048",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-41048"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nskmsg: Skip zero length skb in sk_msg_recvmsg\n\nWhen running BPF selftests (./test_progs -t sockmap_basic) on a Loongarch\nplatform, the following kernel panic occurs:\n\n [...]\n Oops[#1]:\n CPU: 22 PID: 2824 Comm: test_progs Tainted: G OE 6.10.0-rc2+ #18\n Hardware name: LOONGSON Dabieshan/Loongson-TC542F0, BIOS Loongson-UDK2018\n ... ...\n ra: 90000000048bf6c0 sk_msg_recvmsg+0x120/0x560\n ERA: 9000000004162774 copy_page_to_iter+0x74/0x1c0\n CRMD: 000000b0 (PLV0 -IE -DA +PG DACF=CC DACM=CC -WE)\n PRMD: 0000000c (PPLV0 +PIE +PWE)\n EUEN: 00000007 (+FPE +SXE +ASXE -BTE)\n ECFG: 00071c1d (LIE=0,2-4,10-12 VS=7)\n ESTAT: 00010000 [PIL] (IS= ECode=1 EsubCode=0)\n BADV: 0000000000000040\n PRID: 0014c011 (Loongson-64bit, Loongson-3C5000)\n Modules linked in: bpf_testmod(OE) xt_CHECKSUM xt_MASQUERADE xt_conntrack\n Process test_progs (pid: 2824, threadinfo=0000000000863a31, task=...)\n Stack : ...\n Call Trace:\n [\u003c9000000004162774\u003e] copy_page_to_iter+0x74/0x1c0\n [\u003c90000000048bf6c0\u003e] sk_msg_recvmsg+0x120/0x560\n [\u003c90000000049f2b90\u003e] tcp_bpf_recvmsg_parser+0x170/0x4e0\n [\u003c90000000049aae34\u003e] inet_recvmsg+0x54/0x100\n [\u003c900000000481ad5c\u003e] sock_recvmsg+0x7c/0xe0\n [\u003c900000000481e1a8\u003e] __sys_recvfrom+0x108/0x1c0\n [\u003c900000000481e27c\u003e] sys_recvfrom+0x1c/0x40\n [\u003c9000000004c076ec\u003e] do_syscall+0x8c/0xc0\n [\u003c9000000003731da4\u003e] handle_syscall+0xc4/0x160\n Code: ...\n ---[ end trace 0000000000000000 ]---\n Kernel panic - not syncing: Fatal exception\n Kernel relocated by 0x3510000\n .text @ 0x9000000003710000\n .data @ 0x9000000004d70000\n .bss @ 0x9000000006469400\n ---[ end Kernel panic - not syncing: Fatal exception ]---\n [...]\n\nThis crash happens every time when running sockmap_skb_verdict_shutdown\nsubtest in sockmap_basic.\n\nThis crash is because a NULL pointer is passed to page_address() in the\nsk_msg_recvmsg(). Due to the different implementations depending on the\narchitecture, page_address(NULL) will trigger a panic on Loongarch\nplatform but not on x86 platform. So this bug was hidden on x86 platform\nfor a while, but now it is exposed on Loongarch platform. The root cause\nis that a zero length skb (skb-\u003elen == 0) was put on the queue.\n\nThis zero length skb is a TCP FIN packet, which was sent by shutdown(),\ninvoked in test_sockmap_skb_verdict_shutdown():\n\n\tshutdown(p1, SHUT_WR);\n\nIn this case, in sk_psock_skb_ingress_enqueue(), num_sge is zero, and no\npage is put to this sge (see sg_set_page in sg_set_page), but this empty\nsge is queued into ingress_msg list.\n\nAnd in sk_msg_recvmsg(), this empty sge is used, and a NULL page is got by\nsg_page(sge). Pass this NULL page to copy_page_to_iter(), which passes it\nto kmap_local_page() and to page_address(), then kernel panics.\n\nTo solve this, we should skip this zero length skb. So in sk_msg_recvmsg(),\nif copy is zero, that means it\u0027s a zero length skb, skip invoking\ncopy_page_to_iter(). We are using the EFAULT return triggered by\ncopy_page_to_iter to check for is_fin in tcp_bpf.c.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-41048",
"url": "https://www.suse.com/security/cve/CVE-2024-41048"
},
{
"category": "external",
"summary": "SUSE Bug 1228565 for CVE-2024-41048",
"url": "https://bugzilla.suse.com/1228565"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-16T09:14:50Z",
"details": "moderate"
}
],
"title": "CVE-2024-41048"
},
{
"cve": "CVE-2024-41059",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-41059"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nhfsplus: fix uninit-value in copy_name\n\n[syzbot reported]\nBUG: KMSAN: uninit-value in sized_strscpy+0xc4/0x160\n sized_strscpy+0xc4/0x160\n copy_name+0x2af/0x320 fs/hfsplus/xattr.c:411\n hfsplus_listxattr+0x11e9/0x1a50 fs/hfsplus/xattr.c:750\n vfs_listxattr fs/xattr.c:493 [inline]\n listxattr+0x1f3/0x6b0 fs/xattr.c:840\n path_listxattr fs/xattr.c:864 [inline]\n __do_sys_listxattr fs/xattr.c:876 [inline]\n __se_sys_listxattr fs/xattr.c:873 [inline]\n __x64_sys_listxattr+0x16b/0x2f0 fs/xattr.c:873\n x64_sys_call+0x2ba0/0x3b50 arch/x86/include/generated/asm/syscalls_64.h:195\n do_syscall_x64 arch/x86/entry/common.c:52 [inline]\n do_syscall_64+0xcf/0x1e0 arch/x86/entry/common.c:83\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\n\nUninit was created at:\n slab_post_alloc_hook mm/slub.c:3877 [inline]\n slab_alloc_node mm/slub.c:3918 [inline]\n kmalloc_trace+0x57b/0xbe0 mm/slub.c:4065\n kmalloc include/linux/slab.h:628 [inline]\n hfsplus_listxattr+0x4cc/0x1a50 fs/hfsplus/xattr.c:699\n vfs_listxattr fs/xattr.c:493 [inline]\n listxattr+0x1f3/0x6b0 fs/xattr.c:840\n path_listxattr fs/xattr.c:864 [inline]\n __do_sys_listxattr fs/xattr.c:876 [inline]\n __se_sys_listxattr fs/xattr.c:873 [inline]\n __x64_sys_listxattr+0x16b/0x2f0 fs/xattr.c:873\n x64_sys_call+0x2ba0/0x3b50 arch/x86/include/generated/asm/syscalls_64.h:195\n do_syscall_x64 arch/x86/entry/common.c:52 [inline]\n do_syscall_64+0xcf/0x1e0 arch/x86/entry/common.c:83\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\n[Fix]\nWhen allocating memory to strbuf, initialize memory to 0.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-41059",
"url": "https://www.suse.com/security/cve/CVE-2024-41059"
},
{
"category": "external",
"summary": "SUSE Bug 1228561 for CVE-2024-41059",
"url": "https://bugzilla.suse.com/1228561"
},
{
"category": "external",
"summary": "SUSE Bug 1228573 for CVE-2024-41059",
"url": "https://bugzilla.suse.com/1228573"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-16T09:14:50Z",
"details": "important"
}
],
"title": "CVE-2024-41059"
},
{
"cve": "CVE-2024-41060",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-41060"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/radeon: check bo_va-\u003ebo is non-NULL before using it\n\nThe call to radeon_vm_clear_freed might clear bo_va-\u003ebo, so\nwe have to check it before dereferencing it.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-41060",
"url": "https://www.suse.com/security/cve/CVE-2024-41060"
},
{
"category": "external",
"summary": "SUSE Bug 1228567 for CVE-2024-41060",
"url": "https://bugzilla.suse.com/1228567"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-16T09:14:50Z",
"details": "moderate"
}
],
"title": "CVE-2024-41060"
},
{
"cve": "CVE-2024-41063",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-41063"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nBluetooth: hci_core: cancel all works upon hci_unregister_dev()\n\nsyzbot is reporting that calling hci_release_dev() from hci_error_reset()\ndue to hci_dev_put() from hci_error_reset() can cause deadlock at\ndestroy_workqueue(), for hci_error_reset() is called from\nhdev-\u003ereq_workqueue which destroy_workqueue() needs to flush.\n\nWe need to make sure that hdev-\u003e{rx_work,cmd_work,tx_work} which are\nqueued into hdev-\u003eworkqueue and hdev-\u003e{power_on,error_reset} which are\nqueued into hdev-\u003ereq_workqueue are no longer running by the moment\n\n destroy_workqueue(hdev-\u003eworkqueue);\n destroy_workqueue(hdev-\u003ereq_workqueue);\n\nare called from hci_release_dev().\n\nCall cancel_work_sync() on these work items from hci_unregister_dev()\nas soon as hdev-\u003elist is removed from hci_dev_list.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-41063",
"url": "https://www.suse.com/security/cve/CVE-2024-41063"
},
{
"category": "external",
"summary": "SUSE Bug 1228580 for CVE-2024-41063",
"url": "https://bugzilla.suse.com/1228580"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-16T09:14:50Z",
"details": "moderate"
}
],
"title": "CVE-2024-41063"
},
{
"cve": "CVE-2024-41064",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-41064"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\npowerpc/eeh: avoid possible crash when edev-\u003epdev changes\n\nIf a PCI device is removed during eeh_pe_report_edev(), edev-\u003epdev\nwill change and can cause a crash, hold the PCI rescan/remove lock\nwhile taking a copy of edev-\u003epdev-\u003ebus.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-41064",
"url": "https://www.suse.com/security/cve/CVE-2024-41064"
},
{
"category": "external",
"summary": "SUSE Bug 1228599 for CVE-2024-41064",
"url": "https://bugzilla.suse.com/1228599"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-16T09:14:50Z",
"details": "moderate"
}
],
"title": "CVE-2024-41064"
},
{
"cve": "CVE-2024-41066",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-41066"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nibmvnic: Add tx check to prevent skb leak\n\nBelow is a summary of how the driver stores a reference to an skb during\ntransmit:\n tx_buff[free_map[consumer_index]]-\u003eskb = new_skb;\n free_map[consumer_index] = IBMVNIC_INVALID_MAP;\n consumer_index ++;\nWhere variable data looks like this:\n free_map == [4, IBMVNIC_INVALID_MAP, IBMVNIC_INVALID_MAP, 0, 3]\n \tconsumer_index^\n tx_buff == [skb=null, skb=\u003cptr\u003e, skb=\u003cptr\u003e, skb=null, skb=null]\n\nThe driver has checks to ensure that free_map[consumer_index] pointed to\na valid index but there was no check to ensure that this index pointed\nto an unused/null skb address. So, if, by some chance, our free_map and\ntx_buff lists become out of sync then we were previously risking an\nskb memory leak. This could then cause tcp congestion control to stop\nsending packets, eventually leading to ETIMEDOUT.\n\nTherefore, add a conditional to ensure that the skb address is null. If\nnot then warn the user (because this is still a bug that should be\npatched) and free the old pointer to prevent memleak/tcp problems.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-41066",
"url": "https://www.suse.com/security/cve/CVE-2024-41066"
},
{
"category": "external",
"summary": "SUSE Bug 1228640 for CVE-2024-41066",
"url": "https://bugzilla.suse.com/1228640"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-16T09:14:50Z",
"details": "moderate"
}
],
"title": "CVE-2024-41066"
},
{
"cve": "CVE-2024-41070",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-41070"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nKVM: PPC: Book3S HV: Prevent UAF in kvm_spapr_tce_attach_iommu_group()\n\nAl reported a possible use-after-free (UAF) in kvm_spapr_tce_attach_iommu_group().\n\nIt looks up `stt` from tablefd, but then continues to use it after doing\nfdput() on the returned fd. After the fdput() the tablefd is free to be\nclosed by another thread. The close calls kvm_spapr_tce_release() and\nthen release_spapr_tce_table() (via call_rcu()) which frees `stt`.\n\nAlthough there are calls to rcu_read_lock() in\nkvm_spapr_tce_attach_iommu_group() they are not sufficient to prevent\nthe UAF, because `stt` is used outside the locked regions.\n\nWith an artifcial delay after the fdput() and a userspace program which\ntriggers the race, KASAN detects the UAF:\n\n BUG: KASAN: slab-use-after-free in kvm_spapr_tce_attach_iommu_group+0x298/0x720 [kvm]\n Read of size 4 at addr c000200027552c30 by task kvm-vfio/2505\n CPU: 54 PID: 2505 Comm: kvm-vfio Not tainted 6.10.0-rc3-next-20240612-dirty #1\n Hardware name: 8335-GTH POWER9 0x4e1202 opal:skiboot-v6.5.3-35-g1851b2a06 PowerNV\n Call Trace:\n dump_stack_lvl+0xb4/0x108 (unreliable)\n print_report+0x2b4/0x6ec\n kasan_report+0x118/0x2b0\n __asan_load4+0xb8/0xd0\n kvm_spapr_tce_attach_iommu_group+0x298/0x720 [kvm]\n kvm_vfio_set_attr+0x524/0xac0 [kvm]\n kvm_device_ioctl+0x144/0x240 [kvm]\n sys_ioctl+0x62c/0x1810\n system_call_exception+0x190/0x440\n system_call_vectored_common+0x15c/0x2ec\n ...\n Freed by task 0:\n ...\n kfree+0xec/0x3e0\n release_spapr_tce_table+0xd4/0x11c [kvm]\n rcu_core+0x568/0x16a0\n handle_softirqs+0x23c/0x920\n do_softirq_own_stack+0x6c/0x90\n do_softirq_own_stack+0x58/0x90\n __irq_exit_rcu+0x218/0x2d0\n irq_exit+0x30/0x80\n arch_local_irq_restore+0x128/0x230\n arch_local_irq_enable+0x1c/0x30\n cpuidle_enter_state+0x134/0x5cc\n cpuidle_enter+0x6c/0xb0\n call_cpuidle+0x7c/0x100\n do_idle+0x394/0x410\n cpu_startup_entry+0x60/0x70\n start_secondary+0x3fc/0x410\n start_secondary_prolog+0x10/0x14\n\nFix it by delaying the fdput() until `stt` is no longer in use, which\nis effectively the entire function. To keep the patch minimal add a call\nto fdput() at each of the existing return paths. Future work can convert\nthe function to goto or __cleanup style cleanup.\n\nWith the fix in place the test case no longer triggers the UAF.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-41070",
"url": "https://www.suse.com/security/cve/CVE-2024-41070"
},
{
"category": "external",
"summary": "SUSE Bug 1228581 for CVE-2024-41070",
"url": "https://bugzilla.suse.com/1228581"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-16T09:14:50Z",
"details": "moderate"
}
],
"title": "CVE-2024-41070"
},
{
"cve": "CVE-2024-41071",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-41071"
}
],
"notes": [
{
"category": "general",
"text": "** REJECT ** This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-41071",
"url": "https://www.suse.com/security/cve/CVE-2024-41071"
},
{
"category": "external",
"summary": "SUSE Bug 1228625 for CVE-2024-41071",
"url": "https://bugzilla.suse.com/1228625"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-16T09:14:50Z",
"details": "moderate"
}
],
"title": "CVE-2024-41071"
},
{
"cve": "CVE-2024-41072",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-41072"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: cfg80211: wext: add extra SIOCSIWSCAN data check\n\nIn \u0027cfg80211_wext_siwscan()\u0027, add extra check whether number of\nchannels passed via \u0027ioctl(sock, SIOCSIWSCAN, ...)\u0027 doesn\u0027t exceed\nIW_MAX_FREQUENCIES and reject invalid request with -EINVAL otherwise.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-41072",
"url": "https://www.suse.com/security/cve/CVE-2024-41072"
},
{
"category": "external",
"summary": "SUSE Bug 1228626 for CVE-2024-41072",
"url": "https://bugzilla.suse.com/1228626"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-16T09:14:50Z",
"details": "moderate"
}
],
"title": "CVE-2024-41072"
},
{
"cve": "CVE-2024-41078",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-41078"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbtrfs: qgroup: fix quota root leak after quota disable failure\n\nIf during the quota disable we fail when cleaning the quota tree or when\ndeleting the root from the root tree, we jump to the \u0027out\u0027 label without\never dropping the reference on the quota root, resulting in a leak of the\nroot since fs_info-\u003equota_root is no longer pointing to the root (we have\nset it to NULL just before those steps).\n\nFix this by always doing a btrfs_put_root() call under the \u0027out\u0027 label.\nThis is a problem that exists since qgroups were first added in 2012 by\ncommit bed92eae26cc (\"Btrfs: qgroup implementation and prototypes\"), but\nback then we missed a kfree on the quota root and free_extent_buffer()\ncalls on its root and commit root nodes, since back then roots were not\nyet reference counted.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-41078",
"url": "https://www.suse.com/security/cve/CVE-2024-41078"
},
{
"category": "external",
"summary": "SUSE Bug 1228655 for CVE-2024-41078",
"url": "https://bugzilla.suse.com/1228655"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-16T09:14:50Z",
"details": "low"
}
],
"title": "CVE-2024-41078"
},
{
"cve": "CVE-2024-41081",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-41081"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nila: block BH in ila_output()\n\nAs explained in commit 1378817486d6 (\"tipc: block BH\nbefore using dst_cache\"), net/core/dst_cache.c\nhelpers need to be called with BH disabled.\n\nila_output() is called from lwtunnel_output()\npossibly from process context, and under rcu_read_lock().\n\nWe might be interrupted by a softirq, re-enter ila_output()\nand corrupt dst_cache data structures.\n\nFix the race by using local_bh_disable().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-41081",
"url": "https://www.suse.com/security/cve/CVE-2024-41081"
},
{
"category": "external",
"summary": "SUSE Bug 1228617 for CVE-2024-41081",
"url": "https://bugzilla.suse.com/1228617"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-16T09:14:50Z",
"details": "moderate"
}
],
"title": "CVE-2024-41081"
},
{
"cve": "CVE-2024-41089",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-41089"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/nouveau/dispnv04: fix null pointer dereference in nv17_tv_get_hd_modes\n\nIn nv17_tv_get_hd_modes(), the return value of drm_mode_duplicate() is\nassigned to mode, which will lead to a possible NULL pointer dereference\non failure of drm_mode_duplicate(). The same applies to drm_cvt_mode().\nAdd a check to avoid null pointer dereference.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-41089",
"url": "https://www.suse.com/security/cve/CVE-2024-41089"
},
{
"category": "external",
"summary": "SUSE Bug 1228658 for CVE-2024-41089",
"url": "https://bugzilla.suse.com/1228658"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-16T09:14:50Z",
"details": "moderate"
}
],
"title": "CVE-2024-41089"
},
{
"cve": "CVE-2024-41090",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-41090"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntap: add missing verification for short frame\n\nThe cited commit missed to check against the validity of the frame length\nin the tap_get_user_xdp() path, which could cause a corrupted skb to be\nsent downstack. Even before the skb is transmitted, the\ntap_get_user_xdp()--\u003eskb_set_network_header() may assume the size is more\nthan ETH_HLEN. Once transmitted, this could either cause out-of-bound\naccess beyond the actual length, or confuse the underlayer with incorrect\nor inconsistent header length in the skb metadata.\n\nIn the alternative path, tap_get_user() already prohibits short frame which\nhas the length less than Ethernet header size from being transmitted.\n\nThis is to drop any frame shorter than the Ethernet header size just like\nhow tap_get_user() does.\n\nCVE: CVE-2024-41090",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-41090",
"url": "https://www.suse.com/security/cve/CVE-2024-41090"
},
{
"category": "external",
"summary": "SUSE Bug 1228328 for CVE-2024-41090",
"url": "https://bugzilla.suse.com/1228328"
},
{
"category": "external",
"summary": "SUSE Bug 1228714 for CVE-2024-41090",
"url": "https://bugzilla.suse.com/1228714"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-16T09:14:50Z",
"details": "important"
}
],
"title": "CVE-2024-41090"
},
{
"cve": "CVE-2024-41091",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-41091"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntun: add missing verification for short frame\n\nThe cited commit missed to check against the validity of the frame length\nin the tun_xdp_one() path, which could cause a corrupted skb to be sent\ndownstack. Even before the skb is transmitted, the\ntun_xdp_one--\u003eeth_type_trans() may access the Ethernet header although it\ncan be less than ETH_HLEN. Once transmitted, this could either cause\nout-of-bound access beyond the actual length, or confuse the underlayer\nwith incorrect or inconsistent header length in the skb metadata.\n\nIn the alternative path, tun_get_user() already prohibits short frame which\nhas the length less than Ethernet header size from being transmitted for\nIFF_TAP.\n\nThis is to drop any frame shorter than the Ethernet header size just like\nhow tun_get_user() does.\n\nCVE: CVE-2024-41091",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-41091",
"url": "https://www.suse.com/security/cve/CVE-2024-41091"
},
{
"category": "external",
"summary": "SUSE Bug 1228327 for CVE-2024-41091",
"url": "https://bugzilla.suse.com/1228327"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-16T09:14:50Z",
"details": "moderate"
}
],
"title": "CVE-2024-41091"
},
{
"cve": "CVE-2024-41095",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-41095"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/nouveau/dispnv04: fix null pointer dereference in nv17_tv_get_ld_modes\n\nIn nv17_tv_get_ld_modes(), the return value of drm_mode_duplicate() is\nassigned to mode, which will lead to a possible NULL pointer dereference\non failure of drm_mode_duplicate(). Add a check to avoid npd.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-41095",
"url": "https://www.suse.com/security/cve/CVE-2024-41095"
},
{
"category": "external",
"summary": "SUSE Bug 1228662 for CVE-2024-41095",
"url": "https://bugzilla.suse.com/1228662"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-16T09:14:50Z",
"details": "moderate"
}
],
"title": "CVE-2024-41095"
},
{
"cve": "CVE-2024-42070",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-42070"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnetfilter: nf_tables: fully validate NFT_DATA_VALUE on store to data registers\n\nregister store validation for NFT_DATA_VALUE is conditional, however,\nthe datatype is always either NFT_DATA_VALUE or NFT_DATA_VERDICT. This\nonly requires a new helper function to infer the register type from the\nset datatype so this conditional check can be removed. Otherwise,\npointer to chain object can be leaked through the registers.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-42070",
"url": "https://www.suse.com/security/cve/CVE-2024-42070"
},
{
"category": "external",
"summary": "SUSE Bug 1228470 for CVE-2024-42070",
"url": "https://bugzilla.suse.com/1228470"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-16T09:14:50Z",
"details": "low"
}
],
"title": "CVE-2024-42070"
},
{
"cve": "CVE-2024-42093",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-42093"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/dpaa2: Avoid explicit cpumask var allocation on stack\n\nFor CONFIG_CPUMASK_OFFSTACK=y kernel, explicit allocation of cpumask\nvariable on stack is not recommended since it can cause potential stack\noverflow.\n\nInstead, kernel code should always use *cpumask_var API(s) to allocate\ncpumask var in config-neutral way, leaving allocation strategy to\nCONFIG_CPUMASK_OFFSTACK.\n\nUse *cpumask_var API(s) to address it.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-42093",
"url": "https://www.suse.com/security/cve/CVE-2024-42093"
},
{
"category": "external",
"summary": "SUSE Bug 1228680 for CVE-2024-42093",
"url": "https://bugzilla.suse.com/1228680"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-16T09:14:50Z",
"details": "moderate"
}
],
"title": "CVE-2024-42093"
},
{
"cve": "CVE-2024-42096",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-42096"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nx86: stop playing stack games in profile_pc()\n\nThe \u0027profile_pc()\u0027 function is used for timer-based profiling, which\nisn\u0027t really all that relevant any more to begin with, but it also ends\nup making assumptions based on the stack layout that aren\u0027t necessarily\nvalid.\n\nBasically, the code tries to account the time spent in spinlocks to the\ncaller rather than the spinlock, and while I support that as a concept,\nit\u0027s not worth the code complexity or the KASAN warnings when no serious\nprofiling is done using timers anyway these days.\n\nAnd the code really does depend on stack layout that is only true in the\nsimplest of cases. We\u0027ve lost the comment at some point (I think when\nthe 32-bit and 64-bit code was unified), but it used to say:\n\n\tAssume the lock function has either no stack frame or a copy\n\tof eflags from PUSHF.\n\nwhich explains why it just blindly loads a word or two straight off the\nstack pointer and then takes a minimal look at the values to just check\nif they might be eflags or the return pc:\n\n\tEflags always has bits 22 and up cleared unlike kernel addresses\n\nbut that basic stack layout assumption assumes that there isn\u0027t any lock\ndebugging etc going on that would complicate the code and cause a stack\nframe.\n\nIt causes KASAN unhappiness reported for years by syzkaller [1] and\nothers [2].\n\nWith no real practical reason for this any more, just remove the code.\n\nJust for historical interest, here\u0027s some background commits relating to\nthis code from 2006:\n\n 0cb91a229364 (\"i386: Account spinlocks to the caller during profiling for !FP kernels\")\n 31679f38d886 (\"Simplify profile_pc on x86-64\")\n\nand a code unification from 2009:\n\n ef4512882dbe (\"x86: time_32/64.c unify profile_pc\")\n\nbut the basics of this thing actually goes back to before the git tree.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-42096",
"url": "https://www.suse.com/security/cve/CVE-2024-42096"
},
{
"category": "external",
"summary": "SUSE Bug 1228633 for CVE-2024-42096",
"url": "https://bugzilla.suse.com/1228633"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-16T09:14:50Z",
"details": "moderate"
}
],
"title": "CVE-2024-42096"
},
{
"cve": "CVE-2024-42119",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-42119"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amd/display: Skip finding free audio for unknown engine_id\n\n[WHY]\nENGINE_ID_UNKNOWN = -1 and can not be used as an array index. Plus, it\nalso means it is uninitialized and does not need free audio.\n\n[HOW]\nSkip and return NULL.\n\nThis fixes 2 OVERRUN issues reported by Coverity.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-42119",
"url": "https://www.suse.com/security/cve/CVE-2024-42119"
},
{
"category": "external",
"summary": "SUSE Bug 1228584 for CVE-2024-42119",
"url": "https://bugzilla.suse.com/1228584"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-16T09:14:50Z",
"details": "moderate"
}
],
"title": "CVE-2024-42119"
},
{
"cve": "CVE-2024-42120",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-42120"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amd/display: Check pipe offset before setting vblank\n\npipe_ctx has a size of MAX_PIPES so checking its index before accessing\nthe array.\n\nThis fixes an OVERRUN issue reported by Coverity.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-42120",
"url": "https://www.suse.com/security/cve/CVE-2024-42120"
},
{
"category": "external",
"summary": "SUSE Bug 1228588 for CVE-2024-42120",
"url": "https://bugzilla.suse.com/1228588"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-16T09:14:50Z",
"details": "moderate"
}
],
"title": "CVE-2024-42120"
},
{
"cve": "CVE-2024-42124",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-42124"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: qedf: Make qedf_execute_tmf() non-preemptible\n\nStop calling smp_processor_id() from preemptible code in\nqedf_execute_tmf90. This results in BUG_ON() when running an RT kernel.\n\n[ 659.343280] BUG: using smp_processor_id() in preemptible [00000000] code: sg_reset/3646\n[ 659.343282] caller is qedf_execute_tmf+0x8b/0x360 [qedf]",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-42124",
"url": "https://www.suse.com/security/cve/CVE-2024-42124"
},
{
"category": "external",
"summary": "SUSE Bug 1228705 for CVE-2024-42124",
"url": "https://bugzilla.suse.com/1228705"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-16T09:14:50Z",
"details": "moderate"
}
],
"title": "CVE-2024-42124"
},
{
"cve": "CVE-2024-42145",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-42145"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nIB/core: Implement a limit on UMAD receive List\n\nThe existing behavior of ib_umad, which maintains received MAD\npackets in an unbounded list, poses a risk of uncontrolled growth.\nAs user-space applications extract packets from this list, the rate\nof extraction may not match the rate of incoming packets, leading\nto potential list overflow.\n\nTo address this, we introduce a limit to the size of the list. After\nconsidering typical scenarios, such as OpenSM processing, which can\nhandle approximately 100k packets per second, and the 1-second retry\ntimeout for most packets, we set the list size limit to 200k. Packets\nreceived beyond this limit are dropped, assuming they are likely timed\nout by the time they are handled by user-space.\n\nNotably, packets queued on the receive list due to reasons like\ntimed-out sends are preserved even when the list is full.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-42145",
"url": "https://www.suse.com/security/cve/CVE-2024-42145"
},
{
"category": "external",
"summary": "SUSE Bug 1223384 for CVE-2024-42145",
"url": "https://bugzilla.suse.com/1223384"
},
{
"category": "external",
"summary": "SUSE Bug 1228743 for CVE-2024-42145",
"url": "https://bugzilla.suse.com/1228743"
},
{
"category": "external",
"summary": "SUSE Bug 1228744 for CVE-2024-42145",
"url": "https://bugzilla.suse.com/1228744"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-16T09:14:50Z",
"details": "important"
}
],
"title": "CVE-2024-42145"
},
{
"cve": "CVE-2024-42223",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-42223"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmedia: dvb-frontends: tda10048: Fix integer overflow\n\nstate-\u003extal_hz can be up to 16M, so it can overflow a 32 bit integer\nwhen multiplied by pll_mfactor.\n\nCreate a new 64 bit variable to hold the calculations.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-42223",
"url": "https://www.suse.com/security/cve/CVE-2024-42223"
},
{
"category": "external",
"summary": "SUSE Bug 1228726 for CVE-2024-42223",
"url": "https://bugzilla.suse.com/1228726"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-16T09:14:50Z",
"details": "moderate"
}
],
"title": "CVE-2024-42223"
},
{
"cve": "CVE-2024-42224",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-42224"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: dsa: mv88e6xxx: Correct check for empty list\n\nSince commit a3c53be55c95 (\"net: dsa: mv88e6xxx: Support multiple MDIO\nbusses\") mv88e6xxx_default_mdio_bus() has checked that the\nreturn value of list_first_entry() is non-NULL.\n\nThis appears to be intended to guard against the list chip-\u003emdios being\nempty. However, it is not the correct check as the implementation of\nlist_first_entry is not designed to return NULL for empty lists.\n\nInstead, use list_first_entry_or_null() which does return NULL if the\nlist is empty.\n\nFlagged by Smatch.\nCompile tested only.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-42224",
"url": "https://www.suse.com/security/cve/CVE-2024-42224"
},
{
"category": "external",
"summary": "SUSE Bug 1228723 for CVE-2024-42224",
"url": "https://bugzilla.suse.com/1228723"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_225-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.225.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.225.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.225.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.225.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-16T09:14:50Z",
"details": "moderate"
}
],
"title": "CVE-2024-42224"
}
]
}
suse-su-2022:3691-1
Vulnerability from csaf_suse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for bluez",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for bluez fixes the following issues:\n\n- CVE-2019-8921: Fixed heap-based buffer overflow via crafted request (bsc#1193237).\n- CVE-2019-8922: Fixed heap-based buffer overflow via crafted request (bsc#1193227).\n- CVE-2020-26558: Fixed vulnerability that may permit a nearby man-in-the-middle attacker to identify the Passkey (bsc#1186463).\n- CVE-2021-0129: Fixed improper access control (bsc#1186463).\n- CVE-2021-3658: Fixed adapter incorrectly restoring discoverable state after powered down (bsc#1188859).\n- CVE-2021-43400: Fixed use-after-free in gatt-database.c (bsc#1192394).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2022-3691,SUSE-SLE-Product-HPC-15-SP2-ESPOS-2022-3691,SUSE-SLE-Product-HPC-15-SP2-LTSS-2022-3691,SUSE-SLE-Product-SLES-15-SP2-BCL-2022-3691,SUSE-SLE-Product-SLES-15-SP2-LTSS-2022-3691,SUSE-SLE-Product-SLES_SAP-15-SP2-2022-3691,SUSE-SLE-Product-SUSE-Manager-Proxy-4.1-2022-3691,SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.1-2022-3691,SUSE-SLE-Product-SUSE-Manager-Server-4.1-2022-3691,SUSE-Storage-7-2022-3691",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2022_3691-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2022:3691-1",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20223691-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2022:3691-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-October/012602.html"
},
{
"category": "self",
"summary": "SUSE Bug 1186463",
"url": "https://bugzilla.suse.com/1186463"
},
{
"category": "self",
"summary": "SUSE Bug 1188859",
"url": "https://bugzilla.suse.com/1188859"
},
{
"category": "self",
"summary": "SUSE Bug 1192394",
"url": "https://bugzilla.suse.com/1192394"
},
{
"category": "self",
"summary": "SUSE Bug 1193227",
"url": "https://bugzilla.suse.com/1193227"
},
{
"category": "self",
"summary": "SUSE Bug 1193237",
"url": "https://bugzilla.suse.com/1193237"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-8921 page",
"url": "https://www.suse.com/security/cve/CVE-2019-8921/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-8922 page",
"url": "https://www.suse.com/security/cve/CVE-2019-8922/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-26558 page",
"url": "https://www.suse.com/security/cve/CVE-2020-26558/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-0129 page",
"url": "https://www.suse.com/security/cve/CVE-2021-0129/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3658 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3658/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-43400 page",
"url": "https://www.suse.com/security/cve/CVE-2021-43400/"
}
],
"title": "Security update for bluez",
"tracking": {
"current_release_date": "2022-10-21T13:10:36Z",
"generator": {
"date": "2022-10-21T13:10:36Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2022:3691-1",
"initial_release_date": "2022-10-21T13:10:36Z",
"revision_history": [
{
"date": "2022-10-21T13:10:36Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "bluez-5.48-150200.13.17.1.aarch64",
"product": {
"name": "bluez-5.48-150200.13.17.1.aarch64",
"product_id": "bluez-5.48-150200.13.17.1.aarch64"
}
},
{
"category": "product_version",
"name": "bluez-cups-5.48-150200.13.17.1.aarch64",
"product": {
"name": "bluez-cups-5.48-150200.13.17.1.aarch64",
"product_id": "bluez-cups-5.48-150200.13.17.1.aarch64"
}
},
{
"category": "product_version",
"name": "bluez-devel-5.48-150200.13.17.1.aarch64",
"product": {
"name": "bluez-devel-5.48-150200.13.17.1.aarch64",
"product_id": "bluez-devel-5.48-150200.13.17.1.aarch64"
}
},
{
"category": "product_version",
"name": "bluez-test-5.48-150200.13.17.1.aarch64",
"product": {
"name": "bluez-test-5.48-150200.13.17.1.aarch64",
"product_id": "bluez-test-5.48-150200.13.17.1.aarch64"
}
},
{
"category": "product_version",
"name": "libbluetooth3-5.48-150200.13.17.1.aarch64",
"product": {
"name": "libbluetooth3-5.48-150200.13.17.1.aarch64",
"product_id": "libbluetooth3-5.48-150200.13.17.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "bluez-devel-64bit-5.48-150200.13.17.1.aarch64_ilp32",
"product": {
"name": "bluez-devel-64bit-5.48-150200.13.17.1.aarch64_ilp32",
"product_id": "bluez-devel-64bit-5.48-150200.13.17.1.aarch64_ilp32"
}
},
{
"category": "product_version",
"name": "libbluetooth3-64bit-5.48-150200.13.17.1.aarch64_ilp32",
"product": {
"name": "libbluetooth3-64bit-5.48-150200.13.17.1.aarch64_ilp32",
"product_id": "libbluetooth3-64bit-5.48-150200.13.17.1.aarch64_ilp32"
}
}
],
"category": "architecture",
"name": "aarch64_ilp32"
},
{
"branches": [
{
"category": "product_version",
"name": "bluez-5.48-150200.13.17.1.i586",
"product": {
"name": "bluez-5.48-150200.13.17.1.i586",
"product_id": "bluez-5.48-150200.13.17.1.i586"
}
},
{
"category": "product_version",
"name": "bluez-cups-5.48-150200.13.17.1.i586",
"product": {
"name": "bluez-cups-5.48-150200.13.17.1.i586",
"product_id": "bluez-cups-5.48-150200.13.17.1.i586"
}
},
{
"category": "product_version",
"name": "bluez-devel-5.48-150200.13.17.1.i586",
"product": {
"name": "bluez-devel-5.48-150200.13.17.1.i586",
"product_id": "bluez-devel-5.48-150200.13.17.1.i586"
}
},
{
"category": "product_version",
"name": "bluez-test-5.48-150200.13.17.1.i586",
"product": {
"name": "bluez-test-5.48-150200.13.17.1.i586",
"product_id": "bluez-test-5.48-150200.13.17.1.i586"
}
},
{
"category": "product_version",
"name": "libbluetooth3-5.48-150200.13.17.1.i586",
"product": {
"name": "libbluetooth3-5.48-150200.13.17.1.i586",
"product_id": "libbluetooth3-5.48-150200.13.17.1.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "bluez-auto-enable-devices-5.48-150200.13.17.1.noarch",
"product": {
"name": "bluez-auto-enable-devices-5.48-150200.13.17.1.noarch",
"product_id": "bluez-auto-enable-devices-5.48-150200.13.17.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "bluez-5.48-150200.13.17.1.ppc64le",
"product": {
"name": "bluez-5.48-150200.13.17.1.ppc64le",
"product_id": "bluez-5.48-150200.13.17.1.ppc64le"
}
},
{
"category": "product_version",
"name": "bluez-cups-5.48-150200.13.17.1.ppc64le",
"product": {
"name": "bluez-cups-5.48-150200.13.17.1.ppc64le",
"product_id": "bluez-cups-5.48-150200.13.17.1.ppc64le"
}
},
{
"category": "product_version",
"name": "bluez-devel-5.48-150200.13.17.1.ppc64le",
"product": {
"name": "bluez-devel-5.48-150200.13.17.1.ppc64le",
"product_id": "bluez-devel-5.48-150200.13.17.1.ppc64le"
}
},
{
"category": "product_version",
"name": "bluez-test-5.48-150200.13.17.1.ppc64le",
"product": {
"name": "bluez-test-5.48-150200.13.17.1.ppc64le",
"product_id": "bluez-test-5.48-150200.13.17.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libbluetooth3-5.48-150200.13.17.1.ppc64le",
"product": {
"name": "libbluetooth3-5.48-150200.13.17.1.ppc64le",
"product_id": "libbluetooth3-5.48-150200.13.17.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "bluez-5.48-150200.13.17.1.s390x",
"product": {
"name": "bluez-5.48-150200.13.17.1.s390x",
"product_id": "bluez-5.48-150200.13.17.1.s390x"
}
},
{
"category": "product_version",
"name": "bluez-cups-5.48-150200.13.17.1.s390x",
"product": {
"name": "bluez-cups-5.48-150200.13.17.1.s390x",
"product_id": "bluez-cups-5.48-150200.13.17.1.s390x"
}
},
{
"category": "product_version",
"name": "bluez-devel-5.48-150200.13.17.1.s390x",
"product": {
"name": "bluez-devel-5.48-150200.13.17.1.s390x",
"product_id": "bluez-devel-5.48-150200.13.17.1.s390x"
}
},
{
"category": "product_version",
"name": "bluez-test-5.48-150200.13.17.1.s390x",
"product": {
"name": "bluez-test-5.48-150200.13.17.1.s390x",
"product_id": "bluez-test-5.48-150200.13.17.1.s390x"
}
},
{
"category": "product_version",
"name": "libbluetooth3-5.48-150200.13.17.1.s390x",
"product": {
"name": "libbluetooth3-5.48-150200.13.17.1.s390x",
"product_id": "libbluetooth3-5.48-150200.13.17.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "bluez-5.48-150200.13.17.1.x86_64",
"product": {
"name": "bluez-5.48-150200.13.17.1.x86_64",
"product_id": "bluez-5.48-150200.13.17.1.x86_64"
}
},
{
"category": "product_version",
"name": "bluez-cups-5.48-150200.13.17.1.x86_64",
"product": {
"name": "bluez-cups-5.48-150200.13.17.1.x86_64",
"product_id": "bluez-cups-5.48-150200.13.17.1.x86_64"
}
},
{
"category": "product_version",
"name": "bluez-devel-5.48-150200.13.17.1.x86_64",
"product": {
"name": "bluez-devel-5.48-150200.13.17.1.x86_64",
"product_id": "bluez-devel-5.48-150200.13.17.1.x86_64"
}
},
{
"category": "product_version",
"name": "bluez-devel-32bit-5.48-150200.13.17.1.x86_64",
"product": {
"name": "bluez-devel-32bit-5.48-150200.13.17.1.x86_64",
"product_id": "bluez-devel-32bit-5.48-150200.13.17.1.x86_64"
}
},
{
"category": "product_version",
"name": "bluez-test-5.48-150200.13.17.1.x86_64",
"product": {
"name": "bluez-test-5.48-150200.13.17.1.x86_64",
"product_id": "bluez-test-5.48-150200.13.17.1.x86_64"
}
},
{
"category": "product_version",
"name": "libbluetooth3-5.48-150200.13.17.1.x86_64",
"product": {
"name": "libbluetooth3-5.48-150200.13.17.1.x86_64",
"product_id": "libbluetooth3-5.48-150200.13.17.1.x86_64"
}
},
{
"category": "product_version",
"name": "libbluetooth3-32bit-5.48-150200.13.17.1.x86_64",
"product": {
"name": "libbluetooth3-32bit-5.48-150200.13.17.1.x86_64",
"product_id": "libbluetooth3-32bit-5.48-150200.13.17.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle_hpc-espos:15:sp2"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle_hpc-ltss:15:sp2"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 15 SP2-BCL",
"product": {
"name": "SUSE Linux Enterprise Server 15 SP2-BCL",
"product_id": "SUSE Linux Enterprise Server 15 SP2-BCL",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_bcl:15:sp2"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 15 SP2-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:15:sp2"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP2",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:15:sp2"
}
}
},
{
"category": "product_name",
"name": "SUSE Manager Proxy 4.1",
"product": {
"name": "SUSE Manager Proxy 4.1",
"product_id": "SUSE Manager Proxy 4.1",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse-manager-proxy:4.1"
}
}
},
{
"category": "product_name",
"name": "SUSE Manager Retail Branch Server 4.1",
"product": {
"name": "SUSE Manager Retail Branch Server 4.1",
"product_id": "SUSE Manager Retail Branch Server 4.1",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse-manager-retail-branch-server:4.1"
}
}
},
{
"category": "product_name",
"name": "SUSE Manager Server 4.1",
"product": {
"name": "SUSE Manager Server 4.1",
"product_id": "SUSE Manager Server 4.1",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse-manager-server:4.1"
}
}
},
{
"category": "product_name",
"name": "SUSE Enterprise Storage 7",
"product": {
"name": "SUSE Enterprise Storage 7",
"product_id": "SUSE Enterprise Storage 7",
"product_identification_helper": {
"cpe": "cpe:/o:suse:ses:7"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "bluez-5.48-150200.13.17.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:bluez-5.48-150200.13.17.1.aarch64"
},
"product_reference": "bluez-5.48-150200.13.17.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bluez-5.48-150200.13.17.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:bluez-5.48-150200.13.17.1.x86_64"
},
"product_reference": "bluez-5.48-150200.13.17.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bluez-devel-5.48-150200.13.17.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:bluez-devel-5.48-150200.13.17.1.aarch64"
},
"product_reference": "bluez-devel-5.48-150200.13.17.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bluez-devel-5.48-150200.13.17.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:bluez-devel-5.48-150200.13.17.1.x86_64"
},
"product_reference": "bluez-devel-5.48-150200.13.17.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libbluetooth3-5.48-150200.13.17.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libbluetooth3-5.48-150200.13.17.1.aarch64"
},
"product_reference": "libbluetooth3-5.48-150200.13.17.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libbluetooth3-5.48-150200.13.17.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libbluetooth3-5.48-150200.13.17.1.x86_64"
},
"product_reference": "libbluetooth3-5.48-150200.13.17.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bluez-5.48-150200.13.17.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bluez-5.48-150200.13.17.1.aarch64"
},
"product_reference": "bluez-5.48-150200.13.17.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bluez-5.48-150200.13.17.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bluez-5.48-150200.13.17.1.x86_64"
},
"product_reference": "bluez-5.48-150200.13.17.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bluez-devel-5.48-150200.13.17.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bluez-devel-5.48-150200.13.17.1.aarch64"
},
"product_reference": "bluez-devel-5.48-150200.13.17.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bluez-devel-5.48-150200.13.17.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bluez-devel-5.48-150200.13.17.1.x86_64"
},
"product_reference": "bluez-devel-5.48-150200.13.17.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libbluetooth3-5.48-150200.13.17.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libbluetooth3-5.48-150200.13.17.1.aarch64"
},
"product_reference": "libbluetooth3-5.48-150200.13.17.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libbluetooth3-5.48-150200.13.17.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libbluetooth3-5.48-150200.13.17.1.x86_64"
},
"product_reference": "libbluetooth3-5.48-150200.13.17.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bluez-5.48-150200.13.17.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-BCL",
"product_id": "SUSE Linux Enterprise Server 15 SP2-BCL:bluez-5.48-150200.13.17.1.x86_64"
},
"product_reference": "bluez-5.48-150200.13.17.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bluez-devel-5.48-150200.13.17.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-BCL",
"product_id": "SUSE Linux Enterprise Server 15 SP2-BCL:bluez-devel-5.48-150200.13.17.1.x86_64"
},
"product_reference": "bluez-devel-5.48-150200.13.17.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libbluetooth3-5.48-150200.13.17.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-BCL",
"product_id": "SUSE Linux Enterprise Server 15 SP2-BCL:libbluetooth3-5.48-150200.13.17.1.x86_64"
},
"product_reference": "libbluetooth3-5.48-150200.13.17.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bluez-5.48-150200.13.17.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:bluez-5.48-150200.13.17.1.aarch64"
},
"product_reference": "bluez-5.48-150200.13.17.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bluez-5.48-150200.13.17.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:bluez-5.48-150200.13.17.1.ppc64le"
},
"product_reference": "bluez-5.48-150200.13.17.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bluez-5.48-150200.13.17.1.s390x as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:bluez-5.48-150200.13.17.1.s390x"
},
"product_reference": "bluez-5.48-150200.13.17.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bluez-5.48-150200.13.17.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:bluez-5.48-150200.13.17.1.x86_64"
},
"product_reference": "bluez-5.48-150200.13.17.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bluez-devel-5.48-150200.13.17.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:bluez-devel-5.48-150200.13.17.1.aarch64"
},
"product_reference": "bluez-devel-5.48-150200.13.17.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bluez-devel-5.48-150200.13.17.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:bluez-devel-5.48-150200.13.17.1.ppc64le"
},
"product_reference": "bluez-devel-5.48-150200.13.17.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bluez-devel-5.48-150200.13.17.1.s390x as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:bluez-devel-5.48-150200.13.17.1.s390x"
},
"product_reference": "bluez-devel-5.48-150200.13.17.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bluez-devel-5.48-150200.13.17.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:bluez-devel-5.48-150200.13.17.1.x86_64"
},
"product_reference": "bluez-devel-5.48-150200.13.17.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libbluetooth3-5.48-150200.13.17.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:libbluetooth3-5.48-150200.13.17.1.aarch64"
},
"product_reference": "libbluetooth3-5.48-150200.13.17.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libbluetooth3-5.48-150200.13.17.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:libbluetooth3-5.48-150200.13.17.1.ppc64le"
},
"product_reference": "libbluetooth3-5.48-150200.13.17.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libbluetooth3-5.48-150200.13.17.1.s390x as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:libbluetooth3-5.48-150200.13.17.1.s390x"
},
"product_reference": "libbluetooth3-5.48-150200.13.17.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libbluetooth3-5.48-150200.13.17.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:libbluetooth3-5.48-150200.13.17.1.x86_64"
},
"product_reference": "libbluetooth3-5.48-150200.13.17.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bluez-5.48-150200.13.17.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:bluez-5.48-150200.13.17.1.ppc64le"
},
"product_reference": "bluez-5.48-150200.13.17.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bluez-5.48-150200.13.17.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:bluez-5.48-150200.13.17.1.x86_64"
},
"product_reference": "bluez-5.48-150200.13.17.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bluez-devel-5.48-150200.13.17.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:bluez-devel-5.48-150200.13.17.1.ppc64le"
},
"product_reference": "bluez-devel-5.48-150200.13.17.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bluez-devel-5.48-150200.13.17.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:bluez-devel-5.48-150200.13.17.1.x86_64"
},
"product_reference": "bluez-devel-5.48-150200.13.17.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libbluetooth3-5.48-150200.13.17.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libbluetooth3-5.48-150200.13.17.1.ppc64le"
},
"product_reference": "libbluetooth3-5.48-150200.13.17.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libbluetooth3-5.48-150200.13.17.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libbluetooth3-5.48-150200.13.17.1.x86_64"
},
"product_reference": "libbluetooth3-5.48-150200.13.17.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bluez-5.48-150200.13.17.1.x86_64 as component of SUSE Manager Proxy 4.1",
"product_id": "SUSE Manager Proxy 4.1:bluez-5.48-150200.13.17.1.x86_64"
},
"product_reference": "bluez-5.48-150200.13.17.1.x86_64",
"relates_to_product_reference": "SUSE Manager Proxy 4.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bluez-devel-5.48-150200.13.17.1.x86_64 as component of SUSE Manager Proxy 4.1",
"product_id": "SUSE Manager Proxy 4.1:bluez-devel-5.48-150200.13.17.1.x86_64"
},
"product_reference": "bluez-devel-5.48-150200.13.17.1.x86_64",
"relates_to_product_reference": "SUSE Manager Proxy 4.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libbluetooth3-5.48-150200.13.17.1.x86_64 as component of SUSE Manager Proxy 4.1",
"product_id": "SUSE Manager Proxy 4.1:libbluetooth3-5.48-150200.13.17.1.x86_64"
},
"product_reference": "libbluetooth3-5.48-150200.13.17.1.x86_64",
"relates_to_product_reference": "SUSE Manager Proxy 4.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bluez-5.48-150200.13.17.1.x86_64 as component of SUSE Manager Retail Branch Server 4.1",
"product_id": "SUSE Manager Retail Branch Server 4.1:bluez-5.48-150200.13.17.1.x86_64"
},
"product_reference": "bluez-5.48-150200.13.17.1.x86_64",
"relates_to_product_reference": "SUSE Manager Retail Branch Server 4.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bluez-devel-5.48-150200.13.17.1.x86_64 as component of SUSE Manager Retail Branch Server 4.1",
"product_id": "SUSE Manager Retail Branch Server 4.1:bluez-devel-5.48-150200.13.17.1.x86_64"
},
"product_reference": "bluez-devel-5.48-150200.13.17.1.x86_64",
"relates_to_product_reference": "SUSE Manager Retail Branch Server 4.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libbluetooth3-5.48-150200.13.17.1.x86_64 as component of SUSE Manager Retail Branch Server 4.1",
"product_id": "SUSE Manager Retail Branch Server 4.1:libbluetooth3-5.48-150200.13.17.1.x86_64"
},
"product_reference": "libbluetooth3-5.48-150200.13.17.1.x86_64",
"relates_to_product_reference": "SUSE Manager Retail Branch Server 4.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bluez-5.48-150200.13.17.1.ppc64le as component of SUSE Manager Server 4.1",
"product_id": "SUSE Manager Server 4.1:bluez-5.48-150200.13.17.1.ppc64le"
},
"product_reference": "bluez-5.48-150200.13.17.1.ppc64le",
"relates_to_product_reference": "SUSE Manager Server 4.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bluez-5.48-150200.13.17.1.s390x as component of SUSE Manager Server 4.1",
"product_id": "SUSE Manager Server 4.1:bluez-5.48-150200.13.17.1.s390x"
},
"product_reference": "bluez-5.48-150200.13.17.1.s390x",
"relates_to_product_reference": "SUSE Manager Server 4.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bluez-5.48-150200.13.17.1.x86_64 as component of SUSE Manager Server 4.1",
"product_id": "SUSE Manager Server 4.1:bluez-5.48-150200.13.17.1.x86_64"
},
"product_reference": "bluez-5.48-150200.13.17.1.x86_64",
"relates_to_product_reference": "SUSE Manager Server 4.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bluez-devel-5.48-150200.13.17.1.ppc64le as component of SUSE Manager Server 4.1",
"product_id": "SUSE Manager Server 4.1:bluez-devel-5.48-150200.13.17.1.ppc64le"
},
"product_reference": "bluez-devel-5.48-150200.13.17.1.ppc64le",
"relates_to_product_reference": "SUSE Manager Server 4.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bluez-devel-5.48-150200.13.17.1.s390x as component of SUSE Manager Server 4.1",
"product_id": "SUSE Manager Server 4.1:bluez-devel-5.48-150200.13.17.1.s390x"
},
"product_reference": "bluez-devel-5.48-150200.13.17.1.s390x",
"relates_to_product_reference": "SUSE Manager Server 4.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bluez-devel-5.48-150200.13.17.1.x86_64 as component of SUSE Manager Server 4.1",
"product_id": "SUSE Manager Server 4.1:bluez-devel-5.48-150200.13.17.1.x86_64"
},
"product_reference": "bluez-devel-5.48-150200.13.17.1.x86_64",
"relates_to_product_reference": "SUSE Manager Server 4.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libbluetooth3-5.48-150200.13.17.1.ppc64le as component of SUSE Manager Server 4.1",
"product_id": "SUSE Manager Server 4.1:libbluetooth3-5.48-150200.13.17.1.ppc64le"
},
"product_reference": "libbluetooth3-5.48-150200.13.17.1.ppc64le",
"relates_to_product_reference": "SUSE Manager Server 4.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libbluetooth3-5.48-150200.13.17.1.s390x as component of SUSE Manager Server 4.1",
"product_id": "SUSE Manager Server 4.1:libbluetooth3-5.48-150200.13.17.1.s390x"
},
"product_reference": "libbluetooth3-5.48-150200.13.17.1.s390x",
"relates_to_product_reference": "SUSE Manager Server 4.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libbluetooth3-5.48-150200.13.17.1.x86_64 as component of SUSE Manager Server 4.1",
"product_id": "SUSE Manager Server 4.1:libbluetooth3-5.48-150200.13.17.1.x86_64"
},
"product_reference": "libbluetooth3-5.48-150200.13.17.1.x86_64",
"relates_to_product_reference": "SUSE Manager Server 4.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bluez-5.48-150200.13.17.1.aarch64 as component of SUSE Enterprise Storage 7",
"product_id": "SUSE Enterprise Storage 7:bluez-5.48-150200.13.17.1.aarch64"
},
"product_reference": "bluez-5.48-150200.13.17.1.aarch64",
"relates_to_product_reference": "SUSE Enterprise Storage 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bluez-5.48-150200.13.17.1.x86_64 as component of SUSE Enterprise Storage 7",
"product_id": "SUSE Enterprise Storage 7:bluez-5.48-150200.13.17.1.x86_64"
},
"product_reference": "bluez-5.48-150200.13.17.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bluez-devel-5.48-150200.13.17.1.aarch64 as component of SUSE Enterprise Storage 7",
"product_id": "SUSE Enterprise Storage 7:bluez-devel-5.48-150200.13.17.1.aarch64"
},
"product_reference": "bluez-devel-5.48-150200.13.17.1.aarch64",
"relates_to_product_reference": "SUSE Enterprise Storage 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bluez-devel-5.48-150200.13.17.1.x86_64 as component of SUSE Enterprise Storage 7",
"product_id": "SUSE Enterprise Storage 7:bluez-devel-5.48-150200.13.17.1.x86_64"
},
"product_reference": "bluez-devel-5.48-150200.13.17.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libbluetooth3-5.48-150200.13.17.1.aarch64 as component of SUSE Enterprise Storage 7",
"product_id": "SUSE Enterprise Storage 7:libbluetooth3-5.48-150200.13.17.1.aarch64"
},
"product_reference": "libbluetooth3-5.48-150200.13.17.1.aarch64",
"relates_to_product_reference": "SUSE Enterprise Storage 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libbluetooth3-5.48-150200.13.17.1.x86_64 as component of SUSE Enterprise Storage 7",
"product_id": "SUSE Enterprise Storage 7:libbluetooth3-5.48-150200.13.17.1.x86_64"
},
"product_reference": "libbluetooth3-5.48-150200.13.17.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 7"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2019-8921",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-8921"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in bluetoothd in BlueZ through 5.48. The vulnerability lies in the handling of a SVC_ATTR_REQ by the SDP implementation. By crafting a malicious CSTATE, it is possible to trick the server into returning more bytes than the buffer actually holds, resulting in leaking arbitrary heap data. The root cause can be found in the function service_attr_req of sdpd-request.c. The server does not check whether the CSTATE data is the same in consecutive requests, and instead simply trusts that it is the same.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7:bluez-5.48-150200.13.17.1.aarch64",
"SUSE Enterprise Storage 7:bluez-5.48-150200.13.17.1.x86_64",
"SUSE Enterprise Storage 7:bluez-devel-5.48-150200.13.17.1.aarch64",
"SUSE Enterprise Storage 7:bluez-devel-5.48-150200.13.17.1.x86_64",
"SUSE Enterprise Storage 7:libbluetooth3-5.48-150200.13.17.1.aarch64",
"SUSE Enterprise Storage 7:libbluetooth3-5.48-150200.13.17.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:bluez-5.48-150200.13.17.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:bluez-5.48-150200.13.17.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:bluez-devel-5.48-150200.13.17.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:bluez-devel-5.48-150200.13.17.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libbluetooth3-5.48-150200.13.17.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libbluetooth3-5.48-150200.13.17.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bluez-5.48-150200.13.17.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bluez-5.48-150200.13.17.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bluez-devel-5.48-150200.13.17.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bluez-devel-5.48-150200.13.17.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libbluetooth3-5.48-150200.13.17.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libbluetooth3-5.48-150200.13.17.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:bluez-5.48-150200.13.17.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:bluez-devel-5.48-150200.13.17.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:libbluetooth3-5.48-150200.13.17.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bluez-5.48-150200.13.17.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bluez-5.48-150200.13.17.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bluez-5.48-150200.13.17.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bluez-5.48-150200.13.17.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bluez-devel-5.48-150200.13.17.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bluez-devel-5.48-150200.13.17.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bluez-devel-5.48-150200.13.17.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bluez-devel-5.48-150200.13.17.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libbluetooth3-5.48-150200.13.17.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libbluetooth3-5.48-150200.13.17.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libbluetooth3-5.48-150200.13.17.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libbluetooth3-5.48-150200.13.17.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bluez-5.48-150200.13.17.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bluez-5.48-150200.13.17.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bluez-devel-5.48-150200.13.17.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bluez-devel-5.48-150200.13.17.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libbluetooth3-5.48-150200.13.17.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libbluetooth3-5.48-150200.13.17.1.x86_64",
"SUSE Manager Proxy 4.1:bluez-5.48-150200.13.17.1.x86_64",
"SUSE Manager Proxy 4.1:bluez-devel-5.48-150200.13.17.1.x86_64",
"SUSE Manager Proxy 4.1:libbluetooth3-5.48-150200.13.17.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:bluez-5.48-150200.13.17.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:bluez-devel-5.48-150200.13.17.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:libbluetooth3-5.48-150200.13.17.1.x86_64",
"SUSE Manager Server 4.1:bluez-5.48-150200.13.17.1.ppc64le",
"SUSE Manager Server 4.1:bluez-5.48-150200.13.17.1.s390x",
"SUSE Manager Server 4.1:bluez-5.48-150200.13.17.1.x86_64",
"SUSE Manager Server 4.1:bluez-devel-5.48-150200.13.17.1.ppc64le",
"SUSE Manager Server 4.1:bluez-devel-5.48-150200.13.17.1.s390x",
"SUSE Manager Server 4.1:bluez-devel-5.48-150200.13.17.1.x86_64",
"SUSE Manager Server 4.1:libbluetooth3-5.48-150200.13.17.1.ppc64le",
"SUSE Manager Server 4.1:libbluetooth3-5.48-150200.13.17.1.s390x",
"SUSE Manager Server 4.1:libbluetooth3-5.48-150200.13.17.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-8921",
"url": "https://www.suse.com/security/cve/CVE-2019-8921"
},
{
"category": "external",
"summary": "SUSE Bug 1193237 for CVE-2019-8921",
"url": "https://bugzilla.suse.com/1193237"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7:bluez-5.48-150200.13.17.1.aarch64",
"SUSE Enterprise Storage 7:bluez-5.48-150200.13.17.1.x86_64",
"SUSE Enterprise Storage 7:bluez-devel-5.48-150200.13.17.1.aarch64",
"SUSE Enterprise Storage 7:bluez-devel-5.48-150200.13.17.1.x86_64",
"SUSE Enterprise Storage 7:libbluetooth3-5.48-150200.13.17.1.aarch64",
"SUSE Enterprise Storage 7:libbluetooth3-5.48-150200.13.17.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:bluez-5.48-150200.13.17.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:bluez-5.48-150200.13.17.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:bluez-devel-5.48-150200.13.17.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:bluez-devel-5.48-150200.13.17.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libbluetooth3-5.48-150200.13.17.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libbluetooth3-5.48-150200.13.17.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bluez-5.48-150200.13.17.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bluez-5.48-150200.13.17.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bluez-devel-5.48-150200.13.17.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bluez-devel-5.48-150200.13.17.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libbluetooth3-5.48-150200.13.17.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libbluetooth3-5.48-150200.13.17.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:bluez-5.48-150200.13.17.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:bluez-devel-5.48-150200.13.17.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:libbluetooth3-5.48-150200.13.17.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bluez-5.48-150200.13.17.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bluez-5.48-150200.13.17.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bluez-5.48-150200.13.17.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bluez-5.48-150200.13.17.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bluez-devel-5.48-150200.13.17.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bluez-devel-5.48-150200.13.17.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bluez-devel-5.48-150200.13.17.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bluez-devel-5.48-150200.13.17.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libbluetooth3-5.48-150200.13.17.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libbluetooth3-5.48-150200.13.17.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libbluetooth3-5.48-150200.13.17.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libbluetooth3-5.48-150200.13.17.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bluez-5.48-150200.13.17.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bluez-5.48-150200.13.17.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bluez-devel-5.48-150200.13.17.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bluez-devel-5.48-150200.13.17.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libbluetooth3-5.48-150200.13.17.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libbluetooth3-5.48-150200.13.17.1.x86_64",
"SUSE Manager Proxy 4.1:bluez-5.48-150200.13.17.1.x86_64",
"SUSE Manager Proxy 4.1:bluez-devel-5.48-150200.13.17.1.x86_64",
"SUSE Manager Proxy 4.1:libbluetooth3-5.48-150200.13.17.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:bluez-5.48-150200.13.17.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:bluez-devel-5.48-150200.13.17.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:libbluetooth3-5.48-150200.13.17.1.x86_64",
"SUSE Manager Server 4.1:bluez-5.48-150200.13.17.1.ppc64le",
"SUSE Manager Server 4.1:bluez-5.48-150200.13.17.1.s390x",
"SUSE Manager Server 4.1:bluez-5.48-150200.13.17.1.x86_64",
"SUSE Manager Server 4.1:bluez-devel-5.48-150200.13.17.1.ppc64le",
"SUSE Manager Server 4.1:bluez-devel-5.48-150200.13.17.1.s390x",
"SUSE Manager Server 4.1:bluez-devel-5.48-150200.13.17.1.x86_64",
"SUSE Manager Server 4.1:libbluetooth3-5.48-150200.13.17.1.ppc64le",
"SUSE Manager Server 4.1:libbluetooth3-5.48-150200.13.17.1.s390x",
"SUSE Manager Server 4.1:libbluetooth3-5.48-150200.13.17.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7:bluez-5.48-150200.13.17.1.aarch64",
"SUSE Enterprise Storage 7:bluez-5.48-150200.13.17.1.x86_64",
"SUSE Enterprise Storage 7:bluez-devel-5.48-150200.13.17.1.aarch64",
"SUSE Enterprise Storage 7:bluez-devel-5.48-150200.13.17.1.x86_64",
"SUSE Enterprise Storage 7:libbluetooth3-5.48-150200.13.17.1.aarch64",
"SUSE Enterprise Storage 7:libbluetooth3-5.48-150200.13.17.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:bluez-5.48-150200.13.17.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:bluez-5.48-150200.13.17.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:bluez-devel-5.48-150200.13.17.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:bluez-devel-5.48-150200.13.17.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libbluetooth3-5.48-150200.13.17.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libbluetooth3-5.48-150200.13.17.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bluez-5.48-150200.13.17.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bluez-5.48-150200.13.17.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bluez-devel-5.48-150200.13.17.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bluez-devel-5.48-150200.13.17.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libbluetooth3-5.48-150200.13.17.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libbluetooth3-5.48-150200.13.17.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:bluez-5.48-150200.13.17.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:bluez-devel-5.48-150200.13.17.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:libbluetooth3-5.48-150200.13.17.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bluez-5.48-150200.13.17.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bluez-5.48-150200.13.17.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bluez-5.48-150200.13.17.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bluez-5.48-150200.13.17.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bluez-devel-5.48-150200.13.17.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bluez-devel-5.48-150200.13.17.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bluez-devel-5.48-150200.13.17.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bluez-devel-5.48-150200.13.17.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libbluetooth3-5.48-150200.13.17.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libbluetooth3-5.48-150200.13.17.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libbluetooth3-5.48-150200.13.17.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libbluetooth3-5.48-150200.13.17.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bluez-5.48-150200.13.17.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bluez-5.48-150200.13.17.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bluez-devel-5.48-150200.13.17.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bluez-devel-5.48-150200.13.17.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libbluetooth3-5.48-150200.13.17.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libbluetooth3-5.48-150200.13.17.1.x86_64",
"SUSE Manager Proxy 4.1:bluez-5.48-150200.13.17.1.x86_64",
"SUSE Manager Proxy 4.1:bluez-devel-5.48-150200.13.17.1.x86_64",
"SUSE Manager Proxy 4.1:libbluetooth3-5.48-150200.13.17.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:bluez-5.48-150200.13.17.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:bluez-devel-5.48-150200.13.17.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:libbluetooth3-5.48-150200.13.17.1.x86_64",
"SUSE Manager Server 4.1:bluez-5.48-150200.13.17.1.ppc64le",
"SUSE Manager Server 4.1:bluez-5.48-150200.13.17.1.s390x",
"SUSE Manager Server 4.1:bluez-5.48-150200.13.17.1.x86_64",
"SUSE Manager Server 4.1:bluez-devel-5.48-150200.13.17.1.ppc64le",
"SUSE Manager Server 4.1:bluez-devel-5.48-150200.13.17.1.s390x",
"SUSE Manager Server 4.1:bluez-devel-5.48-150200.13.17.1.x86_64",
"SUSE Manager Server 4.1:libbluetooth3-5.48-150200.13.17.1.ppc64le",
"SUSE Manager Server 4.1:libbluetooth3-5.48-150200.13.17.1.s390x",
"SUSE Manager Server 4.1:libbluetooth3-5.48-150200.13.17.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-10-21T13:10:36Z",
"details": "important"
}
],
"title": "CVE-2019-8921"
},
{
"cve": "CVE-2019-8922",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-8922"
}
],
"notes": [
{
"category": "general",
"text": "A heap-based buffer overflow was discovered in bluetoothd in BlueZ through 5.48. There isn\u0027t any check on whether there is enough space in the destination buffer. The function simply appends all data passed to it. The values of all attributes that are requested are appended to the output buffer. There are no size checks whatsoever, resulting in a simple heap overflow if one can craft a request where the response is large enough to overflow the preallocated buffer. This issue exists in service_attr_req gets called by process_request (in sdpd-request.c), which also allocates the response buffer.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7:bluez-5.48-150200.13.17.1.aarch64",
"SUSE Enterprise Storage 7:bluez-5.48-150200.13.17.1.x86_64",
"SUSE Enterprise Storage 7:bluez-devel-5.48-150200.13.17.1.aarch64",
"SUSE Enterprise Storage 7:bluez-devel-5.48-150200.13.17.1.x86_64",
"SUSE Enterprise Storage 7:libbluetooth3-5.48-150200.13.17.1.aarch64",
"SUSE Enterprise Storage 7:libbluetooth3-5.48-150200.13.17.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:bluez-5.48-150200.13.17.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:bluez-5.48-150200.13.17.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:bluez-devel-5.48-150200.13.17.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:bluez-devel-5.48-150200.13.17.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libbluetooth3-5.48-150200.13.17.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libbluetooth3-5.48-150200.13.17.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bluez-5.48-150200.13.17.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bluez-5.48-150200.13.17.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bluez-devel-5.48-150200.13.17.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bluez-devel-5.48-150200.13.17.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libbluetooth3-5.48-150200.13.17.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libbluetooth3-5.48-150200.13.17.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:bluez-5.48-150200.13.17.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:bluez-devel-5.48-150200.13.17.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:libbluetooth3-5.48-150200.13.17.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bluez-5.48-150200.13.17.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bluez-5.48-150200.13.17.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bluez-5.48-150200.13.17.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bluez-5.48-150200.13.17.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bluez-devel-5.48-150200.13.17.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bluez-devel-5.48-150200.13.17.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bluez-devel-5.48-150200.13.17.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bluez-devel-5.48-150200.13.17.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libbluetooth3-5.48-150200.13.17.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libbluetooth3-5.48-150200.13.17.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libbluetooth3-5.48-150200.13.17.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libbluetooth3-5.48-150200.13.17.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bluez-5.48-150200.13.17.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bluez-5.48-150200.13.17.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bluez-devel-5.48-150200.13.17.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bluez-devel-5.48-150200.13.17.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libbluetooth3-5.48-150200.13.17.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libbluetooth3-5.48-150200.13.17.1.x86_64",
"SUSE Manager Proxy 4.1:bluez-5.48-150200.13.17.1.x86_64",
"SUSE Manager Proxy 4.1:bluez-devel-5.48-150200.13.17.1.x86_64",
"SUSE Manager Proxy 4.1:libbluetooth3-5.48-150200.13.17.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:bluez-5.48-150200.13.17.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:bluez-devel-5.48-150200.13.17.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:libbluetooth3-5.48-150200.13.17.1.x86_64",
"SUSE Manager Server 4.1:bluez-5.48-150200.13.17.1.ppc64le",
"SUSE Manager Server 4.1:bluez-5.48-150200.13.17.1.s390x",
"SUSE Manager Server 4.1:bluez-5.48-150200.13.17.1.x86_64",
"SUSE Manager Server 4.1:bluez-devel-5.48-150200.13.17.1.ppc64le",
"SUSE Manager Server 4.1:bluez-devel-5.48-150200.13.17.1.s390x",
"SUSE Manager Server 4.1:bluez-devel-5.48-150200.13.17.1.x86_64",
"SUSE Manager Server 4.1:libbluetooth3-5.48-150200.13.17.1.ppc64le",
"SUSE Manager Server 4.1:libbluetooth3-5.48-150200.13.17.1.s390x",
"SUSE Manager Server 4.1:libbluetooth3-5.48-150200.13.17.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-8922",
"url": "https://www.suse.com/security/cve/CVE-2019-8922"
},
{
"category": "external",
"summary": "SUSE Bug 1193227 for CVE-2019-8922",
"url": "https://bugzilla.suse.com/1193227"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7:bluez-5.48-150200.13.17.1.aarch64",
"SUSE Enterprise Storage 7:bluez-5.48-150200.13.17.1.x86_64",
"SUSE Enterprise Storage 7:bluez-devel-5.48-150200.13.17.1.aarch64",
"SUSE Enterprise Storage 7:bluez-devel-5.48-150200.13.17.1.x86_64",
"SUSE Enterprise Storage 7:libbluetooth3-5.48-150200.13.17.1.aarch64",
"SUSE Enterprise Storage 7:libbluetooth3-5.48-150200.13.17.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:bluez-5.48-150200.13.17.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:bluez-5.48-150200.13.17.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:bluez-devel-5.48-150200.13.17.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:bluez-devel-5.48-150200.13.17.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libbluetooth3-5.48-150200.13.17.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libbluetooth3-5.48-150200.13.17.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bluez-5.48-150200.13.17.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bluez-5.48-150200.13.17.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bluez-devel-5.48-150200.13.17.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bluez-devel-5.48-150200.13.17.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libbluetooth3-5.48-150200.13.17.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libbluetooth3-5.48-150200.13.17.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:bluez-5.48-150200.13.17.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:bluez-devel-5.48-150200.13.17.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:libbluetooth3-5.48-150200.13.17.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bluez-5.48-150200.13.17.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bluez-5.48-150200.13.17.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bluez-5.48-150200.13.17.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bluez-5.48-150200.13.17.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bluez-devel-5.48-150200.13.17.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bluez-devel-5.48-150200.13.17.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bluez-devel-5.48-150200.13.17.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bluez-devel-5.48-150200.13.17.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libbluetooth3-5.48-150200.13.17.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libbluetooth3-5.48-150200.13.17.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libbluetooth3-5.48-150200.13.17.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libbluetooth3-5.48-150200.13.17.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bluez-5.48-150200.13.17.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bluez-5.48-150200.13.17.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bluez-devel-5.48-150200.13.17.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bluez-devel-5.48-150200.13.17.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libbluetooth3-5.48-150200.13.17.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libbluetooth3-5.48-150200.13.17.1.x86_64",
"SUSE Manager Proxy 4.1:bluez-5.48-150200.13.17.1.x86_64",
"SUSE Manager Proxy 4.1:bluez-devel-5.48-150200.13.17.1.x86_64",
"SUSE Manager Proxy 4.1:libbluetooth3-5.48-150200.13.17.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:bluez-5.48-150200.13.17.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:bluez-devel-5.48-150200.13.17.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:libbluetooth3-5.48-150200.13.17.1.x86_64",
"SUSE Manager Server 4.1:bluez-5.48-150200.13.17.1.ppc64le",
"SUSE Manager Server 4.1:bluez-5.48-150200.13.17.1.s390x",
"SUSE Manager Server 4.1:bluez-5.48-150200.13.17.1.x86_64",
"SUSE Manager Server 4.1:bluez-devel-5.48-150200.13.17.1.ppc64le",
"SUSE Manager Server 4.1:bluez-devel-5.48-150200.13.17.1.s390x",
"SUSE Manager Server 4.1:bluez-devel-5.48-150200.13.17.1.x86_64",
"SUSE Manager Server 4.1:libbluetooth3-5.48-150200.13.17.1.ppc64le",
"SUSE Manager Server 4.1:libbluetooth3-5.48-150200.13.17.1.s390x",
"SUSE Manager Server 4.1:libbluetooth3-5.48-150200.13.17.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7:bluez-5.48-150200.13.17.1.aarch64",
"SUSE Enterprise Storage 7:bluez-5.48-150200.13.17.1.x86_64",
"SUSE Enterprise Storage 7:bluez-devel-5.48-150200.13.17.1.aarch64",
"SUSE Enterprise Storage 7:bluez-devel-5.48-150200.13.17.1.x86_64",
"SUSE Enterprise Storage 7:libbluetooth3-5.48-150200.13.17.1.aarch64",
"SUSE Enterprise Storage 7:libbluetooth3-5.48-150200.13.17.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:bluez-5.48-150200.13.17.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:bluez-5.48-150200.13.17.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:bluez-devel-5.48-150200.13.17.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:bluez-devel-5.48-150200.13.17.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libbluetooth3-5.48-150200.13.17.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libbluetooth3-5.48-150200.13.17.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bluez-5.48-150200.13.17.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bluez-5.48-150200.13.17.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bluez-devel-5.48-150200.13.17.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bluez-devel-5.48-150200.13.17.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libbluetooth3-5.48-150200.13.17.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libbluetooth3-5.48-150200.13.17.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:bluez-5.48-150200.13.17.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:bluez-devel-5.48-150200.13.17.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:libbluetooth3-5.48-150200.13.17.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bluez-5.48-150200.13.17.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bluez-5.48-150200.13.17.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bluez-5.48-150200.13.17.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bluez-5.48-150200.13.17.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bluez-devel-5.48-150200.13.17.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bluez-devel-5.48-150200.13.17.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bluez-devel-5.48-150200.13.17.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bluez-devel-5.48-150200.13.17.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libbluetooth3-5.48-150200.13.17.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libbluetooth3-5.48-150200.13.17.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libbluetooth3-5.48-150200.13.17.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libbluetooth3-5.48-150200.13.17.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bluez-5.48-150200.13.17.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bluez-5.48-150200.13.17.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bluez-devel-5.48-150200.13.17.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bluez-devel-5.48-150200.13.17.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libbluetooth3-5.48-150200.13.17.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libbluetooth3-5.48-150200.13.17.1.x86_64",
"SUSE Manager Proxy 4.1:bluez-5.48-150200.13.17.1.x86_64",
"SUSE Manager Proxy 4.1:bluez-devel-5.48-150200.13.17.1.x86_64",
"SUSE Manager Proxy 4.1:libbluetooth3-5.48-150200.13.17.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:bluez-5.48-150200.13.17.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:bluez-devel-5.48-150200.13.17.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:libbluetooth3-5.48-150200.13.17.1.x86_64",
"SUSE Manager Server 4.1:bluez-5.48-150200.13.17.1.ppc64le",
"SUSE Manager Server 4.1:bluez-5.48-150200.13.17.1.s390x",
"SUSE Manager Server 4.1:bluez-5.48-150200.13.17.1.x86_64",
"SUSE Manager Server 4.1:bluez-devel-5.48-150200.13.17.1.ppc64le",
"SUSE Manager Server 4.1:bluez-devel-5.48-150200.13.17.1.s390x",
"SUSE Manager Server 4.1:bluez-devel-5.48-150200.13.17.1.x86_64",
"SUSE Manager Server 4.1:libbluetooth3-5.48-150200.13.17.1.ppc64le",
"SUSE Manager Server 4.1:libbluetooth3-5.48-150200.13.17.1.s390x",
"SUSE Manager Server 4.1:libbluetooth3-5.48-150200.13.17.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-10-21T13:10:36Z",
"details": "important"
}
],
"title": "CVE-2019-8922"
},
{
"cve": "CVE-2020-26558",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-26558"
}
],
"notes": [
{
"category": "general",
"text": "Bluetooth LE and BR/EDR secure pairing in Bluetooth Core Specification 2.1 through 5.2 may permit a nearby man-in-the-middle attacker to identify the Passkey used during pairing (in the Passkey authentication procedure) by reflection of the public key and the authentication evidence of the initiating device, potentially permitting this attacker to complete authenticated pairing with the responding device using the correct Passkey for the pairing session. The attack methodology determines the Passkey value one bit at a time.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7:bluez-5.48-150200.13.17.1.aarch64",
"SUSE Enterprise Storage 7:bluez-5.48-150200.13.17.1.x86_64",
"SUSE Enterprise Storage 7:bluez-devel-5.48-150200.13.17.1.aarch64",
"SUSE Enterprise Storage 7:bluez-devel-5.48-150200.13.17.1.x86_64",
"SUSE Enterprise Storage 7:libbluetooth3-5.48-150200.13.17.1.aarch64",
"SUSE Enterprise Storage 7:libbluetooth3-5.48-150200.13.17.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:bluez-5.48-150200.13.17.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:bluez-5.48-150200.13.17.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:bluez-devel-5.48-150200.13.17.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:bluez-devel-5.48-150200.13.17.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libbluetooth3-5.48-150200.13.17.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libbluetooth3-5.48-150200.13.17.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bluez-5.48-150200.13.17.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bluez-5.48-150200.13.17.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bluez-devel-5.48-150200.13.17.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bluez-devel-5.48-150200.13.17.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libbluetooth3-5.48-150200.13.17.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libbluetooth3-5.48-150200.13.17.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:bluez-5.48-150200.13.17.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:bluez-devel-5.48-150200.13.17.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:libbluetooth3-5.48-150200.13.17.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bluez-5.48-150200.13.17.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bluez-5.48-150200.13.17.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bluez-5.48-150200.13.17.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bluez-5.48-150200.13.17.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bluez-devel-5.48-150200.13.17.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bluez-devel-5.48-150200.13.17.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bluez-devel-5.48-150200.13.17.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bluez-devel-5.48-150200.13.17.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libbluetooth3-5.48-150200.13.17.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libbluetooth3-5.48-150200.13.17.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libbluetooth3-5.48-150200.13.17.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libbluetooth3-5.48-150200.13.17.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bluez-5.48-150200.13.17.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bluez-5.48-150200.13.17.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bluez-devel-5.48-150200.13.17.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bluez-devel-5.48-150200.13.17.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libbluetooth3-5.48-150200.13.17.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libbluetooth3-5.48-150200.13.17.1.x86_64",
"SUSE Manager Proxy 4.1:bluez-5.48-150200.13.17.1.x86_64",
"SUSE Manager Proxy 4.1:bluez-devel-5.48-150200.13.17.1.x86_64",
"SUSE Manager Proxy 4.1:libbluetooth3-5.48-150200.13.17.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:bluez-5.48-150200.13.17.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:bluez-devel-5.48-150200.13.17.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:libbluetooth3-5.48-150200.13.17.1.x86_64",
"SUSE Manager Server 4.1:bluez-5.48-150200.13.17.1.ppc64le",
"SUSE Manager Server 4.1:bluez-5.48-150200.13.17.1.s390x",
"SUSE Manager Server 4.1:bluez-5.48-150200.13.17.1.x86_64",
"SUSE Manager Server 4.1:bluez-devel-5.48-150200.13.17.1.ppc64le",
"SUSE Manager Server 4.1:bluez-devel-5.48-150200.13.17.1.s390x",
"SUSE Manager Server 4.1:bluez-devel-5.48-150200.13.17.1.x86_64",
"SUSE Manager Server 4.1:libbluetooth3-5.48-150200.13.17.1.ppc64le",
"SUSE Manager Server 4.1:libbluetooth3-5.48-150200.13.17.1.s390x",
"SUSE Manager Server 4.1:libbluetooth3-5.48-150200.13.17.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-26558",
"url": "https://www.suse.com/security/cve/CVE-2020-26558"
},
{
"category": "external",
"summary": "SUSE Bug 1179610 for CVE-2020-26558",
"url": "https://bugzilla.suse.com/1179610"
},
{
"category": "external",
"summary": "SUSE Bug 1186463 for CVE-2020-26558",
"url": "https://bugzilla.suse.com/1186463"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7:bluez-5.48-150200.13.17.1.aarch64",
"SUSE Enterprise Storage 7:bluez-5.48-150200.13.17.1.x86_64",
"SUSE Enterprise Storage 7:bluez-devel-5.48-150200.13.17.1.aarch64",
"SUSE Enterprise Storage 7:bluez-devel-5.48-150200.13.17.1.x86_64",
"SUSE Enterprise Storage 7:libbluetooth3-5.48-150200.13.17.1.aarch64",
"SUSE Enterprise Storage 7:libbluetooth3-5.48-150200.13.17.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:bluez-5.48-150200.13.17.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:bluez-5.48-150200.13.17.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:bluez-devel-5.48-150200.13.17.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:bluez-devel-5.48-150200.13.17.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libbluetooth3-5.48-150200.13.17.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libbluetooth3-5.48-150200.13.17.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bluez-5.48-150200.13.17.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bluez-5.48-150200.13.17.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bluez-devel-5.48-150200.13.17.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bluez-devel-5.48-150200.13.17.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libbluetooth3-5.48-150200.13.17.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libbluetooth3-5.48-150200.13.17.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:bluez-5.48-150200.13.17.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:bluez-devel-5.48-150200.13.17.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:libbluetooth3-5.48-150200.13.17.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bluez-5.48-150200.13.17.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bluez-5.48-150200.13.17.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bluez-5.48-150200.13.17.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bluez-5.48-150200.13.17.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bluez-devel-5.48-150200.13.17.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bluez-devel-5.48-150200.13.17.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bluez-devel-5.48-150200.13.17.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bluez-devel-5.48-150200.13.17.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libbluetooth3-5.48-150200.13.17.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libbluetooth3-5.48-150200.13.17.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libbluetooth3-5.48-150200.13.17.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libbluetooth3-5.48-150200.13.17.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bluez-5.48-150200.13.17.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bluez-5.48-150200.13.17.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bluez-devel-5.48-150200.13.17.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bluez-devel-5.48-150200.13.17.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libbluetooth3-5.48-150200.13.17.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libbluetooth3-5.48-150200.13.17.1.x86_64",
"SUSE Manager Proxy 4.1:bluez-5.48-150200.13.17.1.x86_64",
"SUSE Manager Proxy 4.1:bluez-devel-5.48-150200.13.17.1.x86_64",
"SUSE Manager Proxy 4.1:libbluetooth3-5.48-150200.13.17.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:bluez-5.48-150200.13.17.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:bluez-devel-5.48-150200.13.17.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:libbluetooth3-5.48-150200.13.17.1.x86_64",
"SUSE Manager Server 4.1:bluez-5.48-150200.13.17.1.ppc64le",
"SUSE Manager Server 4.1:bluez-5.48-150200.13.17.1.s390x",
"SUSE Manager Server 4.1:bluez-5.48-150200.13.17.1.x86_64",
"SUSE Manager Server 4.1:bluez-devel-5.48-150200.13.17.1.ppc64le",
"SUSE Manager Server 4.1:bluez-devel-5.48-150200.13.17.1.s390x",
"SUSE Manager Server 4.1:bluez-devel-5.48-150200.13.17.1.x86_64",
"SUSE Manager Server 4.1:libbluetooth3-5.48-150200.13.17.1.ppc64le",
"SUSE Manager Server 4.1:libbluetooth3-5.48-150200.13.17.1.s390x",
"SUSE Manager Server 4.1:libbluetooth3-5.48-150200.13.17.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7:bluez-5.48-150200.13.17.1.aarch64",
"SUSE Enterprise Storage 7:bluez-5.48-150200.13.17.1.x86_64",
"SUSE Enterprise Storage 7:bluez-devel-5.48-150200.13.17.1.aarch64",
"SUSE Enterprise Storage 7:bluez-devel-5.48-150200.13.17.1.x86_64",
"SUSE Enterprise Storage 7:libbluetooth3-5.48-150200.13.17.1.aarch64",
"SUSE Enterprise Storage 7:libbluetooth3-5.48-150200.13.17.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:bluez-5.48-150200.13.17.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:bluez-5.48-150200.13.17.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:bluez-devel-5.48-150200.13.17.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:bluez-devel-5.48-150200.13.17.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libbluetooth3-5.48-150200.13.17.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libbluetooth3-5.48-150200.13.17.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bluez-5.48-150200.13.17.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bluez-5.48-150200.13.17.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bluez-devel-5.48-150200.13.17.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bluez-devel-5.48-150200.13.17.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libbluetooth3-5.48-150200.13.17.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libbluetooth3-5.48-150200.13.17.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:bluez-5.48-150200.13.17.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:bluez-devel-5.48-150200.13.17.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:libbluetooth3-5.48-150200.13.17.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bluez-5.48-150200.13.17.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bluez-5.48-150200.13.17.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bluez-5.48-150200.13.17.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bluez-5.48-150200.13.17.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bluez-devel-5.48-150200.13.17.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bluez-devel-5.48-150200.13.17.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bluez-devel-5.48-150200.13.17.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bluez-devel-5.48-150200.13.17.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libbluetooth3-5.48-150200.13.17.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libbluetooth3-5.48-150200.13.17.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libbluetooth3-5.48-150200.13.17.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libbluetooth3-5.48-150200.13.17.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bluez-5.48-150200.13.17.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bluez-5.48-150200.13.17.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bluez-devel-5.48-150200.13.17.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bluez-devel-5.48-150200.13.17.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libbluetooth3-5.48-150200.13.17.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libbluetooth3-5.48-150200.13.17.1.x86_64",
"SUSE Manager Proxy 4.1:bluez-5.48-150200.13.17.1.x86_64",
"SUSE Manager Proxy 4.1:bluez-devel-5.48-150200.13.17.1.x86_64",
"SUSE Manager Proxy 4.1:libbluetooth3-5.48-150200.13.17.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:bluez-5.48-150200.13.17.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:bluez-devel-5.48-150200.13.17.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:libbluetooth3-5.48-150200.13.17.1.x86_64",
"SUSE Manager Server 4.1:bluez-5.48-150200.13.17.1.ppc64le",
"SUSE Manager Server 4.1:bluez-5.48-150200.13.17.1.s390x",
"SUSE Manager Server 4.1:bluez-5.48-150200.13.17.1.x86_64",
"SUSE Manager Server 4.1:bluez-devel-5.48-150200.13.17.1.ppc64le",
"SUSE Manager Server 4.1:bluez-devel-5.48-150200.13.17.1.s390x",
"SUSE Manager Server 4.1:bluez-devel-5.48-150200.13.17.1.x86_64",
"SUSE Manager Server 4.1:libbluetooth3-5.48-150200.13.17.1.ppc64le",
"SUSE Manager Server 4.1:libbluetooth3-5.48-150200.13.17.1.s390x",
"SUSE Manager Server 4.1:libbluetooth3-5.48-150200.13.17.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-10-21T13:10:36Z",
"details": "moderate"
}
],
"title": "CVE-2020-26558"
},
{
"cve": "CVE-2021-0129",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-0129"
}
],
"notes": [
{
"category": "general",
"text": "Improper access control in BlueZ may allow an authenticated user to potentially enable information disclosure via adjacent access.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7:bluez-5.48-150200.13.17.1.aarch64",
"SUSE Enterprise Storage 7:bluez-5.48-150200.13.17.1.x86_64",
"SUSE Enterprise Storage 7:bluez-devel-5.48-150200.13.17.1.aarch64",
"SUSE Enterprise Storage 7:bluez-devel-5.48-150200.13.17.1.x86_64",
"SUSE Enterprise Storage 7:libbluetooth3-5.48-150200.13.17.1.aarch64",
"SUSE Enterprise Storage 7:libbluetooth3-5.48-150200.13.17.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:bluez-5.48-150200.13.17.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:bluez-5.48-150200.13.17.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:bluez-devel-5.48-150200.13.17.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:bluez-devel-5.48-150200.13.17.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libbluetooth3-5.48-150200.13.17.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libbluetooth3-5.48-150200.13.17.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bluez-5.48-150200.13.17.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bluez-5.48-150200.13.17.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bluez-devel-5.48-150200.13.17.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bluez-devel-5.48-150200.13.17.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libbluetooth3-5.48-150200.13.17.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libbluetooth3-5.48-150200.13.17.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:bluez-5.48-150200.13.17.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:bluez-devel-5.48-150200.13.17.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:libbluetooth3-5.48-150200.13.17.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bluez-5.48-150200.13.17.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bluez-5.48-150200.13.17.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bluez-5.48-150200.13.17.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bluez-5.48-150200.13.17.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bluez-devel-5.48-150200.13.17.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bluez-devel-5.48-150200.13.17.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bluez-devel-5.48-150200.13.17.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bluez-devel-5.48-150200.13.17.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libbluetooth3-5.48-150200.13.17.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libbluetooth3-5.48-150200.13.17.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libbluetooth3-5.48-150200.13.17.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libbluetooth3-5.48-150200.13.17.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bluez-5.48-150200.13.17.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bluez-5.48-150200.13.17.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bluez-devel-5.48-150200.13.17.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bluez-devel-5.48-150200.13.17.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libbluetooth3-5.48-150200.13.17.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libbluetooth3-5.48-150200.13.17.1.x86_64",
"SUSE Manager Proxy 4.1:bluez-5.48-150200.13.17.1.x86_64",
"SUSE Manager Proxy 4.1:bluez-devel-5.48-150200.13.17.1.x86_64",
"SUSE Manager Proxy 4.1:libbluetooth3-5.48-150200.13.17.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:bluez-5.48-150200.13.17.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:bluez-devel-5.48-150200.13.17.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:libbluetooth3-5.48-150200.13.17.1.x86_64",
"SUSE Manager Server 4.1:bluez-5.48-150200.13.17.1.ppc64le",
"SUSE Manager Server 4.1:bluez-5.48-150200.13.17.1.s390x",
"SUSE Manager Server 4.1:bluez-5.48-150200.13.17.1.x86_64",
"SUSE Manager Server 4.1:bluez-devel-5.48-150200.13.17.1.ppc64le",
"SUSE Manager Server 4.1:bluez-devel-5.48-150200.13.17.1.s390x",
"SUSE Manager Server 4.1:bluez-devel-5.48-150200.13.17.1.x86_64",
"SUSE Manager Server 4.1:libbluetooth3-5.48-150200.13.17.1.ppc64le",
"SUSE Manager Server 4.1:libbluetooth3-5.48-150200.13.17.1.s390x",
"SUSE Manager Server 4.1:libbluetooth3-5.48-150200.13.17.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-0129",
"url": "https://www.suse.com/security/cve/CVE-2021-0129"
},
{
"category": "external",
"summary": "SUSE Bug 1186463 for CVE-2021-0129",
"url": "https://bugzilla.suse.com/1186463"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7:bluez-5.48-150200.13.17.1.aarch64",
"SUSE Enterprise Storage 7:bluez-5.48-150200.13.17.1.x86_64",
"SUSE Enterprise Storage 7:bluez-devel-5.48-150200.13.17.1.aarch64",
"SUSE Enterprise Storage 7:bluez-devel-5.48-150200.13.17.1.x86_64",
"SUSE Enterprise Storage 7:libbluetooth3-5.48-150200.13.17.1.aarch64",
"SUSE Enterprise Storage 7:libbluetooth3-5.48-150200.13.17.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:bluez-5.48-150200.13.17.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:bluez-5.48-150200.13.17.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:bluez-devel-5.48-150200.13.17.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:bluez-devel-5.48-150200.13.17.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libbluetooth3-5.48-150200.13.17.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libbluetooth3-5.48-150200.13.17.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bluez-5.48-150200.13.17.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bluez-5.48-150200.13.17.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bluez-devel-5.48-150200.13.17.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bluez-devel-5.48-150200.13.17.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libbluetooth3-5.48-150200.13.17.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libbluetooth3-5.48-150200.13.17.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:bluez-5.48-150200.13.17.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:bluez-devel-5.48-150200.13.17.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:libbluetooth3-5.48-150200.13.17.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bluez-5.48-150200.13.17.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bluez-5.48-150200.13.17.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bluez-5.48-150200.13.17.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bluez-5.48-150200.13.17.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bluez-devel-5.48-150200.13.17.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bluez-devel-5.48-150200.13.17.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bluez-devel-5.48-150200.13.17.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bluez-devel-5.48-150200.13.17.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libbluetooth3-5.48-150200.13.17.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libbluetooth3-5.48-150200.13.17.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libbluetooth3-5.48-150200.13.17.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libbluetooth3-5.48-150200.13.17.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bluez-5.48-150200.13.17.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bluez-5.48-150200.13.17.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bluez-devel-5.48-150200.13.17.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bluez-devel-5.48-150200.13.17.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libbluetooth3-5.48-150200.13.17.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libbluetooth3-5.48-150200.13.17.1.x86_64",
"SUSE Manager Proxy 4.1:bluez-5.48-150200.13.17.1.x86_64",
"SUSE Manager Proxy 4.1:bluez-devel-5.48-150200.13.17.1.x86_64",
"SUSE Manager Proxy 4.1:libbluetooth3-5.48-150200.13.17.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:bluez-5.48-150200.13.17.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:bluez-devel-5.48-150200.13.17.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:libbluetooth3-5.48-150200.13.17.1.x86_64",
"SUSE Manager Server 4.1:bluez-5.48-150200.13.17.1.ppc64le",
"SUSE Manager Server 4.1:bluez-5.48-150200.13.17.1.s390x",
"SUSE Manager Server 4.1:bluez-5.48-150200.13.17.1.x86_64",
"SUSE Manager Server 4.1:bluez-devel-5.48-150200.13.17.1.ppc64le",
"SUSE Manager Server 4.1:bluez-devel-5.48-150200.13.17.1.s390x",
"SUSE Manager Server 4.1:bluez-devel-5.48-150200.13.17.1.x86_64",
"SUSE Manager Server 4.1:libbluetooth3-5.48-150200.13.17.1.ppc64le",
"SUSE Manager Server 4.1:libbluetooth3-5.48-150200.13.17.1.s390x",
"SUSE Manager Server 4.1:libbluetooth3-5.48-150200.13.17.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7:bluez-5.48-150200.13.17.1.aarch64",
"SUSE Enterprise Storage 7:bluez-5.48-150200.13.17.1.x86_64",
"SUSE Enterprise Storage 7:bluez-devel-5.48-150200.13.17.1.aarch64",
"SUSE Enterprise Storage 7:bluez-devel-5.48-150200.13.17.1.x86_64",
"SUSE Enterprise Storage 7:libbluetooth3-5.48-150200.13.17.1.aarch64",
"SUSE Enterprise Storage 7:libbluetooth3-5.48-150200.13.17.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:bluez-5.48-150200.13.17.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:bluez-5.48-150200.13.17.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:bluez-devel-5.48-150200.13.17.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:bluez-devel-5.48-150200.13.17.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libbluetooth3-5.48-150200.13.17.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libbluetooth3-5.48-150200.13.17.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bluez-5.48-150200.13.17.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bluez-5.48-150200.13.17.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bluez-devel-5.48-150200.13.17.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bluez-devel-5.48-150200.13.17.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libbluetooth3-5.48-150200.13.17.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libbluetooth3-5.48-150200.13.17.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:bluez-5.48-150200.13.17.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:bluez-devel-5.48-150200.13.17.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:libbluetooth3-5.48-150200.13.17.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bluez-5.48-150200.13.17.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bluez-5.48-150200.13.17.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bluez-5.48-150200.13.17.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bluez-5.48-150200.13.17.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bluez-devel-5.48-150200.13.17.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bluez-devel-5.48-150200.13.17.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bluez-devel-5.48-150200.13.17.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bluez-devel-5.48-150200.13.17.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libbluetooth3-5.48-150200.13.17.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libbluetooth3-5.48-150200.13.17.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libbluetooth3-5.48-150200.13.17.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libbluetooth3-5.48-150200.13.17.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bluez-5.48-150200.13.17.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bluez-5.48-150200.13.17.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bluez-devel-5.48-150200.13.17.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bluez-devel-5.48-150200.13.17.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libbluetooth3-5.48-150200.13.17.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libbluetooth3-5.48-150200.13.17.1.x86_64",
"SUSE Manager Proxy 4.1:bluez-5.48-150200.13.17.1.x86_64",
"SUSE Manager Proxy 4.1:bluez-devel-5.48-150200.13.17.1.x86_64",
"SUSE Manager Proxy 4.1:libbluetooth3-5.48-150200.13.17.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:bluez-5.48-150200.13.17.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:bluez-devel-5.48-150200.13.17.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:libbluetooth3-5.48-150200.13.17.1.x86_64",
"SUSE Manager Server 4.1:bluez-5.48-150200.13.17.1.ppc64le",
"SUSE Manager Server 4.1:bluez-5.48-150200.13.17.1.s390x",
"SUSE Manager Server 4.1:bluez-5.48-150200.13.17.1.x86_64",
"SUSE Manager Server 4.1:bluez-devel-5.48-150200.13.17.1.ppc64le",
"SUSE Manager Server 4.1:bluez-devel-5.48-150200.13.17.1.s390x",
"SUSE Manager Server 4.1:bluez-devel-5.48-150200.13.17.1.x86_64",
"SUSE Manager Server 4.1:libbluetooth3-5.48-150200.13.17.1.ppc64le",
"SUSE Manager Server 4.1:libbluetooth3-5.48-150200.13.17.1.s390x",
"SUSE Manager Server 4.1:libbluetooth3-5.48-150200.13.17.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-10-21T13:10:36Z",
"details": "moderate"
}
],
"title": "CVE-2021-0129"
},
{
"cve": "CVE-2021-3658",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3658"
}
],
"notes": [
{
"category": "general",
"text": "bluetoothd from bluez incorrectly saves adapters\u0027 Discoverable status when a device is powered down, and restores it when powered up. If a device is powered down while discoverable, it will be discoverable when powered on again. This could lead to inadvertent exposure of the bluetooth stack to physically nearby attackers.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7:bluez-5.48-150200.13.17.1.aarch64",
"SUSE Enterprise Storage 7:bluez-5.48-150200.13.17.1.x86_64",
"SUSE Enterprise Storage 7:bluez-devel-5.48-150200.13.17.1.aarch64",
"SUSE Enterprise Storage 7:bluez-devel-5.48-150200.13.17.1.x86_64",
"SUSE Enterprise Storage 7:libbluetooth3-5.48-150200.13.17.1.aarch64",
"SUSE Enterprise Storage 7:libbluetooth3-5.48-150200.13.17.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:bluez-5.48-150200.13.17.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:bluez-5.48-150200.13.17.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:bluez-devel-5.48-150200.13.17.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:bluez-devel-5.48-150200.13.17.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libbluetooth3-5.48-150200.13.17.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libbluetooth3-5.48-150200.13.17.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bluez-5.48-150200.13.17.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bluez-5.48-150200.13.17.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bluez-devel-5.48-150200.13.17.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bluez-devel-5.48-150200.13.17.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libbluetooth3-5.48-150200.13.17.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libbluetooth3-5.48-150200.13.17.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:bluez-5.48-150200.13.17.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:bluez-devel-5.48-150200.13.17.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:libbluetooth3-5.48-150200.13.17.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bluez-5.48-150200.13.17.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bluez-5.48-150200.13.17.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bluez-5.48-150200.13.17.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bluez-5.48-150200.13.17.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bluez-devel-5.48-150200.13.17.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bluez-devel-5.48-150200.13.17.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bluez-devel-5.48-150200.13.17.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bluez-devel-5.48-150200.13.17.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libbluetooth3-5.48-150200.13.17.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libbluetooth3-5.48-150200.13.17.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libbluetooth3-5.48-150200.13.17.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libbluetooth3-5.48-150200.13.17.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bluez-5.48-150200.13.17.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bluez-5.48-150200.13.17.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bluez-devel-5.48-150200.13.17.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bluez-devel-5.48-150200.13.17.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libbluetooth3-5.48-150200.13.17.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libbluetooth3-5.48-150200.13.17.1.x86_64",
"SUSE Manager Proxy 4.1:bluez-5.48-150200.13.17.1.x86_64",
"SUSE Manager Proxy 4.1:bluez-devel-5.48-150200.13.17.1.x86_64",
"SUSE Manager Proxy 4.1:libbluetooth3-5.48-150200.13.17.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:bluez-5.48-150200.13.17.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:bluez-devel-5.48-150200.13.17.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:libbluetooth3-5.48-150200.13.17.1.x86_64",
"SUSE Manager Server 4.1:bluez-5.48-150200.13.17.1.ppc64le",
"SUSE Manager Server 4.1:bluez-5.48-150200.13.17.1.s390x",
"SUSE Manager Server 4.1:bluez-5.48-150200.13.17.1.x86_64",
"SUSE Manager Server 4.1:bluez-devel-5.48-150200.13.17.1.ppc64le",
"SUSE Manager Server 4.1:bluez-devel-5.48-150200.13.17.1.s390x",
"SUSE Manager Server 4.1:bluez-devel-5.48-150200.13.17.1.x86_64",
"SUSE Manager Server 4.1:libbluetooth3-5.48-150200.13.17.1.ppc64le",
"SUSE Manager Server 4.1:libbluetooth3-5.48-150200.13.17.1.s390x",
"SUSE Manager Server 4.1:libbluetooth3-5.48-150200.13.17.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3658",
"url": "https://www.suse.com/security/cve/CVE-2021-3658"
},
{
"category": "external",
"summary": "SUSE Bug 1188859 for CVE-2021-3658",
"url": "https://bugzilla.suse.com/1188859"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7:bluez-5.48-150200.13.17.1.aarch64",
"SUSE Enterprise Storage 7:bluez-5.48-150200.13.17.1.x86_64",
"SUSE Enterprise Storage 7:bluez-devel-5.48-150200.13.17.1.aarch64",
"SUSE Enterprise Storage 7:bluez-devel-5.48-150200.13.17.1.x86_64",
"SUSE Enterprise Storage 7:libbluetooth3-5.48-150200.13.17.1.aarch64",
"SUSE Enterprise Storage 7:libbluetooth3-5.48-150200.13.17.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:bluez-5.48-150200.13.17.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:bluez-5.48-150200.13.17.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:bluez-devel-5.48-150200.13.17.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:bluez-devel-5.48-150200.13.17.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libbluetooth3-5.48-150200.13.17.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libbluetooth3-5.48-150200.13.17.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bluez-5.48-150200.13.17.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bluez-5.48-150200.13.17.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bluez-devel-5.48-150200.13.17.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bluez-devel-5.48-150200.13.17.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libbluetooth3-5.48-150200.13.17.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libbluetooth3-5.48-150200.13.17.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:bluez-5.48-150200.13.17.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:bluez-devel-5.48-150200.13.17.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:libbluetooth3-5.48-150200.13.17.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bluez-5.48-150200.13.17.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bluez-5.48-150200.13.17.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bluez-5.48-150200.13.17.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bluez-5.48-150200.13.17.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bluez-devel-5.48-150200.13.17.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bluez-devel-5.48-150200.13.17.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bluez-devel-5.48-150200.13.17.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bluez-devel-5.48-150200.13.17.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libbluetooth3-5.48-150200.13.17.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libbluetooth3-5.48-150200.13.17.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libbluetooth3-5.48-150200.13.17.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libbluetooth3-5.48-150200.13.17.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bluez-5.48-150200.13.17.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bluez-5.48-150200.13.17.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bluez-devel-5.48-150200.13.17.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bluez-devel-5.48-150200.13.17.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libbluetooth3-5.48-150200.13.17.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libbluetooth3-5.48-150200.13.17.1.x86_64",
"SUSE Manager Proxy 4.1:bluez-5.48-150200.13.17.1.x86_64",
"SUSE Manager Proxy 4.1:bluez-devel-5.48-150200.13.17.1.x86_64",
"SUSE Manager Proxy 4.1:libbluetooth3-5.48-150200.13.17.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:bluez-5.48-150200.13.17.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:bluez-devel-5.48-150200.13.17.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:libbluetooth3-5.48-150200.13.17.1.x86_64",
"SUSE Manager Server 4.1:bluez-5.48-150200.13.17.1.ppc64le",
"SUSE Manager Server 4.1:bluez-5.48-150200.13.17.1.s390x",
"SUSE Manager Server 4.1:bluez-5.48-150200.13.17.1.x86_64",
"SUSE Manager Server 4.1:bluez-devel-5.48-150200.13.17.1.ppc64le",
"SUSE Manager Server 4.1:bluez-devel-5.48-150200.13.17.1.s390x",
"SUSE Manager Server 4.1:bluez-devel-5.48-150200.13.17.1.x86_64",
"SUSE Manager Server 4.1:libbluetooth3-5.48-150200.13.17.1.ppc64le",
"SUSE Manager Server 4.1:libbluetooth3-5.48-150200.13.17.1.s390x",
"SUSE Manager Server 4.1:libbluetooth3-5.48-150200.13.17.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7:bluez-5.48-150200.13.17.1.aarch64",
"SUSE Enterprise Storage 7:bluez-5.48-150200.13.17.1.x86_64",
"SUSE Enterprise Storage 7:bluez-devel-5.48-150200.13.17.1.aarch64",
"SUSE Enterprise Storage 7:bluez-devel-5.48-150200.13.17.1.x86_64",
"SUSE Enterprise Storage 7:libbluetooth3-5.48-150200.13.17.1.aarch64",
"SUSE Enterprise Storage 7:libbluetooth3-5.48-150200.13.17.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:bluez-5.48-150200.13.17.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:bluez-5.48-150200.13.17.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:bluez-devel-5.48-150200.13.17.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:bluez-devel-5.48-150200.13.17.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libbluetooth3-5.48-150200.13.17.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libbluetooth3-5.48-150200.13.17.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bluez-5.48-150200.13.17.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bluez-5.48-150200.13.17.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bluez-devel-5.48-150200.13.17.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bluez-devel-5.48-150200.13.17.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libbluetooth3-5.48-150200.13.17.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libbluetooth3-5.48-150200.13.17.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:bluez-5.48-150200.13.17.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:bluez-devel-5.48-150200.13.17.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:libbluetooth3-5.48-150200.13.17.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bluez-5.48-150200.13.17.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bluez-5.48-150200.13.17.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bluez-5.48-150200.13.17.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bluez-5.48-150200.13.17.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bluez-devel-5.48-150200.13.17.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bluez-devel-5.48-150200.13.17.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bluez-devel-5.48-150200.13.17.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bluez-devel-5.48-150200.13.17.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libbluetooth3-5.48-150200.13.17.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libbluetooth3-5.48-150200.13.17.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libbluetooth3-5.48-150200.13.17.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libbluetooth3-5.48-150200.13.17.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bluez-5.48-150200.13.17.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bluez-5.48-150200.13.17.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bluez-devel-5.48-150200.13.17.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bluez-devel-5.48-150200.13.17.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libbluetooth3-5.48-150200.13.17.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libbluetooth3-5.48-150200.13.17.1.x86_64",
"SUSE Manager Proxy 4.1:bluez-5.48-150200.13.17.1.x86_64",
"SUSE Manager Proxy 4.1:bluez-devel-5.48-150200.13.17.1.x86_64",
"SUSE Manager Proxy 4.1:libbluetooth3-5.48-150200.13.17.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:bluez-5.48-150200.13.17.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:bluez-devel-5.48-150200.13.17.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:libbluetooth3-5.48-150200.13.17.1.x86_64",
"SUSE Manager Server 4.1:bluez-5.48-150200.13.17.1.ppc64le",
"SUSE Manager Server 4.1:bluez-5.48-150200.13.17.1.s390x",
"SUSE Manager Server 4.1:bluez-5.48-150200.13.17.1.x86_64",
"SUSE Manager Server 4.1:bluez-devel-5.48-150200.13.17.1.ppc64le",
"SUSE Manager Server 4.1:bluez-devel-5.48-150200.13.17.1.s390x",
"SUSE Manager Server 4.1:bluez-devel-5.48-150200.13.17.1.x86_64",
"SUSE Manager Server 4.1:libbluetooth3-5.48-150200.13.17.1.ppc64le",
"SUSE Manager Server 4.1:libbluetooth3-5.48-150200.13.17.1.s390x",
"SUSE Manager Server 4.1:libbluetooth3-5.48-150200.13.17.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-10-21T13:10:36Z",
"details": "moderate"
}
],
"title": "CVE-2021-3658"
},
{
"cve": "CVE-2021-43400",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-43400"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in gatt-database.c in BlueZ 5.61. A use-after-free can occur when a client disconnects during D-Bus processing of a WriteValue call.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7:bluez-5.48-150200.13.17.1.aarch64",
"SUSE Enterprise Storage 7:bluez-5.48-150200.13.17.1.x86_64",
"SUSE Enterprise Storage 7:bluez-devel-5.48-150200.13.17.1.aarch64",
"SUSE Enterprise Storage 7:bluez-devel-5.48-150200.13.17.1.x86_64",
"SUSE Enterprise Storage 7:libbluetooth3-5.48-150200.13.17.1.aarch64",
"SUSE Enterprise Storage 7:libbluetooth3-5.48-150200.13.17.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:bluez-5.48-150200.13.17.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:bluez-5.48-150200.13.17.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:bluez-devel-5.48-150200.13.17.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:bluez-devel-5.48-150200.13.17.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libbluetooth3-5.48-150200.13.17.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libbluetooth3-5.48-150200.13.17.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bluez-5.48-150200.13.17.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bluez-5.48-150200.13.17.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bluez-devel-5.48-150200.13.17.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bluez-devel-5.48-150200.13.17.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libbluetooth3-5.48-150200.13.17.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libbluetooth3-5.48-150200.13.17.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:bluez-5.48-150200.13.17.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:bluez-devel-5.48-150200.13.17.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:libbluetooth3-5.48-150200.13.17.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bluez-5.48-150200.13.17.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bluez-5.48-150200.13.17.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bluez-5.48-150200.13.17.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bluez-5.48-150200.13.17.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bluez-devel-5.48-150200.13.17.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bluez-devel-5.48-150200.13.17.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bluez-devel-5.48-150200.13.17.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bluez-devel-5.48-150200.13.17.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libbluetooth3-5.48-150200.13.17.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libbluetooth3-5.48-150200.13.17.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libbluetooth3-5.48-150200.13.17.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libbluetooth3-5.48-150200.13.17.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bluez-5.48-150200.13.17.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bluez-5.48-150200.13.17.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bluez-devel-5.48-150200.13.17.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bluez-devel-5.48-150200.13.17.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libbluetooth3-5.48-150200.13.17.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libbluetooth3-5.48-150200.13.17.1.x86_64",
"SUSE Manager Proxy 4.1:bluez-5.48-150200.13.17.1.x86_64",
"SUSE Manager Proxy 4.1:bluez-devel-5.48-150200.13.17.1.x86_64",
"SUSE Manager Proxy 4.1:libbluetooth3-5.48-150200.13.17.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:bluez-5.48-150200.13.17.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:bluez-devel-5.48-150200.13.17.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:libbluetooth3-5.48-150200.13.17.1.x86_64",
"SUSE Manager Server 4.1:bluez-5.48-150200.13.17.1.ppc64le",
"SUSE Manager Server 4.1:bluez-5.48-150200.13.17.1.s390x",
"SUSE Manager Server 4.1:bluez-5.48-150200.13.17.1.x86_64",
"SUSE Manager Server 4.1:bluez-devel-5.48-150200.13.17.1.ppc64le",
"SUSE Manager Server 4.1:bluez-devel-5.48-150200.13.17.1.s390x",
"SUSE Manager Server 4.1:bluez-devel-5.48-150200.13.17.1.x86_64",
"SUSE Manager Server 4.1:libbluetooth3-5.48-150200.13.17.1.ppc64le",
"SUSE Manager Server 4.1:libbluetooth3-5.48-150200.13.17.1.s390x",
"SUSE Manager Server 4.1:libbluetooth3-5.48-150200.13.17.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-43400",
"url": "https://www.suse.com/security/cve/CVE-2021-43400"
},
{
"category": "external",
"summary": "SUSE Bug 1192394 for CVE-2021-43400",
"url": "https://bugzilla.suse.com/1192394"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7:bluez-5.48-150200.13.17.1.aarch64",
"SUSE Enterprise Storage 7:bluez-5.48-150200.13.17.1.x86_64",
"SUSE Enterprise Storage 7:bluez-devel-5.48-150200.13.17.1.aarch64",
"SUSE Enterprise Storage 7:bluez-devel-5.48-150200.13.17.1.x86_64",
"SUSE Enterprise Storage 7:libbluetooth3-5.48-150200.13.17.1.aarch64",
"SUSE Enterprise Storage 7:libbluetooth3-5.48-150200.13.17.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:bluez-5.48-150200.13.17.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:bluez-5.48-150200.13.17.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:bluez-devel-5.48-150200.13.17.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:bluez-devel-5.48-150200.13.17.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libbluetooth3-5.48-150200.13.17.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libbluetooth3-5.48-150200.13.17.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bluez-5.48-150200.13.17.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bluez-5.48-150200.13.17.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bluez-devel-5.48-150200.13.17.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bluez-devel-5.48-150200.13.17.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libbluetooth3-5.48-150200.13.17.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libbluetooth3-5.48-150200.13.17.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:bluez-5.48-150200.13.17.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:bluez-devel-5.48-150200.13.17.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:libbluetooth3-5.48-150200.13.17.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bluez-5.48-150200.13.17.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bluez-5.48-150200.13.17.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bluez-5.48-150200.13.17.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bluez-5.48-150200.13.17.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bluez-devel-5.48-150200.13.17.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bluez-devel-5.48-150200.13.17.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bluez-devel-5.48-150200.13.17.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bluez-devel-5.48-150200.13.17.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libbluetooth3-5.48-150200.13.17.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libbluetooth3-5.48-150200.13.17.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libbluetooth3-5.48-150200.13.17.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libbluetooth3-5.48-150200.13.17.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bluez-5.48-150200.13.17.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bluez-5.48-150200.13.17.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bluez-devel-5.48-150200.13.17.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bluez-devel-5.48-150200.13.17.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libbluetooth3-5.48-150200.13.17.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libbluetooth3-5.48-150200.13.17.1.x86_64",
"SUSE Manager Proxy 4.1:bluez-5.48-150200.13.17.1.x86_64",
"SUSE Manager Proxy 4.1:bluez-devel-5.48-150200.13.17.1.x86_64",
"SUSE Manager Proxy 4.1:libbluetooth3-5.48-150200.13.17.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:bluez-5.48-150200.13.17.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:bluez-devel-5.48-150200.13.17.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:libbluetooth3-5.48-150200.13.17.1.x86_64",
"SUSE Manager Server 4.1:bluez-5.48-150200.13.17.1.ppc64le",
"SUSE Manager Server 4.1:bluez-5.48-150200.13.17.1.s390x",
"SUSE Manager Server 4.1:bluez-5.48-150200.13.17.1.x86_64",
"SUSE Manager Server 4.1:bluez-devel-5.48-150200.13.17.1.ppc64le",
"SUSE Manager Server 4.1:bluez-devel-5.48-150200.13.17.1.s390x",
"SUSE Manager Server 4.1:bluez-devel-5.48-150200.13.17.1.x86_64",
"SUSE Manager Server 4.1:libbluetooth3-5.48-150200.13.17.1.ppc64le",
"SUSE Manager Server 4.1:libbluetooth3-5.48-150200.13.17.1.s390x",
"SUSE Manager Server 4.1:libbluetooth3-5.48-150200.13.17.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7:bluez-5.48-150200.13.17.1.aarch64",
"SUSE Enterprise Storage 7:bluez-5.48-150200.13.17.1.x86_64",
"SUSE Enterprise Storage 7:bluez-devel-5.48-150200.13.17.1.aarch64",
"SUSE Enterprise Storage 7:bluez-devel-5.48-150200.13.17.1.x86_64",
"SUSE Enterprise Storage 7:libbluetooth3-5.48-150200.13.17.1.aarch64",
"SUSE Enterprise Storage 7:libbluetooth3-5.48-150200.13.17.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:bluez-5.48-150200.13.17.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:bluez-5.48-150200.13.17.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:bluez-devel-5.48-150200.13.17.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:bluez-devel-5.48-150200.13.17.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libbluetooth3-5.48-150200.13.17.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libbluetooth3-5.48-150200.13.17.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bluez-5.48-150200.13.17.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bluez-5.48-150200.13.17.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bluez-devel-5.48-150200.13.17.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bluez-devel-5.48-150200.13.17.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libbluetooth3-5.48-150200.13.17.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libbluetooth3-5.48-150200.13.17.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:bluez-5.48-150200.13.17.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:bluez-devel-5.48-150200.13.17.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:libbluetooth3-5.48-150200.13.17.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bluez-5.48-150200.13.17.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bluez-5.48-150200.13.17.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bluez-5.48-150200.13.17.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bluez-5.48-150200.13.17.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bluez-devel-5.48-150200.13.17.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bluez-devel-5.48-150200.13.17.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bluez-devel-5.48-150200.13.17.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:bluez-devel-5.48-150200.13.17.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libbluetooth3-5.48-150200.13.17.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libbluetooth3-5.48-150200.13.17.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libbluetooth3-5.48-150200.13.17.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libbluetooth3-5.48-150200.13.17.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bluez-5.48-150200.13.17.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bluez-5.48-150200.13.17.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bluez-devel-5.48-150200.13.17.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:bluez-devel-5.48-150200.13.17.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libbluetooth3-5.48-150200.13.17.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libbluetooth3-5.48-150200.13.17.1.x86_64",
"SUSE Manager Proxy 4.1:bluez-5.48-150200.13.17.1.x86_64",
"SUSE Manager Proxy 4.1:bluez-devel-5.48-150200.13.17.1.x86_64",
"SUSE Manager Proxy 4.1:libbluetooth3-5.48-150200.13.17.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:bluez-5.48-150200.13.17.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:bluez-devel-5.48-150200.13.17.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:libbluetooth3-5.48-150200.13.17.1.x86_64",
"SUSE Manager Server 4.1:bluez-5.48-150200.13.17.1.ppc64le",
"SUSE Manager Server 4.1:bluez-5.48-150200.13.17.1.s390x",
"SUSE Manager Server 4.1:bluez-5.48-150200.13.17.1.x86_64",
"SUSE Manager Server 4.1:bluez-devel-5.48-150200.13.17.1.ppc64le",
"SUSE Manager Server 4.1:bluez-devel-5.48-150200.13.17.1.s390x",
"SUSE Manager Server 4.1:bluez-devel-5.48-150200.13.17.1.x86_64",
"SUSE Manager Server 4.1:libbluetooth3-5.48-150200.13.17.1.ppc64le",
"SUSE Manager Server 4.1:libbluetooth3-5.48-150200.13.17.1.s390x",
"SUSE Manager Server 4.1:libbluetooth3-5.48-150200.13.17.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-10-21T13:10:36Z",
"details": "moderate"
}
],
"title": "CVE-2021-43400"
}
]
}
suse-su-2021:2427-1
Vulnerability from csaf_suse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel",
"title": "Title of the patch"
},
{
"category": "description",
"text": "The SUSE Linux Enterprise 15 SP3 kernel was updated to receive various security and bugfixes.\n\nThe following security bugs were fixed:\n\n- CVE-2021-22555: Fixed an heap out-of-bounds write in net/netfilter/x_tables.c that could allow local provilege escalation. (bsc#1188116)\n- CVE-2021-33624: Fixed a bug which allows unprivileged BPF program to leak the contents of arbitrary kernel memory (and therefore, of all physical memory) via a side-channel. (bsc#1187554)\n- CVE-2021-0605: Fixed an out-of-bounds read which could lead to local information disclosure in the kernel with System execution privileges needed. (bsc#1187601)\n- CVE-2021-0512: Fixed a possible out-of-bounds write which could lead to local escalation of privilege with no additional execution privileges needed. (bsc#1187595)\n- CVE-2020-26558: Fixed a flaw in the Bluetooth LE and BR/EDR secure pairing that could permit a nearby man-in-the-middle attacker to identify the Passkey used during pairing. (bnc#1179610)\n- CVE-2021-34693: Fixed a bug in net/can/bcm.c which could allow local users to obtain sensitive information from kernel stack memory because parts of a data structure are uninitialized. (bsc#1187452)\n- CVE-2021-0129: Fixed an improper access control in BlueZ that may have allowed an authenticated user to potentially enable information disclosure via adjacent access. (bnc#1186463)\n- CVE-2020-36386: Fixed an out-of-bounds read in hci_extended_inquiry_result_evt. (bsc#1187038)\n- CVE-2020-24588: Fixed a bug that could allow an adversary to abuse devices that support receiving non-SSP A-MSDU frames to inject arbitrary network packets. (bsc#1185861 bsc#1185863)\n- CVE-2021-33909: Fixed an out-of-bounds write in the filesystem layer that allows to andobtain full root privileges. (bsc#1188062)\n- CVE-2021-3609: Fixed a race condition in the CAN BCM networking protocol which allows for local privilege escalation. (bsc#1187215)\n- CVE-2020-36385: Fixed a use-after-free flaw in ucma.c which allows for local privilege escalation. (bsc#1187050)\n- CVE-2021-33200: Fix leakage of uninitialized bpf stack under speculation. (bsc#1186484)\n\nThe following non-security bugs were fixed:\n\n- af_packet: fix the tx skb protocol in raw sockets with ETH_P_ALL (bsc#1176081).\n- kabi: preserve struct header_ops after bsc#1176081 fix (bsc#1176081).\n- net: Do not set transport offset to invalid value (bsc#1176081).\n- net: Introduce parse_protocol header_ops callback (bsc#1176081).\n- net/ethernet: Add parse_protocol header_ops support (bsc#1176081).\n- net/mlx5e: Remove the wrong assumption about transport offset (bsc#1176081).\n- net/mlx5e: Trust kernel regarding transport offset (bsc#1176081).\n- net/packet: Ask driver for protocol if not provided by user (bsc#1176081).\n- net/packet: Remove redundant skb-\u003eprotocol set (bsc#1176081).\n- resource: Fix find_next_iomem_res() iteration issue (bsc#1181193).\n- scsi: scsi_dh_alua: Retry RTPG on a different path after failure (bsc#1174978 bsc#1185701).\n- SUNRPC in case of backlog, hand free slots directly to waiting task (bsc#1185428).\n- SUNRPC: More fixes for backlog congestion (bsc#1185428).\n- x86/crash: Add e820 reserved ranges to kdump kernel\u0027s e820 table (bsc#1181193).\n- x86/debug: Extend the lower bound of crash kernel low reservations (bsc#1153720).\n- x86/e820, ioport: Add a new I/O resource descriptor IORES_DESC_RESERVED (bsc#1181193).\n- x86/mm: Rework ioremap resource mapping determination (bsc#1181193).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2021-2427,SUSE-SLE-Module-Live-Patching-15-SP1-2021-2427,SUSE-SLE-Product-HA-15-SP1-2021-2427,SUSE-SLE-Product-HPC-15-SP1-ESPOS-2021-2427,SUSE-SLE-Product-HPC-15-SP1-LTSS-2021-2427,SUSE-SLE-Product-SLES-15-SP1-BCL-2021-2427,SUSE-SLE-Product-SLES-15-SP1-LTSS-2021-2427,SUSE-SLE-Product-SLES_SAP-15-SP1-2021-2427,SUSE-SLE-Product-SUSE-Manager-Proxy-4.0-2021-2427,SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.0-2021-2427,SUSE-SLE-Product-SUSE-Manager-Server-4.0-2021-2427,SUSE-Storage-6-2021-2427",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2021_2427-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2021:2427-1",
"url": "https://www.suse.com/support/update/announcement/2021/suse-su-20212427-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2021:2427-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2021-July/009190.html"
},
{
"category": "self",
"summary": "SUSE Bug 1153720",
"url": "https://bugzilla.suse.com/1153720"
},
{
"category": "self",
"summary": "SUSE Bug 1174978",
"url": "https://bugzilla.suse.com/1174978"
},
{
"category": "self",
"summary": "SUSE Bug 1179610",
"url": "https://bugzilla.suse.com/1179610"
},
{
"category": "self",
"summary": "SUSE Bug 1181193",
"url": "https://bugzilla.suse.com/1181193"
},
{
"category": "self",
"summary": "SUSE Bug 1185428",
"url": "https://bugzilla.suse.com/1185428"
},
{
"category": "self",
"summary": "SUSE Bug 1185701",
"url": "https://bugzilla.suse.com/1185701"
},
{
"category": "self",
"summary": "SUSE Bug 1185861",
"url": "https://bugzilla.suse.com/1185861"
},
{
"category": "self",
"summary": "SUSE Bug 1186463",
"url": "https://bugzilla.suse.com/1186463"
},
{
"category": "self",
"summary": "SUSE Bug 1186484",
"url": "https://bugzilla.suse.com/1186484"
},
{
"category": "self",
"summary": "SUSE Bug 1187038",
"url": "https://bugzilla.suse.com/1187038"
},
{
"category": "self",
"summary": "SUSE Bug 1187050",
"url": "https://bugzilla.suse.com/1187050"
},
{
"category": "self",
"summary": "SUSE Bug 1187215",
"url": "https://bugzilla.suse.com/1187215"
},
{
"category": "self",
"summary": "SUSE Bug 1187452",
"url": "https://bugzilla.suse.com/1187452"
},
{
"category": "self",
"summary": "SUSE Bug 1187554",
"url": "https://bugzilla.suse.com/1187554"
},
{
"category": "self",
"summary": "SUSE Bug 1187595",
"url": "https://bugzilla.suse.com/1187595"
},
{
"category": "self",
"summary": "SUSE Bug 1187601",
"url": "https://bugzilla.suse.com/1187601"
},
{
"category": "self",
"summary": "SUSE Bug 1188062",
"url": "https://bugzilla.suse.com/1188062"
},
{
"category": "self",
"summary": "SUSE Bug 1188116",
"url": "https://bugzilla.suse.com/1188116"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-24588 page",
"url": "https://www.suse.com/security/cve/CVE-2020-24588/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-26558 page",
"url": "https://www.suse.com/security/cve/CVE-2020-26558/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-36385 page",
"url": "https://www.suse.com/security/cve/CVE-2020-36385/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-36386 page",
"url": "https://www.suse.com/security/cve/CVE-2020-36386/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-0129 page",
"url": "https://www.suse.com/security/cve/CVE-2021-0129/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-0512 page",
"url": "https://www.suse.com/security/cve/CVE-2021-0512/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-0605 page",
"url": "https://www.suse.com/security/cve/CVE-2021-0605/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-22555 page",
"url": "https://www.suse.com/security/cve/CVE-2021-22555/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-33200 page",
"url": "https://www.suse.com/security/cve/CVE-2021-33200/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-33624 page",
"url": "https://www.suse.com/security/cve/CVE-2021-33624/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-33909 page",
"url": "https://www.suse.com/security/cve/CVE-2021-33909/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-34693 page",
"url": "https://www.suse.com/security/cve/CVE-2021-34693/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3609 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3609/"
}
],
"title": "Security update for the Linux Kernel",
"tracking": {
"current_release_date": "2021-07-21T09:29:05Z",
"generator": {
"date": "2021-07-21T09:29:05Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2021:2427-1",
"initial_release_date": "2021-07-21T09:29:05Z",
"revision_history": [
{
"date": "2021-07-21T09:29:05Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-4.12.14-197.99.1.aarch64",
"product": {
"name": "cluster-md-kmp-default-4.12.14-197.99.1.aarch64",
"product_id": "cluster-md-kmp-default-4.12.14-197.99.1.aarch64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-4.12.14-197.99.1.aarch64",
"product": {
"name": "dlm-kmp-default-4.12.14-197.99.1.aarch64",
"product_id": "dlm-kmp-default-4.12.14-197.99.1.aarch64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-4.12.14-197.99.1.aarch64",
"product": {
"name": "gfs2-kmp-default-4.12.14-197.99.1.aarch64",
"product_id": "gfs2-kmp-default-4.12.14-197.99.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-4.12.14-197.99.1.aarch64",
"product": {
"name": "kernel-default-4.12.14-197.99.1.aarch64",
"product_id": "kernel-default-4.12.14-197.99.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-4.12.14-197.99.1.aarch64",
"product": {
"name": "kernel-default-base-4.12.14-197.99.1.aarch64",
"product_id": "kernel-default-base-4.12.14-197.99.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-4.12.14-197.99.1.aarch64",
"product": {
"name": "kernel-default-devel-4.12.14-197.99.1.aarch64",
"product_id": "kernel-default-devel-4.12.14-197.99.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-4.12.14-197.99.1.aarch64",
"product": {
"name": "kernel-default-extra-4.12.14-197.99.1.aarch64",
"product_id": "kernel-default-extra-4.12.14-197.99.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-4.12.14-197.99.1.aarch64",
"product": {
"name": "kernel-default-livepatch-4.12.14-197.99.1.aarch64",
"product_id": "kernel-default-livepatch-4.12.14-197.99.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-devel-4.12.14-197.99.1.aarch64",
"product": {
"name": "kernel-default-livepatch-devel-4.12.14-197.99.1.aarch64",
"product_id": "kernel-default-livepatch-devel-4.12.14-197.99.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-4.12.14-197.99.1.aarch64",
"product": {
"name": "kernel-obs-build-4.12.14-197.99.1.aarch64",
"product_id": "kernel-obs-build-4.12.14-197.99.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-4.12.14-197.99.1.aarch64",
"product": {
"name": "kernel-obs-qa-4.12.14-197.99.1.aarch64",
"product_id": "kernel-obs-qa-4.12.14-197.99.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-syms-4.12.14-197.99.1.aarch64",
"product": {
"name": "kernel-syms-4.12.14-197.99.1.aarch64",
"product_id": "kernel-syms-4.12.14-197.99.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-4.12.14-197.99.1.aarch64",
"product": {
"name": "kernel-vanilla-4.12.14-197.99.1.aarch64",
"product_id": "kernel-vanilla-4.12.14-197.99.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-base-4.12.14-197.99.1.aarch64",
"product": {
"name": "kernel-vanilla-base-4.12.14-197.99.1.aarch64",
"product_id": "kernel-vanilla-base-4.12.14-197.99.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-devel-4.12.14-197.99.1.aarch64",
"product": {
"name": "kernel-vanilla-devel-4.12.14-197.99.1.aarch64",
"product_id": "kernel-vanilla-devel-4.12.14-197.99.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-livepatch-devel-4.12.14-197.99.1.aarch64",
"product": {
"name": "kernel-vanilla-livepatch-devel-4.12.14-197.99.1.aarch64",
"product_id": "kernel-vanilla-livepatch-devel-4.12.14-197.99.1.aarch64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-4.12.14-197.99.1.aarch64",
"product": {
"name": "kselftests-kmp-default-4.12.14-197.99.1.aarch64",
"product_id": "kselftests-kmp-default-4.12.14-197.99.1.aarch64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-4.12.14-197.99.1.aarch64",
"product": {
"name": "ocfs2-kmp-default-4.12.14-197.99.1.aarch64",
"product_id": "ocfs2-kmp-default-4.12.14-197.99.1.aarch64"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-default-4.12.14-197.99.1.aarch64",
"product": {
"name": "reiserfs-kmp-default-4.12.14-197.99.1.aarch64",
"product_id": "reiserfs-kmp-default-4.12.14-197.99.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-devel-4.12.14-197.99.1.noarch",
"product": {
"name": "kernel-devel-4.12.14-197.99.1.noarch",
"product_id": "kernel-devel-4.12.14-197.99.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-docs-4.12.14-197.99.1.noarch",
"product": {
"name": "kernel-docs-4.12.14-197.99.1.noarch",
"product_id": "kernel-docs-4.12.14-197.99.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-docs-html-4.12.14-197.99.1.noarch",
"product": {
"name": "kernel-docs-html-4.12.14-197.99.1.noarch",
"product_id": "kernel-docs-html-4.12.14-197.99.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-macros-4.12.14-197.99.1.noarch",
"product": {
"name": "kernel-macros-4.12.14-197.99.1.noarch",
"product_id": "kernel-macros-4.12.14-197.99.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-4.12.14-197.99.1.noarch",
"product": {
"name": "kernel-source-4.12.14-197.99.1.noarch",
"product_id": "kernel-source-4.12.14-197.99.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-vanilla-4.12.14-197.99.1.noarch",
"product": {
"name": "kernel-source-vanilla-4.12.14-197.99.1.noarch",
"product_id": "kernel-source-vanilla-4.12.14-197.99.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-4.12.14-197.99.1.ppc64le",
"product": {
"name": "cluster-md-kmp-default-4.12.14-197.99.1.ppc64le",
"product_id": "cluster-md-kmp-default-4.12.14-197.99.1.ppc64le"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-4.12.14-197.99.1.ppc64le",
"product": {
"name": "dlm-kmp-default-4.12.14-197.99.1.ppc64le",
"product_id": "dlm-kmp-default-4.12.14-197.99.1.ppc64le"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-4.12.14-197.99.1.ppc64le",
"product": {
"name": "gfs2-kmp-default-4.12.14-197.99.1.ppc64le",
"product_id": "gfs2-kmp-default-4.12.14-197.99.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-4.12.14-197.99.1.ppc64le",
"product": {
"name": "kernel-debug-4.12.14-197.99.1.ppc64le",
"product_id": "kernel-debug-4.12.14-197.99.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-base-4.12.14-197.99.1.ppc64le",
"product": {
"name": "kernel-debug-base-4.12.14-197.99.1.ppc64le",
"product_id": "kernel-debug-base-4.12.14-197.99.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-4.12.14-197.99.1.ppc64le",
"product": {
"name": "kernel-debug-devel-4.12.14-197.99.1.ppc64le",
"product_id": "kernel-debug-devel-4.12.14-197.99.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-livepatch-devel-4.12.14-197.99.1.ppc64le",
"product": {
"name": "kernel-debug-livepatch-devel-4.12.14-197.99.1.ppc64le",
"product_id": "kernel-debug-livepatch-devel-4.12.14-197.99.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-4.12.14-197.99.1.ppc64le",
"product": {
"name": "kernel-default-4.12.14-197.99.1.ppc64le",
"product_id": "kernel-default-4.12.14-197.99.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-base-4.12.14-197.99.1.ppc64le",
"product": {
"name": "kernel-default-base-4.12.14-197.99.1.ppc64le",
"product_id": "kernel-default-base-4.12.14-197.99.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-4.12.14-197.99.1.ppc64le",
"product": {
"name": "kernel-default-devel-4.12.14-197.99.1.ppc64le",
"product_id": "kernel-default-devel-4.12.14-197.99.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-4.12.14-197.99.1.ppc64le",
"product": {
"name": "kernel-default-extra-4.12.14-197.99.1.ppc64le",
"product_id": "kernel-default-extra-4.12.14-197.99.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-4.12.14-197.99.1.ppc64le",
"product": {
"name": "kernel-default-livepatch-4.12.14-197.99.1.ppc64le",
"product_id": "kernel-default-livepatch-4.12.14-197.99.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-devel-4.12.14-197.99.1.ppc64le",
"product": {
"name": "kernel-default-livepatch-devel-4.12.14-197.99.1.ppc64le",
"product_id": "kernel-default-livepatch-devel-4.12.14-197.99.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-4_12_14-197_99-default-1-3.3.3.ppc64le",
"product": {
"name": "kernel-livepatch-4_12_14-197_99-default-1-3.3.3.ppc64le",
"product_id": "kernel-livepatch-4_12_14-197_99-default-1-3.3.3.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-4.12.14-197.99.1.ppc64le",
"product": {
"name": "kernel-obs-build-4.12.14-197.99.1.ppc64le",
"product_id": "kernel-obs-build-4.12.14-197.99.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-4.12.14-197.99.1.ppc64le",
"product": {
"name": "kernel-obs-qa-4.12.14-197.99.1.ppc64le",
"product_id": "kernel-obs-qa-4.12.14-197.99.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-syms-4.12.14-197.99.1.ppc64le",
"product": {
"name": "kernel-syms-4.12.14-197.99.1.ppc64le",
"product_id": "kernel-syms-4.12.14-197.99.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-4.12.14-197.99.1.ppc64le",
"product": {
"name": "kernel-vanilla-4.12.14-197.99.1.ppc64le",
"product_id": "kernel-vanilla-4.12.14-197.99.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-base-4.12.14-197.99.1.ppc64le",
"product": {
"name": "kernel-vanilla-base-4.12.14-197.99.1.ppc64le",
"product_id": "kernel-vanilla-base-4.12.14-197.99.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-devel-4.12.14-197.99.1.ppc64le",
"product": {
"name": "kernel-vanilla-devel-4.12.14-197.99.1.ppc64le",
"product_id": "kernel-vanilla-devel-4.12.14-197.99.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-livepatch-devel-4.12.14-197.99.1.ppc64le",
"product": {
"name": "kernel-vanilla-livepatch-devel-4.12.14-197.99.1.ppc64le",
"product_id": "kernel-vanilla-livepatch-devel-4.12.14-197.99.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-4.12.14-197.99.1.ppc64le",
"product": {
"name": "kselftests-kmp-default-4.12.14-197.99.1.ppc64le",
"product_id": "kselftests-kmp-default-4.12.14-197.99.1.ppc64le"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-4.12.14-197.99.1.ppc64le",
"product": {
"name": "ocfs2-kmp-default-4.12.14-197.99.1.ppc64le",
"product_id": "ocfs2-kmp-default-4.12.14-197.99.1.ppc64le"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-default-4.12.14-197.99.1.ppc64le",
"product": {
"name": "reiserfs-kmp-default-4.12.14-197.99.1.ppc64le",
"product_id": "reiserfs-kmp-default-4.12.14-197.99.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-4.12.14-197.99.1.s390x",
"product": {
"name": "cluster-md-kmp-default-4.12.14-197.99.1.s390x",
"product_id": "cluster-md-kmp-default-4.12.14-197.99.1.s390x"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-4.12.14-197.99.1.s390x",
"product": {
"name": "dlm-kmp-default-4.12.14-197.99.1.s390x",
"product_id": "dlm-kmp-default-4.12.14-197.99.1.s390x"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-4.12.14-197.99.1.s390x",
"product": {
"name": "gfs2-kmp-default-4.12.14-197.99.1.s390x",
"product_id": "gfs2-kmp-default-4.12.14-197.99.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-4.12.14-197.99.1.s390x",
"product": {
"name": "kernel-default-4.12.14-197.99.1.s390x",
"product_id": "kernel-default-4.12.14-197.99.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-base-4.12.14-197.99.1.s390x",
"product": {
"name": "kernel-default-base-4.12.14-197.99.1.s390x",
"product_id": "kernel-default-base-4.12.14-197.99.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-4.12.14-197.99.1.s390x",
"product": {
"name": "kernel-default-devel-4.12.14-197.99.1.s390x",
"product_id": "kernel-default-devel-4.12.14-197.99.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-4.12.14-197.99.1.s390x",
"product": {
"name": "kernel-default-extra-4.12.14-197.99.1.s390x",
"product_id": "kernel-default-extra-4.12.14-197.99.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-4.12.14-197.99.1.s390x",
"product": {
"name": "kernel-default-livepatch-4.12.14-197.99.1.s390x",
"product_id": "kernel-default-livepatch-4.12.14-197.99.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-devel-4.12.14-197.99.1.s390x",
"product": {
"name": "kernel-default-livepatch-devel-4.12.14-197.99.1.s390x",
"product_id": "kernel-default-livepatch-devel-4.12.14-197.99.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-man-4.12.14-197.99.1.s390x",
"product": {
"name": "kernel-default-man-4.12.14-197.99.1.s390x",
"product_id": "kernel-default-man-4.12.14-197.99.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-4.12.14-197.99.1.s390x",
"product": {
"name": "kernel-obs-build-4.12.14-197.99.1.s390x",
"product_id": "kernel-obs-build-4.12.14-197.99.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-4.12.14-197.99.1.s390x",
"product": {
"name": "kernel-obs-qa-4.12.14-197.99.1.s390x",
"product_id": "kernel-obs-qa-4.12.14-197.99.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-syms-4.12.14-197.99.1.s390x",
"product": {
"name": "kernel-syms-4.12.14-197.99.1.s390x",
"product_id": "kernel-syms-4.12.14-197.99.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-4.12.14-197.99.1.s390x",
"product": {
"name": "kernel-vanilla-4.12.14-197.99.1.s390x",
"product_id": "kernel-vanilla-4.12.14-197.99.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-base-4.12.14-197.99.1.s390x",
"product": {
"name": "kernel-vanilla-base-4.12.14-197.99.1.s390x",
"product_id": "kernel-vanilla-base-4.12.14-197.99.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-devel-4.12.14-197.99.1.s390x",
"product": {
"name": "kernel-vanilla-devel-4.12.14-197.99.1.s390x",
"product_id": "kernel-vanilla-devel-4.12.14-197.99.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-livepatch-devel-4.12.14-197.99.1.s390x",
"product": {
"name": "kernel-vanilla-livepatch-devel-4.12.14-197.99.1.s390x",
"product_id": "kernel-vanilla-livepatch-devel-4.12.14-197.99.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-4.12.14-197.99.1.s390x",
"product": {
"name": "kernel-zfcpdump-4.12.14-197.99.1.s390x",
"product_id": "kernel-zfcpdump-4.12.14-197.99.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-man-4.12.14-197.99.1.s390x",
"product": {
"name": "kernel-zfcpdump-man-4.12.14-197.99.1.s390x",
"product_id": "kernel-zfcpdump-man-4.12.14-197.99.1.s390x"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-4.12.14-197.99.1.s390x",
"product": {
"name": "kselftests-kmp-default-4.12.14-197.99.1.s390x",
"product_id": "kselftests-kmp-default-4.12.14-197.99.1.s390x"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-4.12.14-197.99.1.s390x",
"product": {
"name": "ocfs2-kmp-default-4.12.14-197.99.1.s390x",
"product_id": "ocfs2-kmp-default-4.12.14-197.99.1.s390x"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-default-4.12.14-197.99.1.s390x",
"product": {
"name": "reiserfs-kmp-default-4.12.14-197.99.1.s390x",
"product_id": "reiserfs-kmp-default-4.12.14-197.99.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-4.12.14-197.99.1.x86_64",
"product": {
"name": "cluster-md-kmp-default-4.12.14-197.99.1.x86_64",
"product_id": "cluster-md-kmp-default-4.12.14-197.99.1.x86_64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-4.12.14-197.99.1.x86_64",
"product": {
"name": "dlm-kmp-default-4.12.14-197.99.1.x86_64",
"product_id": "dlm-kmp-default-4.12.14-197.99.1.x86_64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-4.12.14-197.99.1.x86_64",
"product": {
"name": "gfs2-kmp-default-4.12.14-197.99.1.x86_64",
"product_id": "gfs2-kmp-default-4.12.14-197.99.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-4.12.14-197.99.1.x86_64",
"product": {
"name": "kernel-debug-4.12.14-197.99.1.x86_64",
"product_id": "kernel-debug-4.12.14-197.99.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-base-4.12.14-197.99.1.x86_64",
"product": {
"name": "kernel-debug-base-4.12.14-197.99.1.x86_64",
"product_id": "kernel-debug-base-4.12.14-197.99.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-4.12.14-197.99.1.x86_64",
"product": {
"name": "kernel-debug-devel-4.12.14-197.99.1.x86_64",
"product_id": "kernel-debug-devel-4.12.14-197.99.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-livepatch-devel-4.12.14-197.99.1.x86_64",
"product": {
"name": "kernel-debug-livepatch-devel-4.12.14-197.99.1.x86_64",
"product_id": "kernel-debug-livepatch-devel-4.12.14-197.99.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-4.12.14-197.99.1.x86_64",
"product": {
"name": "kernel-default-4.12.14-197.99.1.x86_64",
"product_id": "kernel-default-4.12.14-197.99.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-4.12.14-197.99.1.x86_64",
"product": {
"name": "kernel-default-base-4.12.14-197.99.1.x86_64",
"product_id": "kernel-default-base-4.12.14-197.99.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-4.12.14-197.99.1.x86_64",
"product": {
"name": "kernel-default-devel-4.12.14-197.99.1.x86_64",
"product_id": "kernel-default-devel-4.12.14-197.99.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-4.12.14-197.99.1.x86_64",
"product": {
"name": "kernel-default-extra-4.12.14-197.99.1.x86_64",
"product_id": "kernel-default-extra-4.12.14-197.99.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-4.12.14-197.99.1.x86_64",
"product": {
"name": "kernel-default-livepatch-4.12.14-197.99.1.x86_64",
"product_id": "kernel-default-livepatch-4.12.14-197.99.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-devel-4.12.14-197.99.1.x86_64",
"product": {
"name": "kernel-default-livepatch-devel-4.12.14-197.99.1.x86_64",
"product_id": "kernel-default-livepatch-devel-4.12.14-197.99.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-4.12.14-197.99.1.x86_64",
"product": {
"name": "kernel-kvmsmall-4.12.14-197.99.1.x86_64",
"product_id": "kernel-kvmsmall-4.12.14-197.99.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-base-4.12.14-197.99.1.x86_64",
"product": {
"name": "kernel-kvmsmall-base-4.12.14-197.99.1.x86_64",
"product_id": "kernel-kvmsmall-base-4.12.14-197.99.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-devel-4.12.14-197.99.1.x86_64",
"product": {
"name": "kernel-kvmsmall-devel-4.12.14-197.99.1.x86_64",
"product_id": "kernel-kvmsmall-devel-4.12.14-197.99.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-livepatch-devel-4.12.14-197.99.1.x86_64",
"product": {
"name": "kernel-kvmsmall-livepatch-devel-4.12.14-197.99.1.x86_64",
"product_id": "kernel-kvmsmall-livepatch-devel-4.12.14-197.99.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-4_12_14-197_99-default-1-3.3.3.x86_64",
"product": {
"name": "kernel-livepatch-4_12_14-197_99-default-1-3.3.3.x86_64",
"product_id": "kernel-livepatch-4_12_14-197_99-default-1-3.3.3.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-4.12.14-197.99.1.x86_64",
"product": {
"name": "kernel-obs-build-4.12.14-197.99.1.x86_64",
"product_id": "kernel-obs-build-4.12.14-197.99.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-4.12.14-197.99.1.x86_64",
"product": {
"name": "kernel-obs-qa-4.12.14-197.99.1.x86_64",
"product_id": "kernel-obs-qa-4.12.14-197.99.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-syms-4.12.14-197.99.1.x86_64",
"product": {
"name": "kernel-syms-4.12.14-197.99.1.x86_64",
"product_id": "kernel-syms-4.12.14-197.99.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-4.12.14-197.99.1.x86_64",
"product": {
"name": "kernel-vanilla-4.12.14-197.99.1.x86_64",
"product_id": "kernel-vanilla-4.12.14-197.99.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-base-4.12.14-197.99.1.x86_64",
"product": {
"name": "kernel-vanilla-base-4.12.14-197.99.1.x86_64",
"product_id": "kernel-vanilla-base-4.12.14-197.99.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-devel-4.12.14-197.99.1.x86_64",
"product": {
"name": "kernel-vanilla-devel-4.12.14-197.99.1.x86_64",
"product_id": "kernel-vanilla-devel-4.12.14-197.99.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-livepatch-devel-4.12.14-197.99.1.x86_64",
"product": {
"name": "kernel-vanilla-livepatch-devel-4.12.14-197.99.1.x86_64",
"product_id": "kernel-vanilla-livepatch-devel-4.12.14-197.99.1.x86_64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-4.12.14-197.99.1.x86_64",
"product": {
"name": "kselftests-kmp-default-4.12.14-197.99.1.x86_64",
"product_id": "kselftests-kmp-default-4.12.14-197.99.1.x86_64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-4.12.14-197.99.1.x86_64",
"product": {
"name": "ocfs2-kmp-default-4.12.14-197.99.1.x86_64",
"product_id": "ocfs2-kmp-default-4.12.14-197.99.1.x86_64"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"product": {
"name": "reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"product_id": "reiserfs-kmp-default-4.12.14-197.99.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 15 SP1",
"product": {
"name": "SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-live-patching:15:sp1"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Availability Extension 15 SP1",
"product": {
"name": "SUSE Linux Enterprise High Availability Extension 15 SP1",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-ha:15:sp1"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle_hpc-espos:15:sp1"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle_hpc-ltss:15:sp1"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 15 SP1-BCL",
"product": {
"name": "SUSE Linux Enterprise Server 15 SP1-BCL",
"product_id": "SUSE Linux Enterprise Server 15 SP1-BCL",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_bcl:15:sp1"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 15 SP1-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:15:sp1"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP1",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:15:sp1"
}
}
},
{
"category": "product_name",
"name": "SUSE Manager Proxy 4.0",
"product": {
"name": "SUSE Manager Proxy 4.0",
"product_id": "SUSE Manager Proxy 4.0",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse-manager-proxy:4.0"
}
}
},
{
"category": "product_name",
"name": "SUSE Manager Retail Branch Server 4.0",
"product": {
"name": "SUSE Manager Retail Branch Server 4.0",
"product_id": "SUSE Manager Retail Branch Server 4.0",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse-manager-retail-branch-server:4.0"
}
}
},
{
"category": "product_name",
"name": "SUSE Manager Server 4.0",
"product": {
"name": "SUSE Manager Server 4.0",
"product_id": "SUSE Manager Server 4.0",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse-manager-server:4.0"
}
}
},
{
"category": "product_name",
"name": "SUSE Enterprise Storage 6",
"product": {
"name": "SUSE Enterprise Storage 6",
"product_id": "SUSE Enterprise Storage 6",
"product_identification_helper": {
"cpe": "cpe:/o:suse:ses:6"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-4.12.14-197.99.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.99.1.ppc64le"
},
"product_reference": "kernel-default-livepatch-4.12.14-197.99.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-4.12.14-197.99.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.99.1.x86_64"
},
"product_reference": "kernel-default-livepatch-4.12.14-197.99.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-devel-4.12.14-197.99.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.99.1.ppc64le"
},
"product_reference": "kernel-default-livepatch-devel-4.12.14-197.99.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-devel-4.12.14-197.99.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.99.1.x86_64"
},
"product_reference": "kernel-default-livepatch-devel-4.12.14-197.99.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_99-default-1-3.3.3.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_99-default-1-3.3.3.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-197_99-default-1-3.3.3.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_99-default-1-3.3.3.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_99-default-1-3.3.3.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-197_99-default-1-3.3.3.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-4.12.14-197.99.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP1",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.aarch64"
},
"product_reference": "cluster-md-kmp-default-4.12.14-197.99.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-4.12.14-197.99.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP1",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.ppc64le"
},
"product_reference": "cluster-md-kmp-default-4.12.14-197.99.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-4.12.14-197.99.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP1",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.s390x"
},
"product_reference": "cluster-md-kmp-default-4.12.14-197.99.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-4.12.14-197.99.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP1",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.x86_64"
},
"product_reference": "cluster-md-kmp-default-4.12.14-197.99.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-4.12.14-197.99.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP1",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.aarch64"
},
"product_reference": "dlm-kmp-default-4.12.14-197.99.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-4.12.14-197.99.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP1",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.ppc64le"
},
"product_reference": "dlm-kmp-default-4.12.14-197.99.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-4.12.14-197.99.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP1",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.s390x"
},
"product_reference": "dlm-kmp-default-4.12.14-197.99.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-4.12.14-197.99.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP1",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.x86_64"
},
"product_reference": "dlm-kmp-default-4.12.14-197.99.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-4.12.14-197.99.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP1",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.aarch64"
},
"product_reference": "gfs2-kmp-default-4.12.14-197.99.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-4.12.14-197.99.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP1",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.ppc64le"
},
"product_reference": "gfs2-kmp-default-4.12.14-197.99.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-4.12.14-197.99.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP1",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.s390x"
},
"product_reference": "gfs2-kmp-default-4.12.14-197.99.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-4.12.14-197.99.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP1",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.x86_64"
},
"product_reference": "gfs2-kmp-default-4.12.14-197.99.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-4.12.14-197.99.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP1",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.aarch64"
},
"product_reference": "ocfs2-kmp-default-4.12.14-197.99.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-4.12.14-197.99.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP1",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.ppc64le"
},
"product_reference": "ocfs2-kmp-default-4.12.14-197.99.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-4.12.14-197.99.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP1",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.s390x"
},
"product_reference": "ocfs2-kmp-default-4.12.14-197.99.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-4.12.14-197.99.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP1",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.x86_64"
},
"product_reference": "ocfs2-kmp-default-4.12.14-197.99.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-197.99.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.99.1.aarch64"
},
"product_reference": "kernel-default-4.12.14-197.99.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-197.99.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.99.1.x86_64"
},
"product_reference": "kernel-default-4.12.14-197.99.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-197.99.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.99.1.aarch64"
},
"product_reference": "kernel-default-base-4.12.14-197.99.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-197.99.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.99.1.x86_64"
},
"product_reference": "kernel-default-base-4.12.14-197.99.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-197.99.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.99.1.aarch64"
},
"product_reference": "kernel-default-devel-4.12.14-197.99.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-197.99.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.99.1.x86_64"
},
"product_reference": "kernel-default-devel-4.12.14-197.99.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-4.12.14-197.99.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.99.1.noarch"
},
"product_reference": "kernel-devel-4.12.14-197.99.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-docs-4.12.14-197.99.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.99.1.noarch"
},
"product_reference": "kernel-docs-4.12.14-197.99.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-4.12.14-197.99.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.99.1.noarch"
},
"product_reference": "kernel-macros-4.12.14-197.99.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.12.14-197.99.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.99.1.aarch64"
},
"product_reference": "kernel-obs-build-4.12.14-197.99.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.12.14-197.99.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.99.1.x86_64"
},
"product_reference": "kernel-obs-build-4.12.14-197.99.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-4.12.14-197.99.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.99.1.noarch"
},
"product_reference": "kernel-source-4.12.14-197.99.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-197.99.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.99.1.aarch64"
},
"product_reference": "kernel-syms-4.12.14-197.99.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-197.99.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.99.1.x86_64"
},
"product_reference": "kernel-syms-4.12.14-197.99.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-197.99.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.aarch64"
},
"product_reference": "kernel-default-4.12.14-197.99.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-197.99.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.x86_64"
},
"product_reference": "kernel-default-4.12.14-197.99.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-197.99.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.aarch64"
},
"product_reference": "kernel-default-base-4.12.14-197.99.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-197.99.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.x86_64"
},
"product_reference": "kernel-default-base-4.12.14-197.99.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-197.99.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.aarch64"
},
"product_reference": "kernel-default-devel-4.12.14-197.99.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-197.99.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.x86_64"
},
"product_reference": "kernel-default-devel-4.12.14-197.99.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-4.12.14-197.99.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.99.1.noarch"
},
"product_reference": "kernel-devel-4.12.14-197.99.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-docs-4.12.14-197.99.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.99.1.noarch"
},
"product_reference": "kernel-docs-4.12.14-197.99.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-4.12.14-197.99.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.99.1.noarch"
},
"product_reference": "kernel-macros-4.12.14-197.99.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.12.14-197.99.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.aarch64"
},
"product_reference": "kernel-obs-build-4.12.14-197.99.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.12.14-197.99.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.x86_64"
},
"product_reference": "kernel-obs-build-4.12.14-197.99.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-4.12.14-197.99.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.99.1.noarch"
},
"product_reference": "kernel-source-4.12.14-197.99.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-197.99.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.aarch64"
},
"product_reference": "kernel-syms-4.12.14-197.99.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-197.99.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.x86_64"
},
"product_reference": "kernel-syms-4.12.14-197.99.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-197.99.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-BCL",
"product_id": "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.99.1.x86_64"
},
"product_reference": "kernel-default-4.12.14-197.99.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-197.99.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-BCL",
"product_id": "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.99.1.x86_64"
},
"product_reference": "kernel-default-base-4.12.14-197.99.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-197.99.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-BCL",
"product_id": "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.99.1.x86_64"
},
"product_reference": "kernel-default-devel-4.12.14-197.99.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-4.12.14-197.99.1.noarch as component of SUSE Linux Enterprise Server 15 SP1-BCL",
"product_id": "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.99.1.noarch"
},
"product_reference": "kernel-devel-4.12.14-197.99.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-docs-4.12.14-197.99.1.noarch as component of SUSE Linux Enterprise Server 15 SP1-BCL",
"product_id": "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.99.1.noarch"
},
"product_reference": "kernel-docs-4.12.14-197.99.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-4.12.14-197.99.1.noarch as component of SUSE Linux Enterprise Server 15 SP1-BCL",
"product_id": "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.99.1.noarch"
},
"product_reference": "kernel-macros-4.12.14-197.99.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.12.14-197.99.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-BCL",
"product_id": "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.99.1.x86_64"
},
"product_reference": "kernel-obs-build-4.12.14-197.99.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-4.12.14-197.99.1.noarch as component of SUSE Linux Enterprise Server 15 SP1-BCL",
"product_id": "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.99.1.noarch"
},
"product_reference": "kernel-source-4.12.14-197.99.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-197.99.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-BCL",
"product_id": "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.99.1.x86_64"
},
"product_reference": "kernel-syms-4.12.14-197.99.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-4.12.14-197.99.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-BCL",
"product_id": "SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.99.1.x86_64"
},
"product_reference": "reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-197.99.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.aarch64"
},
"product_reference": "kernel-default-4.12.14-197.99.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-197.99.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.ppc64le"
},
"product_reference": "kernel-default-4.12.14-197.99.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-197.99.1.s390x as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.s390x"
},
"product_reference": "kernel-default-4.12.14-197.99.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-197.99.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.x86_64"
},
"product_reference": "kernel-default-4.12.14-197.99.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-197.99.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.aarch64"
},
"product_reference": "kernel-default-base-4.12.14-197.99.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-197.99.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.ppc64le"
},
"product_reference": "kernel-default-base-4.12.14-197.99.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-197.99.1.s390x as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.s390x"
},
"product_reference": "kernel-default-base-4.12.14-197.99.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-197.99.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.x86_64"
},
"product_reference": "kernel-default-base-4.12.14-197.99.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-197.99.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.aarch64"
},
"product_reference": "kernel-default-devel-4.12.14-197.99.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-197.99.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.ppc64le"
},
"product_reference": "kernel-default-devel-4.12.14-197.99.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-197.99.1.s390x as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.s390x"
},
"product_reference": "kernel-default-devel-4.12.14-197.99.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-197.99.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.x86_64"
},
"product_reference": "kernel-default-devel-4.12.14-197.99.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-man-4.12.14-197.99.1.s390x as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.99.1.s390x"
},
"product_reference": "kernel-default-man-4.12.14-197.99.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-4.12.14-197.99.1.noarch as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.99.1.noarch"
},
"product_reference": "kernel-devel-4.12.14-197.99.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-docs-4.12.14-197.99.1.noarch as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.99.1.noarch"
},
"product_reference": "kernel-docs-4.12.14-197.99.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-4.12.14-197.99.1.noarch as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.99.1.noarch"
},
"product_reference": "kernel-macros-4.12.14-197.99.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.12.14-197.99.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.aarch64"
},
"product_reference": "kernel-obs-build-4.12.14-197.99.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.12.14-197.99.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.ppc64le"
},
"product_reference": "kernel-obs-build-4.12.14-197.99.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.12.14-197.99.1.s390x as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.s390x"
},
"product_reference": "kernel-obs-build-4.12.14-197.99.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.12.14-197.99.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.x86_64"
},
"product_reference": "kernel-obs-build-4.12.14-197.99.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-4.12.14-197.99.1.noarch as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.99.1.noarch"
},
"product_reference": "kernel-source-4.12.14-197.99.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-197.99.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.aarch64"
},
"product_reference": "kernel-syms-4.12.14-197.99.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-197.99.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.ppc64le"
},
"product_reference": "kernel-syms-4.12.14-197.99.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-197.99.1.s390x as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.s390x"
},
"product_reference": "kernel-syms-4.12.14-197.99.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-197.99.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.x86_64"
},
"product_reference": "kernel-syms-4.12.14-197.99.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-4.12.14-197.99.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.aarch64"
},
"product_reference": "reiserfs-kmp-default-4.12.14-197.99.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-4.12.14-197.99.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.ppc64le"
},
"product_reference": "reiserfs-kmp-default-4.12.14-197.99.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-4.12.14-197.99.1.s390x as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.s390x"
},
"product_reference": "reiserfs-kmp-default-4.12.14-197.99.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-4.12.14-197.99.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.x86_64"
},
"product_reference": "reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-197.99.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.99.1.ppc64le"
},
"product_reference": "kernel-default-4.12.14-197.99.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-197.99.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.99.1.x86_64"
},
"product_reference": "kernel-default-4.12.14-197.99.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-197.99.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.99.1.ppc64le"
},
"product_reference": "kernel-default-base-4.12.14-197.99.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-197.99.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.99.1.x86_64"
},
"product_reference": "kernel-default-base-4.12.14-197.99.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-197.99.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.99.1.ppc64le"
},
"product_reference": "kernel-default-devel-4.12.14-197.99.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-197.99.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.99.1.x86_64"
},
"product_reference": "kernel-default-devel-4.12.14-197.99.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-4.12.14-197.99.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.99.1.noarch"
},
"product_reference": "kernel-devel-4.12.14-197.99.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-docs-4.12.14-197.99.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.99.1.noarch"
},
"product_reference": "kernel-docs-4.12.14-197.99.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-4.12.14-197.99.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.99.1.noarch"
},
"product_reference": "kernel-macros-4.12.14-197.99.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.12.14-197.99.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.99.1.ppc64le"
},
"product_reference": "kernel-obs-build-4.12.14-197.99.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.12.14-197.99.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.99.1.x86_64"
},
"product_reference": "kernel-obs-build-4.12.14-197.99.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-4.12.14-197.99.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.99.1.noarch"
},
"product_reference": "kernel-source-4.12.14-197.99.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-197.99.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.99.1.ppc64le"
},
"product_reference": "kernel-syms-4.12.14-197.99.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-197.99.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.99.1.x86_64"
},
"product_reference": "kernel-syms-4.12.14-197.99.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-4.12.14-197.99.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.99.1.ppc64le"
},
"product_reference": "reiserfs-kmp-default-4.12.14-197.99.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-4.12.14-197.99.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.99.1.x86_64"
},
"product_reference": "reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-197.99.1.x86_64 as component of SUSE Manager Proxy 4.0",
"product_id": "SUSE Manager Proxy 4.0:kernel-default-4.12.14-197.99.1.x86_64"
},
"product_reference": "kernel-default-4.12.14-197.99.1.x86_64",
"relates_to_product_reference": "SUSE Manager Proxy 4.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-197.99.1.x86_64 as component of SUSE Manager Proxy 4.0",
"product_id": "SUSE Manager Proxy 4.0:kernel-default-base-4.12.14-197.99.1.x86_64"
},
"product_reference": "kernel-default-base-4.12.14-197.99.1.x86_64",
"relates_to_product_reference": "SUSE Manager Proxy 4.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-197.99.1.x86_64 as component of SUSE Manager Proxy 4.0",
"product_id": "SUSE Manager Proxy 4.0:kernel-default-devel-4.12.14-197.99.1.x86_64"
},
"product_reference": "kernel-default-devel-4.12.14-197.99.1.x86_64",
"relates_to_product_reference": "SUSE Manager Proxy 4.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-4.12.14-197.99.1.noarch as component of SUSE Manager Proxy 4.0",
"product_id": "SUSE Manager Proxy 4.0:kernel-devel-4.12.14-197.99.1.noarch"
},
"product_reference": "kernel-devel-4.12.14-197.99.1.noarch",
"relates_to_product_reference": "SUSE Manager Proxy 4.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-docs-4.12.14-197.99.1.noarch as component of SUSE Manager Proxy 4.0",
"product_id": "SUSE Manager Proxy 4.0:kernel-docs-4.12.14-197.99.1.noarch"
},
"product_reference": "kernel-docs-4.12.14-197.99.1.noarch",
"relates_to_product_reference": "SUSE Manager Proxy 4.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-4.12.14-197.99.1.noarch as component of SUSE Manager Proxy 4.0",
"product_id": "SUSE Manager Proxy 4.0:kernel-macros-4.12.14-197.99.1.noarch"
},
"product_reference": "kernel-macros-4.12.14-197.99.1.noarch",
"relates_to_product_reference": "SUSE Manager Proxy 4.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.12.14-197.99.1.x86_64 as component of SUSE Manager Proxy 4.0",
"product_id": "SUSE Manager Proxy 4.0:kernel-obs-build-4.12.14-197.99.1.x86_64"
},
"product_reference": "kernel-obs-build-4.12.14-197.99.1.x86_64",
"relates_to_product_reference": "SUSE Manager Proxy 4.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-4.12.14-197.99.1.noarch as component of SUSE Manager Proxy 4.0",
"product_id": "SUSE Manager Proxy 4.0:kernel-source-4.12.14-197.99.1.noarch"
},
"product_reference": "kernel-source-4.12.14-197.99.1.noarch",
"relates_to_product_reference": "SUSE Manager Proxy 4.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-197.99.1.x86_64 as component of SUSE Manager Proxy 4.0",
"product_id": "SUSE Manager Proxy 4.0:kernel-syms-4.12.14-197.99.1.x86_64"
},
"product_reference": "kernel-syms-4.12.14-197.99.1.x86_64",
"relates_to_product_reference": "SUSE Manager Proxy 4.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-4.12.14-197.99.1.x86_64 as component of SUSE Manager Proxy 4.0",
"product_id": "SUSE Manager Proxy 4.0:reiserfs-kmp-default-4.12.14-197.99.1.x86_64"
},
"product_reference": "reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"relates_to_product_reference": "SUSE Manager Proxy 4.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-197.99.1.x86_64 as component of SUSE Manager Retail Branch Server 4.0",
"product_id": "SUSE Manager Retail Branch Server 4.0:kernel-default-4.12.14-197.99.1.x86_64"
},
"product_reference": "kernel-default-4.12.14-197.99.1.x86_64",
"relates_to_product_reference": "SUSE Manager Retail Branch Server 4.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-197.99.1.x86_64 as component of SUSE Manager Retail Branch Server 4.0",
"product_id": "SUSE Manager Retail Branch Server 4.0:kernel-default-base-4.12.14-197.99.1.x86_64"
},
"product_reference": "kernel-default-base-4.12.14-197.99.1.x86_64",
"relates_to_product_reference": "SUSE Manager Retail Branch Server 4.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-197.99.1.x86_64 as component of SUSE Manager Retail Branch Server 4.0",
"product_id": "SUSE Manager Retail Branch Server 4.0:kernel-default-devel-4.12.14-197.99.1.x86_64"
},
"product_reference": "kernel-default-devel-4.12.14-197.99.1.x86_64",
"relates_to_product_reference": "SUSE Manager Retail Branch Server 4.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-4.12.14-197.99.1.noarch as component of SUSE Manager Retail Branch Server 4.0",
"product_id": "SUSE Manager Retail Branch Server 4.0:kernel-devel-4.12.14-197.99.1.noarch"
},
"product_reference": "kernel-devel-4.12.14-197.99.1.noarch",
"relates_to_product_reference": "SUSE Manager Retail Branch Server 4.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-docs-4.12.14-197.99.1.noarch as component of SUSE Manager Retail Branch Server 4.0",
"product_id": "SUSE Manager Retail Branch Server 4.0:kernel-docs-4.12.14-197.99.1.noarch"
},
"product_reference": "kernel-docs-4.12.14-197.99.1.noarch",
"relates_to_product_reference": "SUSE Manager Retail Branch Server 4.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-4.12.14-197.99.1.noarch as component of SUSE Manager Retail Branch Server 4.0",
"product_id": "SUSE Manager Retail Branch Server 4.0:kernel-macros-4.12.14-197.99.1.noarch"
},
"product_reference": "kernel-macros-4.12.14-197.99.1.noarch",
"relates_to_product_reference": "SUSE Manager Retail Branch Server 4.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.12.14-197.99.1.x86_64 as component of SUSE Manager Retail Branch Server 4.0",
"product_id": "SUSE Manager Retail Branch Server 4.0:kernel-obs-build-4.12.14-197.99.1.x86_64"
},
"product_reference": "kernel-obs-build-4.12.14-197.99.1.x86_64",
"relates_to_product_reference": "SUSE Manager Retail Branch Server 4.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-4.12.14-197.99.1.noarch as component of SUSE Manager Retail Branch Server 4.0",
"product_id": "SUSE Manager Retail Branch Server 4.0:kernel-source-4.12.14-197.99.1.noarch"
},
"product_reference": "kernel-source-4.12.14-197.99.1.noarch",
"relates_to_product_reference": "SUSE Manager Retail Branch Server 4.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-197.99.1.x86_64 as component of SUSE Manager Retail Branch Server 4.0",
"product_id": "SUSE Manager Retail Branch Server 4.0:kernel-syms-4.12.14-197.99.1.x86_64"
},
"product_reference": "kernel-syms-4.12.14-197.99.1.x86_64",
"relates_to_product_reference": "SUSE Manager Retail Branch Server 4.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-4.12.14-197.99.1.x86_64 as component of SUSE Manager Retail Branch Server 4.0",
"product_id": "SUSE Manager Retail Branch Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.x86_64"
},
"product_reference": "reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"relates_to_product_reference": "SUSE Manager Retail Branch Server 4.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-197.99.1.ppc64le as component of SUSE Manager Server 4.0",
"product_id": "SUSE Manager Server 4.0:kernel-default-4.12.14-197.99.1.ppc64le"
},
"product_reference": "kernel-default-4.12.14-197.99.1.ppc64le",
"relates_to_product_reference": "SUSE Manager Server 4.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-197.99.1.s390x as component of SUSE Manager Server 4.0",
"product_id": "SUSE Manager Server 4.0:kernel-default-4.12.14-197.99.1.s390x"
},
"product_reference": "kernel-default-4.12.14-197.99.1.s390x",
"relates_to_product_reference": "SUSE Manager Server 4.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-197.99.1.x86_64 as component of SUSE Manager Server 4.0",
"product_id": "SUSE Manager Server 4.0:kernel-default-4.12.14-197.99.1.x86_64"
},
"product_reference": "kernel-default-4.12.14-197.99.1.x86_64",
"relates_to_product_reference": "SUSE Manager Server 4.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-197.99.1.ppc64le as component of SUSE Manager Server 4.0",
"product_id": "SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.99.1.ppc64le"
},
"product_reference": "kernel-default-base-4.12.14-197.99.1.ppc64le",
"relates_to_product_reference": "SUSE Manager Server 4.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-197.99.1.s390x as component of SUSE Manager Server 4.0",
"product_id": "SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.99.1.s390x"
},
"product_reference": "kernel-default-base-4.12.14-197.99.1.s390x",
"relates_to_product_reference": "SUSE Manager Server 4.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-197.99.1.x86_64 as component of SUSE Manager Server 4.0",
"product_id": "SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.99.1.x86_64"
},
"product_reference": "kernel-default-base-4.12.14-197.99.1.x86_64",
"relates_to_product_reference": "SUSE Manager Server 4.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-197.99.1.ppc64le as component of SUSE Manager Server 4.0",
"product_id": "SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.99.1.ppc64le"
},
"product_reference": "kernel-default-devel-4.12.14-197.99.1.ppc64le",
"relates_to_product_reference": "SUSE Manager Server 4.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-197.99.1.s390x as component of SUSE Manager Server 4.0",
"product_id": "SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.99.1.s390x"
},
"product_reference": "kernel-default-devel-4.12.14-197.99.1.s390x",
"relates_to_product_reference": "SUSE Manager Server 4.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-197.99.1.x86_64 as component of SUSE Manager Server 4.0",
"product_id": "SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.99.1.x86_64"
},
"product_reference": "kernel-default-devel-4.12.14-197.99.1.x86_64",
"relates_to_product_reference": "SUSE Manager Server 4.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-man-4.12.14-197.99.1.s390x as component of SUSE Manager Server 4.0",
"product_id": "SUSE Manager Server 4.0:kernel-default-man-4.12.14-197.99.1.s390x"
},
"product_reference": "kernel-default-man-4.12.14-197.99.1.s390x",
"relates_to_product_reference": "SUSE Manager Server 4.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-4.12.14-197.99.1.noarch as component of SUSE Manager Server 4.0",
"product_id": "SUSE Manager Server 4.0:kernel-devel-4.12.14-197.99.1.noarch"
},
"product_reference": "kernel-devel-4.12.14-197.99.1.noarch",
"relates_to_product_reference": "SUSE Manager Server 4.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-docs-4.12.14-197.99.1.noarch as component of SUSE Manager Server 4.0",
"product_id": "SUSE Manager Server 4.0:kernel-docs-4.12.14-197.99.1.noarch"
},
"product_reference": "kernel-docs-4.12.14-197.99.1.noarch",
"relates_to_product_reference": "SUSE Manager Server 4.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-4.12.14-197.99.1.noarch as component of SUSE Manager Server 4.0",
"product_id": "SUSE Manager Server 4.0:kernel-macros-4.12.14-197.99.1.noarch"
},
"product_reference": "kernel-macros-4.12.14-197.99.1.noarch",
"relates_to_product_reference": "SUSE Manager Server 4.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.12.14-197.99.1.ppc64le as component of SUSE Manager Server 4.0",
"product_id": "SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.99.1.ppc64le"
},
"product_reference": "kernel-obs-build-4.12.14-197.99.1.ppc64le",
"relates_to_product_reference": "SUSE Manager Server 4.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.12.14-197.99.1.s390x as component of SUSE Manager Server 4.0",
"product_id": "SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.99.1.s390x"
},
"product_reference": "kernel-obs-build-4.12.14-197.99.1.s390x",
"relates_to_product_reference": "SUSE Manager Server 4.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.12.14-197.99.1.x86_64 as component of SUSE Manager Server 4.0",
"product_id": "SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.99.1.x86_64"
},
"product_reference": "kernel-obs-build-4.12.14-197.99.1.x86_64",
"relates_to_product_reference": "SUSE Manager Server 4.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-4.12.14-197.99.1.noarch as component of SUSE Manager Server 4.0",
"product_id": "SUSE Manager Server 4.0:kernel-source-4.12.14-197.99.1.noarch"
},
"product_reference": "kernel-source-4.12.14-197.99.1.noarch",
"relates_to_product_reference": "SUSE Manager Server 4.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-197.99.1.ppc64le as component of SUSE Manager Server 4.0",
"product_id": "SUSE Manager Server 4.0:kernel-syms-4.12.14-197.99.1.ppc64le"
},
"product_reference": "kernel-syms-4.12.14-197.99.1.ppc64le",
"relates_to_product_reference": "SUSE Manager Server 4.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-197.99.1.s390x as component of SUSE Manager Server 4.0",
"product_id": "SUSE Manager Server 4.0:kernel-syms-4.12.14-197.99.1.s390x"
},
"product_reference": "kernel-syms-4.12.14-197.99.1.s390x",
"relates_to_product_reference": "SUSE Manager Server 4.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-197.99.1.x86_64 as component of SUSE Manager Server 4.0",
"product_id": "SUSE Manager Server 4.0:kernel-syms-4.12.14-197.99.1.x86_64"
},
"product_reference": "kernel-syms-4.12.14-197.99.1.x86_64",
"relates_to_product_reference": "SUSE Manager Server 4.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-4.12.14-197.99.1.ppc64le as component of SUSE Manager Server 4.0",
"product_id": "SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.ppc64le"
},
"product_reference": "reiserfs-kmp-default-4.12.14-197.99.1.ppc64le",
"relates_to_product_reference": "SUSE Manager Server 4.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-4.12.14-197.99.1.s390x as component of SUSE Manager Server 4.0",
"product_id": "SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.s390x"
},
"product_reference": "reiserfs-kmp-default-4.12.14-197.99.1.s390x",
"relates_to_product_reference": "SUSE Manager Server 4.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-4.12.14-197.99.1.x86_64 as component of SUSE Manager Server 4.0",
"product_id": "SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.x86_64"
},
"product_reference": "reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"relates_to_product_reference": "SUSE Manager Server 4.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-197.99.1.aarch64 as component of SUSE Enterprise Storage 6",
"product_id": "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.99.1.aarch64"
},
"product_reference": "kernel-default-4.12.14-197.99.1.aarch64",
"relates_to_product_reference": "SUSE Enterprise Storage 6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-197.99.1.x86_64 as component of SUSE Enterprise Storage 6",
"product_id": "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.99.1.x86_64"
},
"product_reference": "kernel-default-4.12.14-197.99.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-197.99.1.aarch64 as component of SUSE Enterprise Storage 6",
"product_id": "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.99.1.aarch64"
},
"product_reference": "kernel-default-base-4.12.14-197.99.1.aarch64",
"relates_to_product_reference": "SUSE Enterprise Storage 6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-197.99.1.x86_64 as component of SUSE Enterprise Storage 6",
"product_id": "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.99.1.x86_64"
},
"product_reference": "kernel-default-base-4.12.14-197.99.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-197.99.1.aarch64 as component of SUSE Enterprise Storage 6",
"product_id": "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.99.1.aarch64"
},
"product_reference": "kernel-default-devel-4.12.14-197.99.1.aarch64",
"relates_to_product_reference": "SUSE Enterprise Storage 6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-197.99.1.x86_64 as component of SUSE Enterprise Storage 6",
"product_id": "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.99.1.x86_64"
},
"product_reference": "kernel-default-devel-4.12.14-197.99.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-4.12.14-197.99.1.noarch as component of SUSE Enterprise Storage 6",
"product_id": "SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.99.1.noarch"
},
"product_reference": "kernel-devel-4.12.14-197.99.1.noarch",
"relates_to_product_reference": "SUSE Enterprise Storage 6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-docs-4.12.14-197.99.1.noarch as component of SUSE Enterprise Storage 6",
"product_id": "SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.99.1.noarch"
},
"product_reference": "kernel-docs-4.12.14-197.99.1.noarch",
"relates_to_product_reference": "SUSE Enterprise Storage 6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-4.12.14-197.99.1.noarch as component of SUSE Enterprise Storage 6",
"product_id": "SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.99.1.noarch"
},
"product_reference": "kernel-macros-4.12.14-197.99.1.noarch",
"relates_to_product_reference": "SUSE Enterprise Storage 6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.12.14-197.99.1.aarch64 as component of SUSE Enterprise Storage 6",
"product_id": "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.99.1.aarch64"
},
"product_reference": "kernel-obs-build-4.12.14-197.99.1.aarch64",
"relates_to_product_reference": "SUSE Enterprise Storage 6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.12.14-197.99.1.x86_64 as component of SUSE Enterprise Storage 6",
"product_id": "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.99.1.x86_64"
},
"product_reference": "kernel-obs-build-4.12.14-197.99.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-4.12.14-197.99.1.noarch as component of SUSE Enterprise Storage 6",
"product_id": "SUSE Enterprise Storage 6:kernel-source-4.12.14-197.99.1.noarch"
},
"product_reference": "kernel-source-4.12.14-197.99.1.noarch",
"relates_to_product_reference": "SUSE Enterprise Storage 6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-197.99.1.aarch64 as component of SUSE Enterprise Storage 6",
"product_id": "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.99.1.aarch64"
},
"product_reference": "kernel-syms-4.12.14-197.99.1.aarch64",
"relates_to_product_reference": "SUSE Enterprise Storage 6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-197.99.1.x86_64 as component of SUSE Enterprise Storage 6",
"product_id": "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.99.1.x86_64"
},
"product_reference": "kernel-syms-4.12.14-197.99.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-4.12.14-197.99.1.aarch64 as component of SUSE Enterprise Storage 6",
"product_id": "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.99.1.aarch64"
},
"product_reference": "reiserfs-kmp-default-4.12.14-197.99.1.aarch64",
"relates_to_product_reference": "SUSE Enterprise Storage 6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-4.12.14-197.99.1.x86_64 as component of SUSE Enterprise Storage 6",
"product_id": "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.99.1.x86_64"
},
"product_reference": "reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 6"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2020-24588",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-24588"
}
],
"notes": [
{
"category": "general",
"text": "The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn\u0027t require that the A-MSDU flag in the plaintext QoS header field is authenticated. Against devices that support receiving non-SSP A-MSDU frames (which is mandatory as part of 802.11n), an adversary can abuse this to inject arbitrary network packets.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_99-default-1-3.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_99-default-1-3.3.3.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-man-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-24588",
"url": "https://www.suse.com/security/cve/CVE-2020-24588"
},
{
"category": "external",
"summary": "SUSE Bug 1185861 for CVE-2020-24588",
"url": "https://bugzilla.suse.com/1185861"
},
{
"category": "external",
"summary": "SUSE Bug 1192868 for CVE-2020-24588",
"url": "https://bugzilla.suse.com/1192868"
},
{
"category": "external",
"summary": "SUSE Bug 1199701 for CVE-2020-24588",
"url": "https://bugzilla.suse.com/1199701"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_99-default-1-3.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_99-default-1-3.3.3.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-man-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_99-default-1-3.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_99-default-1-3.3.3.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-man-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-21T09:29:05Z",
"details": "moderate"
}
],
"title": "CVE-2020-24588"
},
{
"cve": "CVE-2020-26558",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-26558"
}
],
"notes": [
{
"category": "general",
"text": "Bluetooth LE and BR/EDR secure pairing in Bluetooth Core Specification 2.1 through 5.2 may permit a nearby man-in-the-middle attacker to identify the Passkey used during pairing (in the Passkey authentication procedure) by reflection of the public key and the authentication evidence of the initiating device, potentially permitting this attacker to complete authenticated pairing with the responding device using the correct Passkey for the pairing session. The attack methodology determines the Passkey value one bit at a time.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_99-default-1-3.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_99-default-1-3.3.3.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-man-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-26558",
"url": "https://www.suse.com/security/cve/CVE-2020-26558"
},
{
"category": "external",
"summary": "SUSE Bug 1179610 for CVE-2020-26558",
"url": "https://bugzilla.suse.com/1179610"
},
{
"category": "external",
"summary": "SUSE Bug 1186463 for CVE-2020-26558",
"url": "https://bugzilla.suse.com/1186463"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_99-default-1-3.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_99-default-1-3.3.3.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-man-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_99-default-1-3.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_99-default-1-3.3.3.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-man-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-21T09:29:05Z",
"details": "moderate"
}
],
"title": "CVE-2020-26558"
},
{
"cve": "CVE-2020-36385",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-36385"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel before 5.10. drivers/infiniband/core/ucma.c has a use-after-free because the ctx is reached via the ctx_list in some ucma_migrate_id situations where ucma_close is called, aka CID-f5449e74802c.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_99-default-1-3.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_99-default-1-3.3.3.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-man-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-36385",
"url": "https://www.suse.com/security/cve/CVE-2020-36385"
},
{
"category": "external",
"summary": "SUSE Bug 1187050 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1187050"
},
{
"category": "external",
"summary": "SUSE Bug 1187052 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1187052"
},
{
"category": "external",
"summary": "SUSE Bug 1189302 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1189302"
},
{
"category": "external",
"summary": "SUSE Bug 1196174 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1196174"
},
{
"category": "external",
"summary": "SUSE Bug 1196810 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1196810"
},
{
"category": "external",
"summary": "SUSE Bug 1196914 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1196914"
},
{
"category": "external",
"summary": "SUSE Bug 1200084 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1200084"
},
{
"category": "external",
"summary": "SUSE Bug 1201734 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1201734"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_99-default-1-3.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_99-default-1-3.3.3.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-man-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_99-default-1-3.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_99-default-1-3.3.3.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-man-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-21T09:29:05Z",
"details": "important"
}
],
"title": "CVE-2020-36385"
},
{
"cve": "CVE-2020-36386",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-36386"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel before 5.8.1. net/bluetooth/hci_event.c has a slab out-of-bounds read in hci_extended_inquiry_result_evt, aka CID-51c19bf3d5cf.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_99-default-1-3.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_99-default-1-3.3.3.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-man-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-36386",
"url": "https://www.suse.com/security/cve/CVE-2020-36386"
},
{
"category": "external",
"summary": "SUSE Bug 1187038 for CVE-2020-36386",
"url": "https://bugzilla.suse.com/1187038"
},
{
"category": "external",
"summary": "SUSE Bug 1192868 for CVE-2020-36386",
"url": "https://bugzilla.suse.com/1192868"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_99-default-1-3.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_99-default-1-3.3.3.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-man-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_99-default-1-3.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_99-default-1-3.3.3.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-man-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-21T09:29:05Z",
"details": "moderate"
}
],
"title": "CVE-2020-36386"
},
{
"cve": "CVE-2021-0129",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-0129"
}
],
"notes": [
{
"category": "general",
"text": "Improper access control in BlueZ may allow an authenticated user to potentially enable information disclosure via adjacent access.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_99-default-1-3.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_99-default-1-3.3.3.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-man-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-0129",
"url": "https://www.suse.com/security/cve/CVE-2021-0129"
},
{
"category": "external",
"summary": "SUSE Bug 1186463 for CVE-2021-0129",
"url": "https://bugzilla.suse.com/1186463"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_99-default-1-3.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_99-default-1-3.3.3.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-man-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_99-default-1-3.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_99-default-1-3.3.3.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-man-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-21T09:29:05Z",
"details": "moderate"
}
],
"title": "CVE-2021-0129"
},
{
"cve": "CVE-2021-0512",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-0512"
}
],
"notes": [
{
"category": "general",
"text": "In __hidinput_change_resolution_multipliers of hid-input.c, there is a possible out of bounds write due to a heap buffer overflow. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-173843328References: Upstream kernel",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_99-default-1-3.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_99-default-1-3.3.3.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-man-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-0512",
"url": "https://www.suse.com/security/cve/CVE-2021-0512"
},
{
"category": "external",
"summary": "SUSE Bug 1187595 for CVE-2021-0512",
"url": "https://bugzilla.suse.com/1187595"
},
{
"category": "external",
"summary": "SUSE Bug 1187597 for CVE-2021-0512",
"url": "https://bugzilla.suse.com/1187597"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_99-default-1-3.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_99-default-1-3.3.3.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-man-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_99-default-1-3.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_99-default-1-3.3.3.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-man-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-21T09:29:05Z",
"details": "important"
}
],
"title": "CVE-2021-0512"
},
{
"cve": "CVE-2021-0605",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-0605"
}
],
"notes": [
{
"category": "general",
"text": "In pfkey_dump of af_key.c, there is a possible out-of-bounds read due to a missing bounds check. This could lead to local information disclosure in the kernel with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-110373476",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_99-default-1-3.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_99-default-1-3.3.3.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-man-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-0605",
"url": "https://www.suse.com/security/cve/CVE-2021-0605"
},
{
"category": "external",
"summary": "SUSE Bug 1187601 for CVE-2021-0605",
"url": "https://bugzilla.suse.com/1187601"
},
{
"category": "external",
"summary": "SUSE Bug 1187687 for CVE-2021-0605",
"url": "https://bugzilla.suse.com/1187687"
},
{
"category": "external",
"summary": "SUSE Bug 1188381 for CVE-2021-0605",
"url": "https://bugzilla.suse.com/1188381"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_99-default-1-3.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_99-default-1-3.3.3.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-man-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_99-default-1-3.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_99-default-1-3.3.3.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-man-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-21T09:29:05Z",
"details": "important"
}
],
"title": "CVE-2021-0605"
},
{
"cve": "CVE-2021-22555",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-22555"
}
],
"notes": [
{
"category": "general",
"text": "A heap out-of-bounds write affecting Linux since v2.6.19-rc1 was discovered in net/netfilter/x_tables.c. This allows an attacker to gain privileges or cause a DoS (via heap memory corruption) through user name space",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_99-default-1-3.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_99-default-1-3.3.3.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-man-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-22555",
"url": "https://www.suse.com/security/cve/CVE-2021-22555"
},
{
"category": "external",
"summary": "SUSE Bug 1188116 for CVE-2021-22555",
"url": "https://bugzilla.suse.com/1188116"
},
{
"category": "external",
"summary": "SUSE Bug 1188117 for CVE-2021-22555",
"url": "https://bugzilla.suse.com/1188117"
},
{
"category": "external",
"summary": "SUSE Bug 1188411 for CVE-2021-22555",
"url": "https://bugzilla.suse.com/1188411"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_99-default-1-3.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_99-default-1-3.3.3.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-man-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_99-default-1-3.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_99-default-1-3.3.3.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-man-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-21T09:29:05Z",
"details": "important"
}
],
"title": "CVE-2021-22555"
},
{
"cve": "CVE-2021-33200",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-33200"
}
],
"notes": [
{
"category": "general",
"text": "kernel/bpf/verifier.c in the Linux kernel through 5.12.7 enforces incorrect limits for pointer arithmetic operations, aka CID-bb01a1bba579. This can be abused to perform out-of-bounds reads and writes in kernel memory, leading to local privilege escalation to root. In particular, there is a corner case where the off reg causes a masking direction change, which then results in an incorrect final aux-\u003ealu_limit.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_99-default-1-3.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_99-default-1-3.3.3.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-man-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-33200",
"url": "https://www.suse.com/security/cve/CVE-2021-33200"
},
{
"category": "external",
"summary": "SUSE Bug 1186484 for CVE-2021-33200",
"url": "https://bugzilla.suse.com/1186484"
},
{
"category": "external",
"summary": "SUSE Bug 1186498 for CVE-2021-33200",
"url": "https://bugzilla.suse.com/1186498"
},
{
"category": "external",
"summary": "SUSE Bug 1224878 for CVE-2021-33200",
"url": "https://bugzilla.suse.com/1224878"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_99-default-1-3.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_99-default-1-3.3.3.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-man-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_99-default-1-3.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_99-default-1-3.3.3.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-man-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-21T09:29:05Z",
"details": "important"
}
],
"title": "CVE-2021-33200"
},
{
"cve": "CVE-2021-33624",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-33624"
}
],
"notes": [
{
"category": "general",
"text": "In kernel/bpf/verifier.c in the Linux kernel before 5.12.13, a branch can be mispredicted (e.g., because of type confusion) and consequently an unprivileged BPF program can read arbitrary memory locations via a side-channel attack, aka CID-9183671af6db.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_99-default-1-3.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_99-default-1-3.3.3.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-man-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-33624",
"url": "https://www.suse.com/security/cve/CVE-2021-33624"
},
{
"category": "external",
"summary": "SUSE Bug 1187554 for CVE-2021-33624",
"url": "https://bugzilla.suse.com/1187554"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_99-default-1-3.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_99-default-1-3.3.3.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-man-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_99-default-1-3.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_99-default-1-3.3.3.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-man-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-21T09:29:05Z",
"details": "moderate"
}
],
"title": "CVE-2021-33624"
},
{
"cve": "CVE-2021-33909",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-33909"
}
],
"notes": [
{
"category": "general",
"text": "fs/seq_file.c in the Linux kernel 3.16 through 5.13.x before 5.13.4 does not properly restrict seq buffer allocations, leading to an integer overflow, an Out-of-bounds Write, and escalation to root by an unprivileged user, aka CID-8cae8cd89f05.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_99-default-1-3.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_99-default-1-3.3.3.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-man-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-33909",
"url": "https://www.suse.com/security/cve/CVE-2021-33909"
},
{
"category": "external",
"summary": "SUSE Bug 1188062 for CVE-2021-33909",
"url": "https://bugzilla.suse.com/1188062"
},
{
"category": "external",
"summary": "SUSE Bug 1188063 for CVE-2021-33909",
"url": "https://bugzilla.suse.com/1188063"
},
{
"category": "external",
"summary": "SUSE Bug 1188257 for CVE-2021-33909",
"url": "https://bugzilla.suse.com/1188257"
},
{
"category": "external",
"summary": "SUSE Bug 1189302 for CVE-2021-33909",
"url": "https://bugzilla.suse.com/1189302"
},
{
"category": "external",
"summary": "SUSE Bug 1190859 for CVE-2021-33909",
"url": "https://bugzilla.suse.com/1190859"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_99-default-1-3.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_99-default-1-3.3.3.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-man-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_99-default-1-3.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_99-default-1-3.3.3.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-man-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-21T09:29:05Z",
"details": "important"
}
],
"title": "CVE-2021-33909"
},
{
"cve": "CVE-2021-34693",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-34693"
}
],
"notes": [
{
"category": "general",
"text": "net/can/bcm.c in the Linux kernel through 5.12.10 allows local users to obtain sensitive information from kernel stack memory because parts of a data structure are uninitialized.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_99-default-1-3.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_99-default-1-3.3.3.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-man-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-34693",
"url": "https://www.suse.com/security/cve/CVE-2021-34693"
},
{
"category": "external",
"summary": "SUSE Bug 1187452 for CVE-2021-34693",
"url": "https://bugzilla.suse.com/1187452"
},
{
"category": "external",
"summary": "SUSE Bug 1192868 for CVE-2021-34693",
"url": "https://bugzilla.suse.com/1192868"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_99-default-1-3.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_99-default-1-3.3.3.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-man-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_99-default-1-3.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_99-default-1-3.3.3.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-man-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-21T09:29:05Z",
"details": "moderate"
}
],
"title": "CVE-2021-34693"
},
{
"cve": "CVE-2021-3609",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3609"
}
],
"notes": [
{
"category": "general",
"text": ".A flaw was found in the CAN BCM networking protocol in the Linux kernel, where a local attacker can abuse a flaw in the CAN subsystem to corrupt memory, crash the system or escalate privileges. This race condition in net/can/bcm.c in the Linux kernel allows for local privilege escalation to root.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_99-default-1-3.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_99-default-1-3.3.3.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-man-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3609",
"url": "https://www.suse.com/security/cve/CVE-2021-3609"
},
{
"category": "external",
"summary": "SUSE Bug 1187215 for CVE-2021-3609",
"url": "https://bugzilla.suse.com/1187215"
},
{
"category": "external",
"summary": "SUSE Bug 1188323 for CVE-2021-3609",
"url": "https://bugzilla.suse.com/1188323"
},
{
"category": "external",
"summary": "SUSE Bug 1188720 for CVE-2021-3609",
"url": "https://bugzilla.suse.com/1188720"
},
{
"category": "external",
"summary": "SUSE Bug 1190276 for CVE-2021-3609",
"url": "https://bugzilla.suse.com/1190276"
},
{
"category": "external",
"summary": "SUSE Bug 1196810 for CVE-2021-3609",
"url": "https://bugzilla.suse.com/1196810"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_99-default-1-3.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_99-default-1-3.3.3.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-man-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_99-default-1-3.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_99-default-1-3.3.3.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Manager Proxy 4.0:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Manager Proxy 4.0:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-man-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-devel-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-docs-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-macros-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:kernel-source-4.12.14-197.99.1.noarch",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.99.1.x86_64",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.ppc64le",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.s390x",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.99.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-21T09:29:05Z",
"details": "moderate"
}
],
"title": "CVE-2021-3609"
}
]
}
suse-su-2024:2948-1
Vulnerability from csaf_suse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel",
"title": "Title of the patch"
},
{
"category": "description",
"text": "\n\nThe SUSE Linux Enterprise 15 SP3 kernel was updated to receive various security bugfixes.\n\nThe following security bugs were fixed:\n\n- CVE-2020-26558: Fixed a flaw in the Bluetooth LE and BR/EDR secure pairing that could permit a nearby man-in-the-middle attacker to identify the Passkey used during pairing (bsc#1179610).\n- CVE-2021-0129: Improper access control in BlueZ may have allowed an authenticated user to potentially enable information disclosure via adjacent access (bsc#1186463).\n- CVE-2021-47126: ipv6: Fix KASAN: slab-out-of-bounds Read in fib6_nh_flush_exceptions (bsc#1221539).\n- CVE-2021-47219: scsi: scsi_debug: Fix out-of-bound read in resp_report_tgtpgs() (bsc#1222824).\n- CVE-2021-47291: ipv6: fix another slab-out-of-bounds in fib6_nh_flush_exceptions (bsc#1224918).\n- CVE-2021-47506: nfsd: fix use-after-free due to delegation race (bsc#1225404).\n- CVE-2021-47520: can: pch_can: pch_can_rx_normal: fix use after free (bsc#1225431).\n- CVE-2021-47580: scsi: scsi_debug: Fix type in min_t to avoid stack OOB (bsc#1226550).\n- CVE-2021-47598: sch_cake: do not call cake_destroy() from cake_init() (bsc#1226574).\n- CVE-2021-47600: dm btree remove: fix use after free in rebalance_children() (bsc#1226575).\n- CVE-2022-48792: scsi: pm8001: Fix use-after-free for aborted SSP/STP sas_task (bsc#1228013).\n- CVE-2022-48821: misc: fastrpc: avoid double fput() on failed usercopy (bsc#1227976).\n- CVE-2023-52686: Fix a null pointer in opal_event_init() (bsc#1065729).\n- CVE-2023-52885: SUNRPC: Fix UAF in svc_tcp_listen_data_ready() (bsc#1227750).\n- CVE-2024-26585: Fixed race between tx work scheduling and socket close (bsc#1220187).\n- CVE-2024-36974: net/sched: taprio: always validate TCA_TAPRIO_ATTR_PRIOMAP (bsc#1226519).\n- CVE-2024-38559: scsi: qedf: Ensure the copied buf is NUL terminated (bsc#1226785).\n- CVE-2024-39494: ima: Fix use-after-free on a dentry\u0027s dname.name (bsc#1227716).\n- CVE-2024-40937: gve: Clear napi-\u003eskb before dev_kfree_skb_any() (bsc#1227836).\n- CVE-2024-40956: dmaengine: idxd: Fix possible Use-After-Free in irq_process_work_list (bsc#1227810).\n- CVE-2024-41011: drm/amdkfd: do not allow mapping the MMIO HDP page with large pages (bsc#1228114).\n- CVE-2024-41059: hfsplus: fix uninit-value in copy_name (bsc#1228561).\n- CVE-2024-41069: ASoC: topology: Fix route memory corruption (bsc#1228644).\n- CVE-2024-41090: tap: add missing verification for short frame (bsc#1228328).\n- CVE-2024-42145: IB/core: Implement a limit on UMAD receive List (bsc#1228743).\n\nThe following non-security bugs were fixed:\n\n- Fix spurious WARNING caused by a qxl driver patch (bsc#1227213) \n- nfs: Clean up directory array handling (bsc#1226662).\n- nfs: Clean up nfs_readdir_page_filler() (bsc#1226662).\n- nfs: Clean up readdir struct nfs_cache_array (bsc#1226662).\n- nfs: Do not discard readdir results (bsc#1226662).\n- nfs: Do not overfill uncached readdir pages (bsc#1226662).\n- nfs: Do not re-read the entire page cache to find the next cookie (bsc#1226662).\n- nfs: Ensure contents of struct nfs_open_dir_context are consistent (bsc#1226662).\n- nfs: Fix up directory verifier races (bsc#1226662).\n- nfs: Further optimisations for \u0027ls -l\u0027 (bsc#1226662).\n- nfs: More readdir cleanups (bsc#1226662).\n- nfs: Reduce number of RPC calls when doing uncached readdir (bsc#1226662).\n- nfs: Reduce use of uncached readdir (bsc#1226662).\n- nfs: Support larger readdir buffers (bsc#1226662).\n- nfs: Use the 64-bit server readdir cookies when possible (bsc#1226662).\n- nfs: optimise readdir cache page invalidation (bsc#1226662).\n- nfsv4.x: by default serialize open/close operations (bsc#1223863 bsc#1227362)\n- ocfs2: fix DIO failure due to insufficient transaction credits (bsc#1216834).\n- powerpc/rtas: Prevent Spectre v1 gadget construction in sys_rtas() (bsc#1227487).\n- powerpc/rtas: clean up includes (bsc#1227487).\n- x.509: Fix the parser of extended key usage for length (bsc#1218820, bsc#1226666).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2024-2948,SUSE-SLE-Module-Live-Patching-15-SP3-2024-2948,SUSE-SLE-Product-HA-15-SP3-2024-2948,SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-2948,SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-2948,SUSE-SLE-Product-SLES_SAP-15-SP3-2024-2948,SUSE-SUSE-MicroOS-5.1-2024-2948,SUSE-SUSE-MicroOS-5.2-2024-2948,SUSE-Storage-7.1-2024-2948",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2024_2948-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2024:2948-1",
"url": "https://www.suse.com/support/update/announcement/2024/suse-su-20242948-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2024:2948-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-August/019219.html"
},
{
"category": "self",
"summary": "SUSE Bug 1065729",
"url": "https://bugzilla.suse.com/1065729"
},
{
"category": "self",
"summary": "SUSE Bug 1179610",
"url": "https://bugzilla.suse.com/1179610"
},
{
"category": "self",
"summary": "SUSE Bug 1186463",
"url": "https://bugzilla.suse.com/1186463"
},
{
"category": "self",
"summary": "SUSE Bug 1216834",
"url": "https://bugzilla.suse.com/1216834"
},
{
"category": "self",
"summary": "SUSE Bug 1218820",
"url": "https://bugzilla.suse.com/1218820"
},
{
"category": "self",
"summary": "SUSE Bug 1220185",
"url": "https://bugzilla.suse.com/1220185"
},
{
"category": "self",
"summary": "SUSE Bug 1220186",
"url": "https://bugzilla.suse.com/1220186"
},
{
"category": "self",
"summary": "SUSE Bug 1220187",
"url": "https://bugzilla.suse.com/1220187"
},
{
"category": "self",
"summary": "SUSE Bug 1221539",
"url": "https://bugzilla.suse.com/1221539"
},
{
"category": "self",
"summary": "SUSE Bug 1222728",
"url": "https://bugzilla.suse.com/1222728"
},
{
"category": "self",
"summary": "SUSE Bug 1222824",
"url": "https://bugzilla.suse.com/1222824"
},
{
"category": "self",
"summary": "SUSE Bug 1223863",
"url": "https://bugzilla.suse.com/1223863"
},
{
"category": "self",
"summary": "SUSE Bug 1224918",
"url": "https://bugzilla.suse.com/1224918"
},
{
"category": "self",
"summary": "SUSE Bug 1225404",
"url": "https://bugzilla.suse.com/1225404"
},
{
"category": "self",
"summary": "SUSE Bug 1225431",
"url": "https://bugzilla.suse.com/1225431"
},
{
"category": "self",
"summary": "SUSE Bug 1226519",
"url": "https://bugzilla.suse.com/1226519"
},
{
"category": "self",
"summary": "SUSE Bug 1226550",
"url": "https://bugzilla.suse.com/1226550"
},
{
"category": "self",
"summary": "SUSE Bug 1226574",
"url": "https://bugzilla.suse.com/1226574"
},
{
"category": "self",
"summary": "SUSE Bug 1226575",
"url": "https://bugzilla.suse.com/1226575"
},
{
"category": "self",
"summary": "SUSE Bug 1226662",
"url": "https://bugzilla.suse.com/1226662"
},
{
"category": "self",
"summary": "SUSE Bug 1226666",
"url": "https://bugzilla.suse.com/1226666"
},
{
"category": "self",
"summary": "SUSE Bug 1226785",
"url": "https://bugzilla.suse.com/1226785"
},
{
"category": "self",
"summary": "SUSE Bug 1227213",
"url": "https://bugzilla.suse.com/1227213"
},
{
"category": "self",
"summary": "SUSE Bug 1227362",
"url": "https://bugzilla.suse.com/1227362"
},
{
"category": "self",
"summary": "SUSE Bug 1227487",
"url": "https://bugzilla.suse.com/1227487"
},
{
"category": "self",
"summary": "SUSE Bug 1227716",
"url": "https://bugzilla.suse.com/1227716"
},
{
"category": "self",
"summary": "SUSE Bug 1227750",
"url": "https://bugzilla.suse.com/1227750"
},
{
"category": "self",
"summary": "SUSE Bug 1227810",
"url": "https://bugzilla.suse.com/1227810"
},
{
"category": "self",
"summary": "SUSE Bug 1227836",
"url": "https://bugzilla.suse.com/1227836"
},
{
"category": "self",
"summary": "SUSE Bug 1227976",
"url": "https://bugzilla.suse.com/1227976"
},
{
"category": "self",
"summary": "SUSE Bug 1228013",
"url": "https://bugzilla.suse.com/1228013"
},
{
"category": "self",
"summary": "SUSE Bug 1228040",
"url": "https://bugzilla.suse.com/1228040"
},
{
"category": "self",
"summary": "SUSE Bug 1228114",
"url": "https://bugzilla.suse.com/1228114"
},
{
"category": "self",
"summary": "SUSE Bug 1228328",
"url": "https://bugzilla.suse.com/1228328"
},
{
"category": "self",
"summary": "SUSE Bug 1228561",
"url": "https://bugzilla.suse.com/1228561"
},
{
"category": "self",
"summary": "SUSE Bug 1228644",
"url": "https://bugzilla.suse.com/1228644"
},
{
"category": "self",
"summary": "SUSE Bug 1228743",
"url": "https://bugzilla.suse.com/1228743"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-26558 page",
"url": "https://www.suse.com/security/cve/CVE-2020-26558/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-0129 page",
"url": "https://www.suse.com/security/cve/CVE-2021-0129/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47126 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47126/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47219 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47219/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47291 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47291/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47506 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47506/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47520 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47520/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47580 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47580/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47598 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47598/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47600 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47600/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-48792 page",
"url": "https://www.suse.com/security/cve/CVE-2022-48792/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-48821 page",
"url": "https://www.suse.com/security/cve/CVE-2022-48821/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-48822 page",
"url": "https://www.suse.com/security/cve/CVE-2022-48822/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-52686 page",
"url": "https://www.suse.com/security/cve/CVE-2023-52686/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-52885 page",
"url": "https://www.suse.com/security/cve/CVE-2023-52885/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-26583 page",
"url": "https://www.suse.com/security/cve/CVE-2024-26583/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-26584 page",
"url": "https://www.suse.com/security/cve/CVE-2024-26584/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-26585 page",
"url": "https://www.suse.com/security/cve/CVE-2024-26585/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-26800 page",
"url": "https://www.suse.com/security/cve/CVE-2024-26800/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-36974 page",
"url": "https://www.suse.com/security/cve/CVE-2024-36974/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-38559 page",
"url": "https://www.suse.com/security/cve/CVE-2024-38559/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-39494 page",
"url": "https://www.suse.com/security/cve/CVE-2024-39494/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-40937 page",
"url": "https://www.suse.com/security/cve/CVE-2024-40937/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-40956 page",
"url": "https://www.suse.com/security/cve/CVE-2024-40956/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-41011 page",
"url": "https://www.suse.com/security/cve/CVE-2024-41011/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-41059 page",
"url": "https://www.suse.com/security/cve/CVE-2024-41059/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-41069 page",
"url": "https://www.suse.com/security/cve/CVE-2024-41069/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-41090 page",
"url": "https://www.suse.com/security/cve/CVE-2024-41090/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-42145 page",
"url": "https://www.suse.com/security/cve/CVE-2024-42145/"
}
],
"title": "Security update for the Linux Kernel",
"tracking": {
"current_release_date": "2024-08-16T13:48:15Z",
"generator": {
"date": "2024-08-16T13:48:15Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2024:2948-1",
"initial_release_date": "2024-08-16T13:48:15Z",
"revision_history": [
{
"date": "2024-08-16T13:48:15Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-64kb-5.3.18-150300.59.170.1.aarch64",
"product": {
"name": "cluster-md-kmp-64kb-5.3.18-150300.59.170.1.aarch64",
"product_id": "cluster-md-kmp-64kb-5.3.18-150300.59.170.1.aarch64"
}
},
{
"category": "product_version",
"name": "cluster-md-kmp-default-5.3.18-150300.59.170.1.aarch64",
"product": {
"name": "cluster-md-kmp-default-5.3.18-150300.59.170.1.aarch64",
"product_id": "cluster-md-kmp-default-5.3.18-150300.59.170.1.aarch64"
}
},
{
"category": "product_version",
"name": "cluster-md-kmp-preempt-5.3.18-150300.59.170.1.aarch64",
"product": {
"name": "cluster-md-kmp-preempt-5.3.18-150300.59.170.1.aarch64",
"product_id": "cluster-md-kmp-preempt-5.3.18-150300.59.170.1.aarch64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-64kb-5.3.18-150300.59.170.1.aarch64",
"product": {
"name": "dlm-kmp-64kb-5.3.18-150300.59.170.1.aarch64",
"product_id": "dlm-kmp-64kb-5.3.18-150300.59.170.1.aarch64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-5.3.18-150300.59.170.1.aarch64",
"product": {
"name": "dlm-kmp-default-5.3.18-150300.59.170.1.aarch64",
"product_id": "dlm-kmp-default-5.3.18-150300.59.170.1.aarch64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-preempt-5.3.18-150300.59.170.1.aarch64",
"product": {
"name": "dlm-kmp-preempt-5.3.18-150300.59.170.1.aarch64",
"product_id": "dlm-kmp-preempt-5.3.18-150300.59.170.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-al-5.3.18-150300.59.170.1.aarch64",
"product": {
"name": "dtb-al-5.3.18-150300.59.170.1.aarch64",
"product_id": "dtb-al-5.3.18-150300.59.170.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-allwinner-5.3.18-150300.59.170.1.aarch64",
"product": {
"name": "dtb-allwinner-5.3.18-150300.59.170.1.aarch64",
"product_id": "dtb-allwinner-5.3.18-150300.59.170.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-altera-5.3.18-150300.59.170.1.aarch64",
"product": {
"name": "dtb-altera-5.3.18-150300.59.170.1.aarch64",
"product_id": "dtb-altera-5.3.18-150300.59.170.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-amd-5.3.18-150300.59.170.1.aarch64",
"product": {
"name": "dtb-amd-5.3.18-150300.59.170.1.aarch64",
"product_id": "dtb-amd-5.3.18-150300.59.170.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-amlogic-5.3.18-150300.59.170.1.aarch64",
"product": {
"name": "dtb-amlogic-5.3.18-150300.59.170.1.aarch64",
"product_id": "dtb-amlogic-5.3.18-150300.59.170.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-apm-5.3.18-150300.59.170.1.aarch64",
"product": {
"name": "dtb-apm-5.3.18-150300.59.170.1.aarch64",
"product_id": "dtb-apm-5.3.18-150300.59.170.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-arm-5.3.18-150300.59.170.1.aarch64",
"product": {
"name": "dtb-arm-5.3.18-150300.59.170.1.aarch64",
"product_id": "dtb-arm-5.3.18-150300.59.170.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-broadcom-5.3.18-150300.59.170.1.aarch64",
"product": {
"name": "dtb-broadcom-5.3.18-150300.59.170.1.aarch64",
"product_id": "dtb-broadcom-5.3.18-150300.59.170.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-cavium-5.3.18-150300.59.170.1.aarch64",
"product": {
"name": "dtb-cavium-5.3.18-150300.59.170.1.aarch64",
"product_id": "dtb-cavium-5.3.18-150300.59.170.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-exynos-5.3.18-150300.59.170.1.aarch64",
"product": {
"name": "dtb-exynos-5.3.18-150300.59.170.1.aarch64",
"product_id": "dtb-exynos-5.3.18-150300.59.170.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-freescale-5.3.18-150300.59.170.1.aarch64",
"product": {
"name": "dtb-freescale-5.3.18-150300.59.170.1.aarch64",
"product_id": "dtb-freescale-5.3.18-150300.59.170.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-hisilicon-5.3.18-150300.59.170.1.aarch64",
"product": {
"name": "dtb-hisilicon-5.3.18-150300.59.170.1.aarch64",
"product_id": "dtb-hisilicon-5.3.18-150300.59.170.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-lg-5.3.18-150300.59.170.1.aarch64",
"product": {
"name": "dtb-lg-5.3.18-150300.59.170.1.aarch64",
"product_id": "dtb-lg-5.3.18-150300.59.170.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-marvell-5.3.18-150300.59.170.1.aarch64",
"product": {
"name": "dtb-marvell-5.3.18-150300.59.170.1.aarch64",
"product_id": "dtb-marvell-5.3.18-150300.59.170.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-mediatek-5.3.18-150300.59.170.1.aarch64",
"product": {
"name": "dtb-mediatek-5.3.18-150300.59.170.1.aarch64",
"product_id": "dtb-mediatek-5.3.18-150300.59.170.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-nvidia-5.3.18-150300.59.170.1.aarch64",
"product": {
"name": "dtb-nvidia-5.3.18-150300.59.170.1.aarch64",
"product_id": "dtb-nvidia-5.3.18-150300.59.170.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-qcom-5.3.18-150300.59.170.1.aarch64",
"product": {
"name": "dtb-qcom-5.3.18-150300.59.170.1.aarch64",
"product_id": "dtb-qcom-5.3.18-150300.59.170.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-renesas-5.3.18-150300.59.170.1.aarch64",
"product": {
"name": "dtb-renesas-5.3.18-150300.59.170.1.aarch64",
"product_id": "dtb-renesas-5.3.18-150300.59.170.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-rockchip-5.3.18-150300.59.170.1.aarch64",
"product": {
"name": "dtb-rockchip-5.3.18-150300.59.170.1.aarch64",
"product_id": "dtb-rockchip-5.3.18-150300.59.170.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-socionext-5.3.18-150300.59.170.1.aarch64",
"product": {
"name": "dtb-socionext-5.3.18-150300.59.170.1.aarch64",
"product_id": "dtb-socionext-5.3.18-150300.59.170.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-sprd-5.3.18-150300.59.170.1.aarch64",
"product": {
"name": "dtb-sprd-5.3.18-150300.59.170.1.aarch64",
"product_id": "dtb-sprd-5.3.18-150300.59.170.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-xilinx-5.3.18-150300.59.170.1.aarch64",
"product": {
"name": "dtb-xilinx-5.3.18-150300.59.170.1.aarch64",
"product_id": "dtb-xilinx-5.3.18-150300.59.170.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-zte-5.3.18-150300.59.170.1.aarch64",
"product": {
"name": "dtb-zte-5.3.18-150300.59.170.1.aarch64",
"product_id": "dtb-zte-5.3.18-150300.59.170.1.aarch64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-64kb-5.3.18-150300.59.170.1.aarch64",
"product": {
"name": "gfs2-kmp-64kb-5.3.18-150300.59.170.1.aarch64",
"product_id": "gfs2-kmp-64kb-5.3.18-150300.59.170.1.aarch64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-5.3.18-150300.59.170.1.aarch64",
"product": {
"name": "gfs2-kmp-default-5.3.18-150300.59.170.1.aarch64",
"product_id": "gfs2-kmp-default-5.3.18-150300.59.170.1.aarch64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-preempt-5.3.18-150300.59.170.1.aarch64",
"product": {
"name": "gfs2-kmp-preempt-5.3.18-150300.59.170.1.aarch64",
"product_id": "gfs2-kmp-preempt-5.3.18-150300.59.170.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-64kb-5.3.18-150300.59.170.1.aarch64",
"product": {
"name": "kernel-64kb-5.3.18-150300.59.170.1.aarch64",
"product_id": "kernel-64kb-5.3.18-150300.59.170.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-64kb-devel-5.3.18-150300.59.170.1.aarch64",
"product": {
"name": "kernel-64kb-devel-5.3.18-150300.59.170.1.aarch64",
"product_id": "kernel-64kb-devel-5.3.18-150300.59.170.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-64kb-extra-5.3.18-150300.59.170.1.aarch64",
"product": {
"name": "kernel-64kb-extra-5.3.18-150300.59.170.1.aarch64",
"product_id": "kernel-64kb-extra-5.3.18-150300.59.170.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-64kb-livepatch-devel-5.3.18-150300.59.170.1.aarch64",
"product": {
"name": "kernel-64kb-livepatch-devel-5.3.18-150300.59.170.1.aarch64",
"product_id": "kernel-64kb-livepatch-devel-5.3.18-150300.59.170.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-64kb-optional-5.3.18-150300.59.170.1.aarch64",
"product": {
"name": "kernel-64kb-optional-5.3.18-150300.59.170.1.aarch64",
"product_id": "kernel-64kb-optional-5.3.18-150300.59.170.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-5.3.18-150300.59.170.1.aarch64",
"product": {
"name": "kernel-default-5.3.18-150300.59.170.1.aarch64",
"product_id": "kernel-default-5.3.18-150300.59.170.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"product": {
"name": "kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"product_id": "kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-rebuild-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"product": {
"name": "kernel-default-base-rebuild-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"product_id": "kernel-default-base-rebuild-5.3.18-150300.59.170.1.150300.18.100.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-5.3.18-150300.59.170.1.aarch64",
"product": {
"name": "kernel-default-devel-5.3.18-150300.59.170.1.aarch64",
"product_id": "kernel-default-devel-5.3.18-150300.59.170.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-5.3.18-150300.59.170.1.aarch64",
"product": {
"name": "kernel-default-extra-5.3.18-150300.59.170.1.aarch64",
"product_id": "kernel-default-extra-5.3.18-150300.59.170.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-5.3.18-150300.59.170.1.aarch64",
"product": {
"name": "kernel-default-livepatch-5.3.18-150300.59.170.1.aarch64",
"product_id": "kernel-default-livepatch-5.3.18-150300.59.170.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-devel-5.3.18-150300.59.170.1.aarch64",
"product": {
"name": "kernel-default-livepatch-devel-5.3.18-150300.59.170.1.aarch64",
"product_id": "kernel-default-livepatch-devel-5.3.18-150300.59.170.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-optional-5.3.18-150300.59.170.1.aarch64",
"product": {
"name": "kernel-default-optional-5.3.18-150300.59.170.1.aarch64",
"product_id": "kernel-default-optional-5.3.18-150300.59.170.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-5.3.18-150300.59.170.1.aarch64",
"product": {
"name": "kernel-obs-build-5.3.18-150300.59.170.1.aarch64",
"product_id": "kernel-obs-build-5.3.18-150300.59.170.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-5.3.18-150300.59.170.1.aarch64",
"product": {
"name": "kernel-obs-qa-5.3.18-150300.59.170.1.aarch64",
"product_id": "kernel-obs-qa-5.3.18-150300.59.170.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-preempt-5.3.18-150300.59.170.1.aarch64",
"product": {
"name": "kernel-preempt-5.3.18-150300.59.170.1.aarch64",
"product_id": "kernel-preempt-5.3.18-150300.59.170.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-preempt-devel-5.3.18-150300.59.170.1.aarch64",
"product": {
"name": "kernel-preempt-devel-5.3.18-150300.59.170.1.aarch64",
"product_id": "kernel-preempt-devel-5.3.18-150300.59.170.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-preempt-extra-5.3.18-150300.59.170.1.aarch64",
"product": {
"name": "kernel-preempt-extra-5.3.18-150300.59.170.1.aarch64",
"product_id": "kernel-preempt-extra-5.3.18-150300.59.170.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-preempt-livepatch-devel-5.3.18-150300.59.170.1.aarch64",
"product": {
"name": "kernel-preempt-livepatch-devel-5.3.18-150300.59.170.1.aarch64",
"product_id": "kernel-preempt-livepatch-devel-5.3.18-150300.59.170.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-preempt-optional-5.3.18-150300.59.170.1.aarch64",
"product": {
"name": "kernel-preempt-optional-5.3.18-150300.59.170.1.aarch64",
"product_id": "kernel-preempt-optional-5.3.18-150300.59.170.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-syms-5.3.18-150300.59.170.1.aarch64",
"product": {
"name": "kernel-syms-5.3.18-150300.59.170.1.aarch64",
"product_id": "kernel-syms-5.3.18-150300.59.170.1.aarch64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-64kb-5.3.18-150300.59.170.1.aarch64",
"product": {
"name": "kselftests-kmp-64kb-5.3.18-150300.59.170.1.aarch64",
"product_id": "kselftests-kmp-64kb-5.3.18-150300.59.170.1.aarch64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-5.3.18-150300.59.170.1.aarch64",
"product": {
"name": "kselftests-kmp-default-5.3.18-150300.59.170.1.aarch64",
"product_id": "kselftests-kmp-default-5.3.18-150300.59.170.1.aarch64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-preempt-5.3.18-150300.59.170.1.aarch64",
"product": {
"name": "kselftests-kmp-preempt-5.3.18-150300.59.170.1.aarch64",
"product_id": "kselftests-kmp-preempt-5.3.18-150300.59.170.1.aarch64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-64kb-5.3.18-150300.59.170.1.aarch64",
"product": {
"name": "ocfs2-kmp-64kb-5.3.18-150300.59.170.1.aarch64",
"product_id": "ocfs2-kmp-64kb-5.3.18-150300.59.170.1.aarch64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-5.3.18-150300.59.170.1.aarch64",
"product": {
"name": "ocfs2-kmp-default-5.3.18-150300.59.170.1.aarch64",
"product_id": "ocfs2-kmp-default-5.3.18-150300.59.170.1.aarch64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-preempt-5.3.18-150300.59.170.1.aarch64",
"product": {
"name": "ocfs2-kmp-preempt-5.3.18-150300.59.170.1.aarch64",
"product_id": "ocfs2-kmp-preempt-5.3.18-150300.59.170.1.aarch64"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-64kb-5.3.18-150300.59.170.1.aarch64",
"product": {
"name": "reiserfs-kmp-64kb-5.3.18-150300.59.170.1.aarch64",
"product_id": "reiserfs-kmp-64kb-5.3.18-150300.59.170.1.aarch64"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-default-5.3.18-150300.59.170.1.aarch64",
"product": {
"name": "reiserfs-kmp-default-5.3.18-150300.59.170.1.aarch64",
"product_id": "reiserfs-kmp-default-5.3.18-150300.59.170.1.aarch64"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-preempt-5.3.18-150300.59.170.1.aarch64",
"product": {
"name": "reiserfs-kmp-preempt-5.3.18-150300.59.170.1.aarch64",
"product_id": "reiserfs-kmp-preempt-5.3.18-150300.59.170.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-devel-5.3.18-150300.59.170.1.noarch",
"product": {
"name": "kernel-devel-5.3.18-150300.59.170.1.noarch",
"product_id": "kernel-devel-5.3.18-150300.59.170.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-docs-5.3.18-150300.59.170.2.noarch",
"product": {
"name": "kernel-docs-5.3.18-150300.59.170.2.noarch",
"product_id": "kernel-docs-5.3.18-150300.59.170.2.noarch"
}
},
{
"category": "product_version",
"name": "kernel-docs-html-5.3.18-150300.59.170.2.noarch",
"product": {
"name": "kernel-docs-html-5.3.18-150300.59.170.2.noarch",
"product_id": "kernel-docs-html-5.3.18-150300.59.170.2.noarch"
}
},
{
"category": "product_version",
"name": "kernel-macros-5.3.18-150300.59.170.1.noarch",
"product": {
"name": "kernel-macros-5.3.18-150300.59.170.1.noarch",
"product_id": "kernel-macros-5.3.18-150300.59.170.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-5.3.18-150300.59.170.1.noarch",
"product": {
"name": "kernel-source-5.3.18-150300.59.170.1.noarch",
"product_id": "kernel-source-5.3.18-150300.59.170.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-vanilla-5.3.18-150300.59.170.1.noarch",
"product": {
"name": "kernel-source-vanilla-5.3.18-150300.59.170.1.noarch",
"product_id": "kernel-source-vanilla-5.3.18-150300.59.170.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"product": {
"name": "cluster-md-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"product_id": "cluster-md-kmp-default-5.3.18-150300.59.170.1.ppc64le"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"product": {
"name": "dlm-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"product_id": "dlm-kmp-default-5.3.18-150300.59.170.1.ppc64le"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"product": {
"name": "gfs2-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"product_id": "gfs2-kmp-default-5.3.18-150300.59.170.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-5.3.18-150300.59.170.1.ppc64le",
"product": {
"name": "kernel-debug-5.3.18-150300.59.170.1.ppc64le",
"product_id": "kernel-debug-5.3.18-150300.59.170.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-5.3.18-150300.59.170.1.ppc64le",
"product": {
"name": "kernel-debug-devel-5.3.18-150300.59.170.1.ppc64le",
"product_id": "kernel-debug-devel-5.3.18-150300.59.170.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-livepatch-devel-5.3.18-150300.59.170.1.ppc64le",
"product": {
"name": "kernel-debug-livepatch-devel-5.3.18-150300.59.170.1.ppc64le",
"product_id": "kernel-debug-livepatch-devel-5.3.18-150300.59.170.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-5.3.18-150300.59.170.1.ppc64le",
"product": {
"name": "kernel-default-5.3.18-150300.59.170.1.ppc64le",
"product_id": "kernel-default-5.3.18-150300.59.170.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.ppc64le",
"product": {
"name": "kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.ppc64le",
"product_id": "kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-base-rebuild-5.3.18-150300.59.170.1.150300.18.100.1.ppc64le",
"product": {
"name": "kernel-default-base-rebuild-5.3.18-150300.59.170.1.150300.18.100.1.ppc64le",
"product_id": "kernel-default-base-rebuild-5.3.18-150300.59.170.1.150300.18.100.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-5.3.18-150300.59.170.1.ppc64le",
"product": {
"name": "kernel-default-devel-5.3.18-150300.59.170.1.ppc64le",
"product_id": "kernel-default-devel-5.3.18-150300.59.170.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-5.3.18-150300.59.170.1.ppc64le",
"product": {
"name": "kernel-default-extra-5.3.18-150300.59.170.1.ppc64le",
"product_id": "kernel-default-extra-5.3.18-150300.59.170.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-5.3.18-150300.59.170.1.ppc64le",
"product": {
"name": "kernel-default-livepatch-5.3.18-150300.59.170.1.ppc64le",
"product_id": "kernel-default-livepatch-5.3.18-150300.59.170.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-devel-5.3.18-150300.59.170.1.ppc64le",
"product": {
"name": "kernel-default-livepatch-devel-5.3.18-150300.59.170.1.ppc64le",
"product_id": "kernel-default-livepatch-devel-5.3.18-150300.59.170.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-optional-5.3.18-150300.59.170.1.ppc64le",
"product": {
"name": "kernel-default-optional-5.3.18-150300.59.170.1.ppc64le",
"product_id": "kernel-default-optional-5.3.18-150300.59.170.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-5.3.18-150300.59.170.1.ppc64le",
"product": {
"name": "kernel-kvmsmall-5.3.18-150300.59.170.1.ppc64le",
"product_id": "kernel-kvmsmall-5.3.18-150300.59.170.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-devel-5.3.18-150300.59.170.1.ppc64le",
"product": {
"name": "kernel-kvmsmall-devel-5.3.18-150300.59.170.1.ppc64le",
"product_id": "kernel-kvmsmall-devel-5.3.18-150300.59.170.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.170.1.ppc64le",
"product": {
"name": "kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.170.1.ppc64le",
"product_id": "kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.170.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-150300_59_170-default-1-150300.7.3.1.ppc64le",
"product": {
"name": "kernel-livepatch-5_3_18-150300_59_170-default-1-150300.7.3.1.ppc64le",
"product_id": "kernel-livepatch-5_3_18-150300_59_170-default-1-150300.7.3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-5.3.18-150300.59.170.1.ppc64le",
"product": {
"name": "kernel-obs-build-5.3.18-150300.59.170.1.ppc64le",
"product_id": "kernel-obs-build-5.3.18-150300.59.170.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-5.3.18-150300.59.170.1.ppc64le",
"product": {
"name": "kernel-obs-qa-5.3.18-150300.59.170.1.ppc64le",
"product_id": "kernel-obs-qa-5.3.18-150300.59.170.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-syms-5.3.18-150300.59.170.1.ppc64le",
"product": {
"name": "kernel-syms-5.3.18-150300.59.170.1.ppc64le",
"product_id": "kernel-syms-5.3.18-150300.59.170.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"product": {
"name": "kselftests-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"product_id": "kselftests-kmp-default-5.3.18-150300.59.170.1.ppc64le"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"product": {
"name": "ocfs2-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"product_id": "ocfs2-kmp-default-5.3.18-150300.59.170.1.ppc64le"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"product": {
"name": "reiserfs-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"product_id": "reiserfs-kmp-default-5.3.18-150300.59.170.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-5.3.18-150300.59.170.1.s390x",
"product": {
"name": "cluster-md-kmp-default-5.3.18-150300.59.170.1.s390x",
"product_id": "cluster-md-kmp-default-5.3.18-150300.59.170.1.s390x"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-5.3.18-150300.59.170.1.s390x",
"product": {
"name": "dlm-kmp-default-5.3.18-150300.59.170.1.s390x",
"product_id": "dlm-kmp-default-5.3.18-150300.59.170.1.s390x"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-5.3.18-150300.59.170.1.s390x",
"product": {
"name": "gfs2-kmp-default-5.3.18-150300.59.170.1.s390x",
"product_id": "gfs2-kmp-default-5.3.18-150300.59.170.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-5.3.18-150300.59.170.1.s390x",
"product": {
"name": "kernel-default-5.3.18-150300.59.170.1.s390x",
"product_id": "kernel-default-5.3.18-150300.59.170.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.s390x",
"product": {
"name": "kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.s390x",
"product_id": "kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-base-rebuild-5.3.18-150300.59.170.1.150300.18.100.1.s390x",
"product": {
"name": "kernel-default-base-rebuild-5.3.18-150300.59.170.1.150300.18.100.1.s390x",
"product_id": "kernel-default-base-rebuild-5.3.18-150300.59.170.1.150300.18.100.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-5.3.18-150300.59.170.1.s390x",
"product": {
"name": "kernel-default-devel-5.3.18-150300.59.170.1.s390x",
"product_id": "kernel-default-devel-5.3.18-150300.59.170.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-5.3.18-150300.59.170.1.s390x",
"product": {
"name": "kernel-default-extra-5.3.18-150300.59.170.1.s390x",
"product_id": "kernel-default-extra-5.3.18-150300.59.170.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-5.3.18-150300.59.170.1.s390x",
"product": {
"name": "kernel-default-livepatch-5.3.18-150300.59.170.1.s390x",
"product_id": "kernel-default-livepatch-5.3.18-150300.59.170.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-devel-5.3.18-150300.59.170.1.s390x",
"product": {
"name": "kernel-default-livepatch-devel-5.3.18-150300.59.170.1.s390x",
"product_id": "kernel-default-livepatch-devel-5.3.18-150300.59.170.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-optional-5.3.18-150300.59.170.1.s390x",
"product": {
"name": "kernel-default-optional-5.3.18-150300.59.170.1.s390x",
"product_id": "kernel-default-optional-5.3.18-150300.59.170.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-150300_59_170-default-1-150300.7.3.1.s390x",
"product": {
"name": "kernel-livepatch-5_3_18-150300_59_170-default-1-150300.7.3.1.s390x",
"product_id": "kernel-livepatch-5_3_18-150300_59_170-default-1-150300.7.3.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-5.3.18-150300.59.170.1.s390x",
"product": {
"name": "kernel-obs-build-5.3.18-150300.59.170.1.s390x",
"product_id": "kernel-obs-build-5.3.18-150300.59.170.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-5.3.18-150300.59.170.1.s390x",
"product": {
"name": "kernel-obs-qa-5.3.18-150300.59.170.1.s390x",
"product_id": "kernel-obs-qa-5.3.18-150300.59.170.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-syms-5.3.18-150300.59.170.1.s390x",
"product": {
"name": "kernel-syms-5.3.18-150300.59.170.1.s390x",
"product_id": "kernel-syms-5.3.18-150300.59.170.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-5.3.18-150300.59.170.1.s390x",
"product": {
"name": "kernel-zfcpdump-5.3.18-150300.59.170.1.s390x",
"product_id": "kernel-zfcpdump-5.3.18-150300.59.170.1.s390x"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-5.3.18-150300.59.170.1.s390x",
"product": {
"name": "kselftests-kmp-default-5.3.18-150300.59.170.1.s390x",
"product_id": "kselftests-kmp-default-5.3.18-150300.59.170.1.s390x"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-5.3.18-150300.59.170.1.s390x",
"product": {
"name": "ocfs2-kmp-default-5.3.18-150300.59.170.1.s390x",
"product_id": "ocfs2-kmp-default-5.3.18-150300.59.170.1.s390x"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-default-5.3.18-150300.59.170.1.s390x",
"product": {
"name": "reiserfs-kmp-default-5.3.18-150300.59.170.1.s390x",
"product_id": "reiserfs-kmp-default-5.3.18-150300.59.170.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-5.3.18-150300.59.170.1.x86_64",
"product": {
"name": "cluster-md-kmp-default-5.3.18-150300.59.170.1.x86_64",
"product_id": "cluster-md-kmp-default-5.3.18-150300.59.170.1.x86_64"
}
},
{
"category": "product_version",
"name": "cluster-md-kmp-preempt-5.3.18-150300.59.170.1.x86_64",
"product": {
"name": "cluster-md-kmp-preempt-5.3.18-150300.59.170.1.x86_64",
"product_id": "cluster-md-kmp-preempt-5.3.18-150300.59.170.1.x86_64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-5.3.18-150300.59.170.1.x86_64",
"product": {
"name": "dlm-kmp-default-5.3.18-150300.59.170.1.x86_64",
"product_id": "dlm-kmp-default-5.3.18-150300.59.170.1.x86_64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-preempt-5.3.18-150300.59.170.1.x86_64",
"product": {
"name": "dlm-kmp-preempt-5.3.18-150300.59.170.1.x86_64",
"product_id": "dlm-kmp-preempt-5.3.18-150300.59.170.1.x86_64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-5.3.18-150300.59.170.1.x86_64",
"product": {
"name": "gfs2-kmp-default-5.3.18-150300.59.170.1.x86_64",
"product_id": "gfs2-kmp-default-5.3.18-150300.59.170.1.x86_64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-preempt-5.3.18-150300.59.170.1.x86_64",
"product": {
"name": "gfs2-kmp-preempt-5.3.18-150300.59.170.1.x86_64",
"product_id": "gfs2-kmp-preempt-5.3.18-150300.59.170.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-5.3.18-150300.59.170.1.x86_64",
"product": {
"name": "kernel-debug-5.3.18-150300.59.170.1.x86_64",
"product_id": "kernel-debug-5.3.18-150300.59.170.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-5.3.18-150300.59.170.1.x86_64",
"product": {
"name": "kernel-debug-devel-5.3.18-150300.59.170.1.x86_64",
"product_id": "kernel-debug-devel-5.3.18-150300.59.170.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-livepatch-devel-5.3.18-150300.59.170.1.x86_64",
"product": {
"name": "kernel-debug-livepatch-devel-5.3.18-150300.59.170.1.x86_64",
"product_id": "kernel-debug-livepatch-devel-5.3.18-150300.59.170.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-5.3.18-150300.59.170.1.x86_64",
"product": {
"name": "kernel-default-5.3.18-150300.59.170.1.x86_64",
"product_id": "kernel-default-5.3.18-150300.59.170.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"product": {
"name": "kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"product_id": "kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-rebuild-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"product": {
"name": "kernel-default-base-rebuild-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"product_id": "kernel-default-base-rebuild-5.3.18-150300.59.170.1.150300.18.100.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-5.3.18-150300.59.170.1.x86_64",
"product": {
"name": "kernel-default-devel-5.3.18-150300.59.170.1.x86_64",
"product_id": "kernel-default-devel-5.3.18-150300.59.170.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-5.3.18-150300.59.170.1.x86_64",
"product": {
"name": "kernel-default-extra-5.3.18-150300.59.170.1.x86_64",
"product_id": "kernel-default-extra-5.3.18-150300.59.170.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-5.3.18-150300.59.170.1.x86_64",
"product": {
"name": "kernel-default-livepatch-5.3.18-150300.59.170.1.x86_64",
"product_id": "kernel-default-livepatch-5.3.18-150300.59.170.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-devel-5.3.18-150300.59.170.1.x86_64",
"product": {
"name": "kernel-default-livepatch-devel-5.3.18-150300.59.170.1.x86_64",
"product_id": "kernel-default-livepatch-devel-5.3.18-150300.59.170.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-optional-5.3.18-150300.59.170.1.x86_64",
"product": {
"name": "kernel-default-optional-5.3.18-150300.59.170.1.x86_64",
"product_id": "kernel-default-optional-5.3.18-150300.59.170.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-5.3.18-150300.59.170.1.x86_64",
"product": {
"name": "kernel-kvmsmall-5.3.18-150300.59.170.1.x86_64",
"product_id": "kernel-kvmsmall-5.3.18-150300.59.170.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-devel-5.3.18-150300.59.170.1.x86_64",
"product": {
"name": "kernel-kvmsmall-devel-5.3.18-150300.59.170.1.x86_64",
"product_id": "kernel-kvmsmall-devel-5.3.18-150300.59.170.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.170.1.x86_64",
"product": {
"name": "kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.170.1.x86_64",
"product_id": "kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.170.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-150300_59_170-default-1-150300.7.3.1.x86_64",
"product": {
"name": "kernel-livepatch-5_3_18-150300_59_170-default-1-150300.7.3.1.x86_64",
"product_id": "kernel-livepatch-5_3_18-150300_59_170-default-1-150300.7.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-150300_59_170-preempt-1-150300.7.3.1.x86_64",
"product": {
"name": "kernel-livepatch-5_3_18-150300_59_170-preempt-1-150300.7.3.1.x86_64",
"product_id": "kernel-livepatch-5_3_18-150300_59_170-preempt-1-150300.7.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-5.3.18-150300.59.170.1.x86_64",
"product": {
"name": "kernel-obs-build-5.3.18-150300.59.170.1.x86_64",
"product_id": "kernel-obs-build-5.3.18-150300.59.170.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-5.3.18-150300.59.170.1.x86_64",
"product": {
"name": "kernel-obs-qa-5.3.18-150300.59.170.1.x86_64",
"product_id": "kernel-obs-qa-5.3.18-150300.59.170.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-preempt-5.3.18-150300.59.170.1.x86_64",
"product": {
"name": "kernel-preempt-5.3.18-150300.59.170.1.x86_64",
"product_id": "kernel-preempt-5.3.18-150300.59.170.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-preempt-devel-5.3.18-150300.59.170.1.x86_64",
"product": {
"name": "kernel-preempt-devel-5.3.18-150300.59.170.1.x86_64",
"product_id": "kernel-preempt-devel-5.3.18-150300.59.170.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-preempt-extra-5.3.18-150300.59.170.1.x86_64",
"product": {
"name": "kernel-preempt-extra-5.3.18-150300.59.170.1.x86_64",
"product_id": "kernel-preempt-extra-5.3.18-150300.59.170.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-preempt-livepatch-devel-5.3.18-150300.59.170.1.x86_64",
"product": {
"name": "kernel-preempt-livepatch-devel-5.3.18-150300.59.170.1.x86_64",
"product_id": "kernel-preempt-livepatch-devel-5.3.18-150300.59.170.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-preempt-optional-5.3.18-150300.59.170.1.x86_64",
"product": {
"name": "kernel-preempt-optional-5.3.18-150300.59.170.1.x86_64",
"product_id": "kernel-preempt-optional-5.3.18-150300.59.170.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-syms-5.3.18-150300.59.170.1.x86_64",
"product": {
"name": "kernel-syms-5.3.18-150300.59.170.1.x86_64",
"product_id": "kernel-syms-5.3.18-150300.59.170.1.x86_64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-5.3.18-150300.59.170.1.x86_64",
"product": {
"name": "kselftests-kmp-default-5.3.18-150300.59.170.1.x86_64",
"product_id": "kselftests-kmp-default-5.3.18-150300.59.170.1.x86_64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-preempt-5.3.18-150300.59.170.1.x86_64",
"product": {
"name": "kselftests-kmp-preempt-5.3.18-150300.59.170.1.x86_64",
"product_id": "kselftests-kmp-preempt-5.3.18-150300.59.170.1.x86_64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-5.3.18-150300.59.170.1.x86_64",
"product": {
"name": "ocfs2-kmp-default-5.3.18-150300.59.170.1.x86_64",
"product_id": "ocfs2-kmp-default-5.3.18-150300.59.170.1.x86_64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-preempt-5.3.18-150300.59.170.1.x86_64",
"product": {
"name": "ocfs2-kmp-preempt-5.3.18-150300.59.170.1.x86_64",
"product_id": "ocfs2-kmp-preempt-5.3.18-150300.59.170.1.x86_64"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-default-5.3.18-150300.59.170.1.x86_64",
"product": {
"name": "reiserfs-kmp-default-5.3.18-150300.59.170.1.x86_64",
"product_id": "reiserfs-kmp-default-5.3.18-150300.59.170.1.x86_64"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-preempt-5.3.18-150300.59.170.1.x86_64",
"product": {
"name": "reiserfs-kmp-preempt-5.3.18-150300.59.170.1.x86_64",
"product_id": "reiserfs-kmp-preempt-5.3.18-150300.59.170.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 15 SP3",
"product": {
"name": "SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-live-patching:15:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Availability Extension 15 SP3",
"product": {
"name": "SUSE Linux Enterprise High Availability Extension 15 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-ha:15:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle_hpc-ltss:15:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 15 SP3-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:15:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:15:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Micro 5.1",
"product": {
"name": "SUSE Linux Enterprise Micro 5.1",
"product_id": "SUSE Linux Enterprise Micro 5.1",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse-microos:5.1"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Micro 5.2",
"product": {
"name": "SUSE Linux Enterprise Micro 5.2",
"product_id": "SUSE Linux Enterprise Micro 5.2",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse-microos:5.2"
}
}
},
{
"category": "product_name",
"name": "SUSE Enterprise Storage 7.1",
"product": {
"name": "SUSE Enterprise Storage 7.1",
"product_id": "SUSE Enterprise Storage 7.1",
"product_identification_helper": {
"cpe": "cpe:/o:suse:ses:7.1"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-5.3.18-150300.59.170.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.170.1.ppc64le"
},
"product_reference": "kernel-default-livepatch-5.3.18-150300.59.170.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-5.3.18-150300.59.170.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.170.1.s390x"
},
"product_reference": "kernel-default-livepatch-5.3.18-150300.59.170.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-5.3.18-150300.59.170.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.170.1.x86_64"
},
"product_reference": "kernel-default-livepatch-5.3.18-150300.59.170.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-devel-5.3.18-150300.59.170.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.170.1.ppc64le"
},
"product_reference": "kernel-default-livepatch-devel-5.3.18-150300.59.170.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-devel-5.3.18-150300.59.170.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.170.1.s390x"
},
"product_reference": "kernel-default-livepatch-devel-5.3.18-150300.59.170.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-devel-5.3.18-150300.59.170.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.170.1.x86_64"
},
"product_reference": "kernel-default-livepatch-devel-5.3.18-150300.59.170.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-150300_59_170-default-1-150300.7.3.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_170-default-1-150300.7.3.1.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-150300_59_170-default-1-150300.7.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-150300_59_170-default-1-150300.7.3.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_170-default-1-150300.7.3.1.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-150300_59_170-default-1-150300.7.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-150300_59_170-default-1-150300.7.3.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_170-default-1-150300.7.3.1.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-150300_59_170-default-1-150300.7.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-5.3.18-150300.59.170.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.170.1.aarch64"
},
"product_reference": "cluster-md-kmp-default-5.3.18-150300.59.170.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-5.3.18-150300.59.170.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.170.1.ppc64le"
},
"product_reference": "cluster-md-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-5.3.18-150300.59.170.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.170.1.s390x"
},
"product_reference": "cluster-md-kmp-default-5.3.18-150300.59.170.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-5.3.18-150300.59.170.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.170.1.x86_64"
},
"product_reference": "cluster-md-kmp-default-5.3.18-150300.59.170.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-5.3.18-150300.59.170.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.170.1.aarch64"
},
"product_reference": "dlm-kmp-default-5.3.18-150300.59.170.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-5.3.18-150300.59.170.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.170.1.ppc64le"
},
"product_reference": "dlm-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-5.3.18-150300.59.170.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.170.1.s390x"
},
"product_reference": "dlm-kmp-default-5.3.18-150300.59.170.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-5.3.18-150300.59.170.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.170.1.x86_64"
},
"product_reference": "dlm-kmp-default-5.3.18-150300.59.170.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-5.3.18-150300.59.170.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.170.1.aarch64"
},
"product_reference": "gfs2-kmp-default-5.3.18-150300.59.170.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-5.3.18-150300.59.170.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.170.1.ppc64le"
},
"product_reference": "gfs2-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-5.3.18-150300.59.170.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.170.1.s390x"
},
"product_reference": "gfs2-kmp-default-5.3.18-150300.59.170.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-5.3.18-150300.59.170.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.170.1.x86_64"
},
"product_reference": "gfs2-kmp-default-5.3.18-150300.59.170.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-5.3.18-150300.59.170.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.170.1.aarch64"
},
"product_reference": "ocfs2-kmp-default-5.3.18-150300.59.170.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-5.3.18-150300.59.170.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.170.1.ppc64le"
},
"product_reference": "ocfs2-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-5.3.18-150300.59.170.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.170.1.s390x"
},
"product_reference": "ocfs2-kmp-default-5.3.18-150300.59.170.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-5.3.18-150300.59.170.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.170.1.x86_64"
},
"product_reference": "ocfs2-kmp-default-5.3.18-150300.59.170.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64kb-5.3.18-150300.59.170.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.170.1.aarch64"
},
"product_reference": "kernel-64kb-5.3.18-150300.59.170.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64kb-devel-5.3.18-150300.59.170.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.170.1.aarch64"
},
"product_reference": "kernel-64kb-devel-5.3.18-150300.59.170.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.3.18-150300.59.170.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.aarch64"
},
"product_reference": "kernel-default-5.3.18-150300.59.170.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.3.18-150300.59.170.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.x86_64"
},
"product_reference": "kernel-default-5.3.18-150300.59.170.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64"
},
"product_reference": "kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64"
},
"product_reference": "kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-5.3.18-150300.59.170.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.aarch64"
},
"product_reference": "kernel-default-devel-5.3.18-150300.59.170.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-5.3.18-150300.59.170.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.x86_64"
},
"product_reference": "kernel-default-devel-5.3.18-150300.59.170.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-5.3.18-150300.59.170.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.170.1.noarch"
},
"product_reference": "kernel-devel-5.3.18-150300.59.170.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-docs-5.3.18-150300.59.170.2.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.170.2.noarch"
},
"product_reference": "kernel-docs-5.3.18-150300.59.170.2.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-5.3.18-150300.59.170.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.170.1.noarch"
},
"product_reference": "kernel-macros-5.3.18-150300.59.170.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-5.3.18-150300.59.170.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.aarch64"
},
"product_reference": "kernel-obs-build-5.3.18-150300.59.170.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-5.3.18-150300.59.170.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.x86_64"
},
"product_reference": "kernel-obs-build-5.3.18-150300.59.170.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-preempt-5.3.18-150300.59.170.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.170.1.aarch64"
},
"product_reference": "kernel-preempt-5.3.18-150300.59.170.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-preempt-5.3.18-150300.59.170.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.170.1.x86_64"
},
"product_reference": "kernel-preempt-5.3.18-150300.59.170.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-preempt-devel-5.3.18-150300.59.170.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.170.1.aarch64"
},
"product_reference": "kernel-preempt-devel-5.3.18-150300.59.170.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-preempt-devel-5.3.18-150300.59.170.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.170.1.x86_64"
},
"product_reference": "kernel-preempt-devel-5.3.18-150300.59.170.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-5.3.18-150300.59.170.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.170.1.noarch"
},
"product_reference": "kernel-source-5.3.18-150300.59.170.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-5.3.18-150300.59.170.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.aarch64"
},
"product_reference": "kernel-syms-5.3.18-150300.59.170.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-5.3.18-150300.59.170.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.x86_64"
},
"product_reference": "kernel-syms-5.3.18-150300.59.170.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-5.3.18-150300.59.170.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.aarch64"
},
"product_reference": "reiserfs-kmp-default-5.3.18-150300.59.170.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-5.3.18-150300.59.170.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.x86_64"
},
"product_reference": "reiserfs-kmp-default-5.3.18-150300.59.170.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64kb-5.3.18-150300.59.170.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.170.1.aarch64"
},
"product_reference": "kernel-64kb-5.3.18-150300.59.170.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64kb-devel-5.3.18-150300.59.170.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.170.1.aarch64"
},
"product_reference": "kernel-64kb-devel-5.3.18-150300.59.170.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.3.18-150300.59.170.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.aarch64"
},
"product_reference": "kernel-default-5.3.18-150300.59.170.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.3.18-150300.59.170.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.ppc64le"
},
"product_reference": "kernel-default-5.3.18-150300.59.170.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.3.18-150300.59.170.1.s390x as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.s390x"
},
"product_reference": "kernel-default-5.3.18-150300.59.170.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.3.18-150300.59.170.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.x86_64"
},
"product_reference": "kernel-default-5.3.18-150300.59.170.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64"
},
"product_reference": "kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.ppc64le"
},
"product_reference": "kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.s390x as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.s390x"
},
"product_reference": "kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64"
},
"product_reference": "kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-5.3.18-150300.59.170.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.aarch64"
},
"product_reference": "kernel-default-devel-5.3.18-150300.59.170.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-5.3.18-150300.59.170.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.ppc64le"
},
"product_reference": "kernel-default-devel-5.3.18-150300.59.170.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-5.3.18-150300.59.170.1.s390x as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.s390x"
},
"product_reference": "kernel-default-devel-5.3.18-150300.59.170.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-5.3.18-150300.59.170.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.x86_64"
},
"product_reference": "kernel-default-devel-5.3.18-150300.59.170.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-5.3.18-150300.59.170.1.noarch as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.170.1.noarch"
},
"product_reference": "kernel-devel-5.3.18-150300.59.170.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-docs-5.3.18-150300.59.170.2.noarch as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.170.2.noarch"
},
"product_reference": "kernel-docs-5.3.18-150300.59.170.2.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-5.3.18-150300.59.170.1.noarch as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.170.1.noarch"
},
"product_reference": "kernel-macros-5.3.18-150300.59.170.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-5.3.18-150300.59.170.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.aarch64"
},
"product_reference": "kernel-obs-build-5.3.18-150300.59.170.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-5.3.18-150300.59.170.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.ppc64le"
},
"product_reference": "kernel-obs-build-5.3.18-150300.59.170.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-5.3.18-150300.59.170.1.s390x as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.s390x"
},
"product_reference": "kernel-obs-build-5.3.18-150300.59.170.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-5.3.18-150300.59.170.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.x86_64"
},
"product_reference": "kernel-obs-build-5.3.18-150300.59.170.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-preempt-5.3.18-150300.59.170.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.170.1.aarch64"
},
"product_reference": "kernel-preempt-5.3.18-150300.59.170.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-preempt-5.3.18-150300.59.170.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.170.1.x86_64"
},
"product_reference": "kernel-preempt-5.3.18-150300.59.170.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-preempt-devel-5.3.18-150300.59.170.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.170.1.aarch64"
},
"product_reference": "kernel-preempt-devel-5.3.18-150300.59.170.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-preempt-devel-5.3.18-150300.59.170.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.170.1.x86_64"
},
"product_reference": "kernel-preempt-devel-5.3.18-150300.59.170.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-5.3.18-150300.59.170.1.noarch as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.170.1.noarch"
},
"product_reference": "kernel-source-5.3.18-150300.59.170.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-5.3.18-150300.59.170.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.aarch64"
},
"product_reference": "kernel-syms-5.3.18-150300.59.170.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-5.3.18-150300.59.170.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.ppc64le"
},
"product_reference": "kernel-syms-5.3.18-150300.59.170.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-5.3.18-150300.59.170.1.s390x as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.s390x"
},
"product_reference": "kernel-syms-5.3.18-150300.59.170.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-5.3.18-150300.59.170.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.x86_64"
},
"product_reference": "kernel-syms-5.3.18-150300.59.170.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-5.3.18-150300.59.170.1.s390x as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.170.1.s390x"
},
"product_reference": "kernel-zfcpdump-5.3.18-150300.59.170.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-5.3.18-150300.59.170.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.aarch64"
},
"product_reference": "reiserfs-kmp-default-5.3.18-150300.59.170.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-5.3.18-150300.59.170.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.ppc64le"
},
"product_reference": "reiserfs-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-5.3.18-150300.59.170.1.s390x as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.s390x"
},
"product_reference": "reiserfs-kmp-default-5.3.18-150300.59.170.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-5.3.18-150300.59.170.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.x86_64"
},
"product_reference": "reiserfs-kmp-default-5.3.18-150300.59.170.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.3.18-150300.59.170.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.170.1.ppc64le"
},
"product_reference": "kernel-default-5.3.18-150300.59.170.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.3.18-150300.59.170.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.170.1.x86_64"
},
"product_reference": "kernel-default-5.3.18-150300.59.170.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.ppc64le"
},
"product_reference": "kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64"
},
"product_reference": "kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-5.3.18-150300.59.170.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.170.1.ppc64le"
},
"product_reference": "kernel-default-devel-5.3.18-150300.59.170.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-5.3.18-150300.59.170.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.170.1.x86_64"
},
"product_reference": "kernel-default-devel-5.3.18-150300.59.170.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-5.3.18-150300.59.170.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.170.1.noarch"
},
"product_reference": "kernel-devel-5.3.18-150300.59.170.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-docs-5.3.18-150300.59.170.2.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.170.2.noarch"
},
"product_reference": "kernel-docs-5.3.18-150300.59.170.2.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-5.3.18-150300.59.170.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.170.1.noarch"
},
"product_reference": "kernel-macros-5.3.18-150300.59.170.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-5.3.18-150300.59.170.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.170.1.ppc64le"
},
"product_reference": "kernel-obs-build-5.3.18-150300.59.170.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-5.3.18-150300.59.170.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.170.1.x86_64"
},
"product_reference": "kernel-obs-build-5.3.18-150300.59.170.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-preempt-5.3.18-150300.59.170.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.170.1.x86_64"
},
"product_reference": "kernel-preempt-5.3.18-150300.59.170.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-preempt-devel-5.3.18-150300.59.170.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.170.1.x86_64"
},
"product_reference": "kernel-preempt-devel-5.3.18-150300.59.170.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-5.3.18-150300.59.170.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.170.1.noarch"
},
"product_reference": "kernel-source-5.3.18-150300.59.170.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-5.3.18-150300.59.170.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.170.1.ppc64le"
},
"product_reference": "kernel-syms-5.3.18-150300.59.170.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-5.3.18-150300.59.170.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.170.1.x86_64"
},
"product_reference": "kernel-syms-5.3.18-150300.59.170.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-5.3.18-150300.59.170.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.170.1.ppc64le"
},
"product_reference": "reiserfs-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-5.3.18-150300.59.170.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.170.1.x86_64"
},
"product_reference": "reiserfs-kmp-default-5.3.18-150300.59.170.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.3.18-150300.59.170.1.aarch64 as component of SUSE Linux Enterprise Micro 5.1",
"product_id": "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.170.1.aarch64"
},
"product_reference": "kernel-default-5.3.18-150300.59.170.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.3.18-150300.59.170.1.s390x as component of SUSE Linux Enterprise Micro 5.1",
"product_id": "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.170.1.s390x"
},
"product_reference": "kernel-default-5.3.18-150300.59.170.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.3.18-150300.59.170.1.x86_64 as component of SUSE Linux Enterprise Micro 5.1",
"product_id": "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.170.1.x86_64"
},
"product_reference": "kernel-default-5.3.18-150300.59.170.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64 as component of SUSE Linux Enterprise Micro 5.1",
"product_id": "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64"
},
"product_reference": "kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.s390x as component of SUSE Linux Enterprise Micro 5.1",
"product_id": "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.s390x"
},
"product_reference": "kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64 as component of SUSE Linux Enterprise Micro 5.1",
"product_id": "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64"
},
"product_reference": "kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.3.18-150300.59.170.1.aarch64 as component of SUSE Linux Enterprise Micro 5.2",
"product_id": "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.170.1.aarch64"
},
"product_reference": "kernel-default-5.3.18-150300.59.170.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.3.18-150300.59.170.1.s390x as component of SUSE Linux Enterprise Micro 5.2",
"product_id": "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.170.1.s390x"
},
"product_reference": "kernel-default-5.3.18-150300.59.170.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.3.18-150300.59.170.1.x86_64 as component of SUSE Linux Enterprise Micro 5.2",
"product_id": "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.170.1.x86_64"
},
"product_reference": "kernel-default-5.3.18-150300.59.170.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64 as component of SUSE Linux Enterprise Micro 5.2",
"product_id": "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64"
},
"product_reference": "kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64 as component of SUSE Linux Enterprise Micro 5.2",
"product_id": "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64"
},
"product_reference": "kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64kb-5.3.18-150300.59.170.1.aarch64 as component of SUSE Enterprise Storage 7.1",
"product_id": "SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.170.1.aarch64"
},
"product_reference": "kernel-64kb-5.3.18-150300.59.170.1.aarch64",
"relates_to_product_reference": "SUSE Enterprise Storage 7.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64kb-devel-5.3.18-150300.59.170.1.aarch64 as component of SUSE Enterprise Storage 7.1",
"product_id": "SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.170.1.aarch64"
},
"product_reference": "kernel-64kb-devel-5.3.18-150300.59.170.1.aarch64",
"relates_to_product_reference": "SUSE Enterprise Storage 7.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.3.18-150300.59.170.1.aarch64 as component of SUSE Enterprise Storage 7.1",
"product_id": "SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.170.1.aarch64"
},
"product_reference": "kernel-default-5.3.18-150300.59.170.1.aarch64",
"relates_to_product_reference": "SUSE Enterprise Storage 7.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.3.18-150300.59.170.1.x86_64 as component of SUSE Enterprise Storage 7.1",
"product_id": "SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.170.1.x86_64"
},
"product_reference": "kernel-default-5.3.18-150300.59.170.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 7.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64 as component of SUSE Enterprise Storage 7.1",
"product_id": "SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64"
},
"product_reference": "kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"relates_to_product_reference": "SUSE Enterprise Storage 7.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64 as component of SUSE Enterprise Storage 7.1",
"product_id": "SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64"
},
"product_reference": "kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 7.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-5.3.18-150300.59.170.1.aarch64 as component of SUSE Enterprise Storage 7.1",
"product_id": "SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.170.1.aarch64"
},
"product_reference": "kernel-default-devel-5.3.18-150300.59.170.1.aarch64",
"relates_to_product_reference": "SUSE Enterprise Storage 7.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-5.3.18-150300.59.170.1.x86_64 as component of SUSE Enterprise Storage 7.1",
"product_id": "SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.170.1.x86_64"
},
"product_reference": "kernel-default-devel-5.3.18-150300.59.170.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 7.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-5.3.18-150300.59.170.1.noarch as component of SUSE Enterprise Storage 7.1",
"product_id": "SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.170.1.noarch"
},
"product_reference": "kernel-devel-5.3.18-150300.59.170.1.noarch",
"relates_to_product_reference": "SUSE Enterprise Storage 7.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-docs-5.3.18-150300.59.170.2.noarch as component of SUSE Enterprise Storage 7.1",
"product_id": "SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.170.2.noarch"
},
"product_reference": "kernel-docs-5.3.18-150300.59.170.2.noarch",
"relates_to_product_reference": "SUSE Enterprise Storage 7.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-5.3.18-150300.59.170.1.noarch as component of SUSE Enterprise Storage 7.1",
"product_id": "SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.170.1.noarch"
},
"product_reference": "kernel-macros-5.3.18-150300.59.170.1.noarch",
"relates_to_product_reference": "SUSE Enterprise Storage 7.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-5.3.18-150300.59.170.1.aarch64 as component of SUSE Enterprise Storage 7.1",
"product_id": "SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.170.1.aarch64"
},
"product_reference": "kernel-obs-build-5.3.18-150300.59.170.1.aarch64",
"relates_to_product_reference": "SUSE Enterprise Storage 7.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-5.3.18-150300.59.170.1.x86_64 as component of SUSE Enterprise Storage 7.1",
"product_id": "SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.170.1.x86_64"
},
"product_reference": "kernel-obs-build-5.3.18-150300.59.170.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 7.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-preempt-5.3.18-150300.59.170.1.aarch64 as component of SUSE Enterprise Storage 7.1",
"product_id": "SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.170.1.aarch64"
},
"product_reference": "kernel-preempt-5.3.18-150300.59.170.1.aarch64",
"relates_to_product_reference": "SUSE Enterprise Storage 7.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-preempt-5.3.18-150300.59.170.1.x86_64 as component of SUSE Enterprise Storage 7.1",
"product_id": "SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.170.1.x86_64"
},
"product_reference": "kernel-preempt-5.3.18-150300.59.170.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 7.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-preempt-devel-5.3.18-150300.59.170.1.aarch64 as component of SUSE Enterprise Storage 7.1",
"product_id": "SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.170.1.aarch64"
},
"product_reference": "kernel-preempt-devel-5.3.18-150300.59.170.1.aarch64",
"relates_to_product_reference": "SUSE Enterprise Storage 7.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-preempt-devel-5.3.18-150300.59.170.1.x86_64 as component of SUSE Enterprise Storage 7.1",
"product_id": "SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.170.1.x86_64"
},
"product_reference": "kernel-preempt-devel-5.3.18-150300.59.170.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 7.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-5.3.18-150300.59.170.1.noarch as component of SUSE Enterprise Storage 7.1",
"product_id": "SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.170.1.noarch"
},
"product_reference": "kernel-source-5.3.18-150300.59.170.1.noarch",
"relates_to_product_reference": "SUSE Enterprise Storage 7.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-5.3.18-150300.59.170.1.aarch64 as component of SUSE Enterprise Storage 7.1",
"product_id": "SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.170.1.aarch64"
},
"product_reference": "kernel-syms-5.3.18-150300.59.170.1.aarch64",
"relates_to_product_reference": "SUSE Enterprise Storage 7.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-5.3.18-150300.59.170.1.x86_64 as component of SUSE Enterprise Storage 7.1",
"product_id": "SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.170.1.x86_64"
},
"product_reference": "kernel-syms-5.3.18-150300.59.170.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 7.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-5.3.18-150300.59.170.1.aarch64 as component of SUSE Enterprise Storage 7.1",
"product_id": "SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.170.1.aarch64"
},
"product_reference": "reiserfs-kmp-default-5.3.18-150300.59.170.1.aarch64",
"relates_to_product_reference": "SUSE Enterprise Storage 7.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-5.3.18-150300.59.170.1.x86_64 as component of SUSE Enterprise Storage 7.1",
"product_id": "SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.170.1.x86_64"
},
"product_reference": "reiserfs-kmp-default-5.3.18-150300.59.170.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 7.1"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2020-26558",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-26558"
}
],
"notes": [
{
"category": "general",
"text": "Bluetooth LE and BR/EDR secure pairing in Bluetooth Core Specification 2.1 through 5.2 may permit a nearby man-in-the-middle attacker to identify the Passkey used during pairing (in the Passkey authentication procedure) by reflection of the public key and the authentication evidence of the initiating device, potentially permitting this attacker to complete authenticated pairing with the responding device using the correct Passkey for the pairing session. The attack methodology determines the Passkey value one bit at a time.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.170.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.170.2.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.170.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.170.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.170.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_170-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_170-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_170-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.170.2.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.170.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.170.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-26558",
"url": "https://www.suse.com/security/cve/CVE-2020-26558"
},
{
"category": "external",
"summary": "SUSE Bug 1179610 for CVE-2020-26558",
"url": "https://bugzilla.suse.com/1179610"
},
{
"category": "external",
"summary": "SUSE Bug 1186463 for CVE-2020-26558",
"url": "https://bugzilla.suse.com/1186463"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.170.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.170.2.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.170.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.170.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.170.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_170-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_170-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_170-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.170.2.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.170.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.170.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.170.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.170.2.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.170.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.170.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.170.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_170-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_170-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_170-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.170.2.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.170.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.170.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-16T13:48:15Z",
"details": "moderate"
}
],
"title": "CVE-2020-26558"
},
{
"cve": "CVE-2021-0129",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-0129"
}
],
"notes": [
{
"category": "general",
"text": "Improper access control in BlueZ may allow an authenticated user to potentially enable information disclosure via adjacent access.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.170.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.170.2.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.170.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.170.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.170.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_170-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_170-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_170-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.170.2.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.170.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.170.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-0129",
"url": "https://www.suse.com/security/cve/CVE-2021-0129"
},
{
"category": "external",
"summary": "SUSE Bug 1186463 for CVE-2021-0129",
"url": "https://bugzilla.suse.com/1186463"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.170.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.170.2.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.170.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.170.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.170.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_170-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_170-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_170-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.170.2.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.170.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.170.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.170.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.170.2.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.170.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.170.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.170.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_170-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_170-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_170-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.170.2.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.170.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.170.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-16T13:48:15Z",
"details": "moderate"
}
],
"title": "CVE-2021-0129"
},
{
"cve": "CVE-2021-47126",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47126"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nipv6: Fix KASAN: slab-out-of-bounds Read in fib6_nh_flush_exceptions\n\nReported by syzbot:\nHEAD commit: 90c911ad Merge tag \u0027fixes\u0027 of git://git.kernel.org/pub/scm..\ngit tree: git://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git master\ndashboard link: https://syzkaller.appspot.com/bug?extid=123aa35098fd3c000eb7\ncompiler: Debian clang version 11.0.1-2\n\n==================================================================\nBUG: KASAN: slab-out-of-bounds in fib6_nh_get_excptn_bucket net/ipv6/route.c:1604 [inline]\nBUG: KASAN: slab-out-of-bounds in fib6_nh_flush_exceptions+0xbd/0x360 net/ipv6/route.c:1732\nRead of size 8 at addr ffff8880145c78f8 by task syz-executor.4/17760\n\nCPU: 0 PID: 17760 Comm: syz-executor.4 Not tainted 5.12.0-rc8-syzkaller #0\nCall Trace:\n \u003cIRQ\u003e\n __dump_stack lib/dump_stack.c:79 [inline]\n dump_stack+0x202/0x31e lib/dump_stack.c:120\n print_address_description+0x5f/0x3b0 mm/kasan/report.c:232\n __kasan_report mm/kasan/report.c:399 [inline]\n kasan_report+0x15c/0x200 mm/kasan/report.c:416\n fib6_nh_get_excptn_bucket net/ipv6/route.c:1604 [inline]\n fib6_nh_flush_exceptions+0xbd/0x360 net/ipv6/route.c:1732\n fib6_nh_release+0x9a/0x430 net/ipv6/route.c:3536\n fib6_info_destroy_rcu+0xcb/0x1c0 net/ipv6/ip6_fib.c:174\n rcu_do_batch kernel/rcu/tree.c:2559 [inline]\n rcu_core+0x8f6/0x1450 kernel/rcu/tree.c:2794\n __do_softirq+0x372/0x7a6 kernel/softirq.c:345\n invoke_softirq kernel/softirq.c:221 [inline]\n __irq_exit_rcu+0x22c/0x260 kernel/softirq.c:422\n irq_exit_rcu+0x5/0x20 kernel/softirq.c:434\n sysvec_apic_timer_interrupt+0x91/0xb0 arch/x86/kernel/apic/apic.c:1100\n \u003c/IRQ\u003e\n asm_sysvec_apic_timer_interrupt+0x12/0x20 arch/x86/include/asm/idtentry.h:632\nRIP: 0010:lock_acquire+0x1f6/0x720 kernel/locking/lockdep.c:5515\nCode: f6 84 24 a1 00 00 00 02 0f 85 8d 02 00 00 f7 c3 00 02 00 00 49 bd 00 00 00 00 00 fc ff df 74 01 fb 48 c7 44 24 40 0e 36 e0 45 \u003c4b\u003e c7 44 3d 00 00 00 00 00 4b c7 44 3d 09 00 00 00 00 43 c7 44 3d\nRSP: 0018:ffffc90009e06560 EFLAGS: 00000206\nRAX: 1ffff920013c0cc0 RBX: 0000000000000246 RCX: dffffc0000000000\nRDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000\nRBP: ffffc90009e066e0 R08: dffffc0000000000 R09: fffffbfff1f992b1\nR10: fffffbfff1f992b1 R11: 0000000000000000 R12: 0000000000000000\nR13: dffffc0000000000 R14: 0000000000000000 R15: 1ffff920013c0cb4\n rcu_lock_acquire+0x2a/0x30 include/linux/rcupdate.h:267\n rcu_read_lock include/linux/rcupdate.h:656 [inline]\n ext4_get_group_info+0xea/0x340 fs/ext4/ext4.h:3231\n ext4_mb_prefetch+0x123/0x5d0 fs/ext4/mballoc.c:2212\n ext4_mb_regular_allocator+0x8a5/0x28f0 fs/ext4/mballoc.c:2379\n ext4_mb_new_blocks+0xc6e/0x24f0 fs/ext4/mballoc.c:4982\n ext4_ext_map_blocks+0x2be3/0x7210 fs/ext4/extents.c:4238\n ext4_map_blocks+0xab3/0x1cb0 fs/ext4/inode.c:638\n ext4_getblk+0x187/0x6c0 fs/ext4/inode.c:848\n ext4_bread+0x2a/0x1c0 fs/ext4/inode.c:900\n ext4_append+0x1a4/0x360 fs/ext4/namei.c:67\n ext4_init_new_dir+0x337/0xa10 fs/ext4/namei.c:2768\n ext4_mkdir+0x4b8/0xc00 fs/ext4/namei.c:2814\n vfs_mkdir+0x45b/0x640 fs/namei.c:3819\n ovl_do_mkdir fs/overlayfs/overlayfs.h:161 [inline]\n ovl_mkdir_real+0x53/0x1a0 fs/overlayfs/dir.c:146\n ovl_create_real+0x280/0x490 fs/overlayfs/dir.c:193\n ovl_workdir_create+0x425/0x600 fs/overlayfs/super.c:788\n ovl_make_workdir+0xed/0x1140 fs/overlayfs/super.c:1355\n ovl_get_workdir fs/overlayfs/super.c:1492 [inline]\n ovl_fill_super+0x39ee/0x5370 fs/overlayfs/super.c:2035\n mount_nodev+0x52/0xe0 fs/super.c:1413\n legacy_get_tree+0xea/0x180 fs/fs_context.c:592\n vfs_get_tree+0x86/0x270 fs/super.c:1497\n do_new_mount fs/namespace.c:2903 [inline]\n path_mount+0x196f/0x2be0 fs/namespace.c:3233\n do_mount fs/namespace.c:3246 [inline]\n __do_sys_mount fs/namespace.c:3454 [inline]\n __se_sys_mount+0x2f9/0x3b0 fs/namespace.c:3431\n do_syscall_64+0x2d/0x70 arch/x86/entry/common.c:46\n entry_SYSCALL_64_after_hwframe+0x44/0xae\nRIP: 0033:0x4665f9\nCode: ff ff c3 66 2e 0f 1f 84 \n---truncated---",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.170.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.170.2.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.170.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.170.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.170.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_170-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_170-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_170-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.170.2.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.170.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.170.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47126",
"url": "https://www.suse.com/security/cve/CVE-2021-47126"
},
{
"category": "external",
"summary": "SUSE Bug 1221539 for CVE-2021-47126",
"url": "https://bugzilla.suse.com/1221539"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.170.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.170.2.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.170.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.170.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.170.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_170-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_170-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_170-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.170.2.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.170.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.170.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.170.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.170.2.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.170.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.170.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.170.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_170-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_170-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_170-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.170.2.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.170.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.170.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-16T13:48:15Z",
"details": "moderate"
}
],
"title": "CVE-2021-47126"
},
{
"cve": "CVE-2021-47219",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47219"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: scsi_debug: Fix out-of-bound read in resp_report_tgtpgs()\n\nThe following issue was observed running syzkaller:\n\nBUG: KASAN: slab-out-of-bounds in memcpy include/linux/string.h:377 [inline]\nBUG: KASAN: slab-out-of-bounds in sg_copy_buffer+0x150/0x1c0 lib/scatterlist.c:831\nRead of size 2132 at addr ffff8880aea95dc8 by task syz-executor.0/9815\n\nCPU: 0 PID: 9815 Comm: syz-executor.0 Not tainted 4.19.202-00874-gfc0fe04215a9 #2\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.10.2-1ubuntu1 04/01/2014\nCall Trace:\n __dump_stack lib/dump_stack.c:77 [inline]\n dump_stack+0xe4/0x14a lib/dump_stack.c:118\n print_address_description+0x73/0x280 mm/kasan/report.c:253\n kasan_report_error mm/kasan/report.c:352 [inline]\n kasan_report+0x272/0x370 mm/kasan/report.c:410\n memcpy+0x1f/0x50 mm/kasan/kasan.c:302\n memcpy include/linux/string.h:377 [inline]\n sg_copy_buffer+0x150/0x1c0 lib/scatterlist.c:831\n fill_from_dev_buffer+0x14f/0x340 drivers/scsi/scsi_debug.c:1021\n resp_report_tgtpgs+0x5aa/0x770 drivers/scsi/scsi_debug.c:1772\n schedule_resp+0x464/0x12f0 drivers/scsi/scsi_debug.c:4429\n scsi_debug_queuecommand+0x467/0x1390 drivers/scsi/scsi_debug.c:5835\n scsi_dispatch_cmd+0x3fc/0x9b0 drivers/scsi/scsi_lib.c:1896\n scsi_request_fn+0x1042/0x1810 drivers/scsi/scsi_lib.c:2034\n __blk_run_queue_uncond block/blk-core.c:464 [inline]\n __blk_run_queue+0x1a4/0x380 block/blk-core.c:484\n blk_execute_rq_nowait+0x1c2/0x2d0 block/blk-exec.c:78\n sg_common_write.isra.19+0xd74/0x1dc0 drivers/scsi/sg.c:847\n sg_write.part.23+0x6e0/0xd00 drivers/scsi/sg.c:716\n sg_write+0x64/0xa0 drivers/scsi/sg.c:622\n __vfs_write+0xed/0x690 fs/read_write.c:485\nkill_bdev:block_device:00000000e138492c\n vfs_write+0x184/0x4c0 fs/read_write.c:549\n ksys_write+0x107/0x240 fs/read_write.c:599\n do_syscall_64+0xc2/0x560 arch/x86/entry/common.c:293\n entry_SYSCALL_64_after_hwframe+0x49/0xbe\n\nWe get \u0027alen\u0027 from command its type is int. If userspace passes a large\nlength we will get a negative \u0027alen\u0027.\n\nSwitch n, alen, and rlen to u32.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.170.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.170.2.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.170.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.170.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.170.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_170-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_170-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_170-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.170.2.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.170.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.170.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47219",
"url": "https://www.suse.com/security/cve/CVE-2021-47219"
},
{
"category": "external",
"summary": "SUSE Bug 1222824 for CVE-2021-47219",
"url": "https://bugzilla.suse.com/1222824"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.170.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.170.2.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.170.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.170.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.170.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_170-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_170-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_170-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.170.2.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.170.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.170.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.170.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.170.2.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.170.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.170.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.170.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_170-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_170-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_170-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.170.2.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.170.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.170.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-16T13:48:15Z",
"details": "moderate"
}
],
"title": "CVE-2021-47219"
},
{
"cve": "CVE-2021-47291",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47291"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nipv6: fix another slab-out-of-bounds in fib6_nh_flush_exceptions\n\nWhile running the self-tests on a KASAN enabled kernel, I observed a\nslab-out-of-bounds splat very similar to the one reported in\ncommit 821bbf79fe46 (\"ipv6: Fix KASAN: slab-out-of-bounds Read in\n fib6_nh_flush_exceptions\").\n\nWe additionally need to take care of fib6_metrics initialization\nfailure when the caller provides an nh.\n\nThe fix is similar, explicitly free the route instead of calling\nfib6_info_release on a half-initialized object.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.170.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.170.2.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.170.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.170.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.170.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_170-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_170-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_170-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.170.2.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.170.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.170.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47291",
"url": "https://www.suse.com/security/cve/CVE-2021-47291"
},
{
"category": "external",
"summary": "SUSE Bug 1224918 for CVE-2021-47291",
"url": "https://bugzilla.suse.com/1224918"
},
{
"category": "external",
"summary": "SUSE Bug 1227651 for CVE-2021-47291",
"url": "https://bugzilla.suse.com/1227651"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.170.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.170.2.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.170.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.170.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.170.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_170-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_170-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_170-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.170.2.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.170.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.170.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.170.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.170.2.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.170.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.170.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.170.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_170-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_170-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_170-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.170.2.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.170.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.170.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-16T13:48:15Z",
"details": "important"
}
],
"title": "CVE-2021-47291"
},
{
"cve": "CVE-2021-47506",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47506"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnfsd: fix use-after-free due to delegation race\n\nA delegation break could arrive as soon as we\u0027ve called vfs_setlease. A\ndelegation break runs a callback which immediately (in\nnfsd4_cb_recall_prepare) adds the delegation to del_recall_lru. If we\nthen exit nfs4_set_delegation without hashing the delegation, it will be\nfreed as soon as the callback is done with it, without ever being\nremoved from del_recall_lru.\n\nSymptoms show up later as use-after-free or list corruption warnings,\nusually in the laundromat thread.\n\nI suspect aba2072f4523 \"nfsd: grant read delegations to clients holding\nwrites\" made this bug easier to hit, but I looked as far back as v3.0\nand it looks to me it already had the same problem. So I\u0027m not sure\nwhere the bug was introduced; it may have been there from the beginning.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.170.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.170.2.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.170.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.170.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.170.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_170-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_170-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_170-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.170.2.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.170.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.170.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47506",
"url": "https://www.suse.com/security/cve/CVE-2021-47506"
},
{
"category": "external",
"summary": "SUSE Bug 1225404 for CVE-2021-47506",
"url": "https://bugzilla.suse.com/1225404"
},
{
"category": "external",
"summary": "SUSE Bug 1227497 for CVE-2021-47506",
"url": "https://bugzilla.suse.com/1227497"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.170.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.170.2.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.170.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.170.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.170.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_170-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_170-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_170-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.170.2.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.170.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.170.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.170.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.170.2.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.170.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.170.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.170.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_170-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_170-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_170-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.170.2.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.170.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.170.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-16T13:48:15Z",
"details": "moderate"
}
],
"title": "CVE-2021-47506"
},
{
"cve": "CVE-2021-47520",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47520"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncan: pch_can: pch_can_rx_normal: fix use after free\n\nAfter calling netif_receive_skb(skb), dereferencing skb is unsafe.\nEspecially, the can_frame cf which aliases skb memory is dereferenced\njust after the call netif_receive_skb(skb).\n\nReordering the lines solves the issue.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.170.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.170.2.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.170.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.170.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.170.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_170-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_170-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_170-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.170.2.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.170.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.170.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47520",
"url": "https://www.suse.com/security/cve/CVE-2021-47520"
},
{
"category": "external",
"summary": "SUSE Bug 1225431 for CVE-2021-47520",
"url": "https://bugzilla.suse.com/1225431"
},
{
"category": "external",
"summary": "SUSE Bug 1227905 for CVE-2021-47520",
"url": "https://bugzilla.suse.com/1227905"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.170.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.170.2.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.170.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.170.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.170.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_170-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_170-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_170-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.170.2.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.170.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.170.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.170.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.170.2.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.170.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.170.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.170.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_170-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_170-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_170-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.170.2.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.170.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.170.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-16T13:48:15Z",
"details": "important"
}
],
"title": "CVE-2021-47520"
},
{
"cve": "CVE-2021-47580",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47580"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: scsi_debug: Fix type in min_t to avoid stack OOB\n\nChange min_t() to use type \"u32\" instead of type \"int\" to avoid stack out\nof bounds. With min_t() type \"int\" the values get sign extended and the\nlarger value gets used causing stack out of bounds.\n\nBUG: KASAN: stack-out-of-bounds in memcpy include/linux/fortify-string.h:191 [inline]\nBUG: KASAN: stack-out-of-bounds in sg_copy_buffer+0x1de/0x240 lib/scatterlist.c:976\nRead of size 127 at addr ffff888072607128 by task syz-executor.7/18707\n\nCPU: 1 PID: 18707 Comm: syz-executor.7 Not tainted 5.15.0-syzk #1\nHardware name: Red Hat KVM, BIOS 1.13.0-2\nCall Trace:\n __dump_stack lib/dump_stack.c:88 [inline]\n dump_stack_lvl+0x89/0xb5 lib/dump_stack.c:106\n print_address_description.constprop.9+0x28/0x160 mm/kasan/report.c:256\n __kasan_report mm/kasan/report.c:442 [inline]\n kasan_report.cold.14+0x7d/0x117 mm/kasan/report.c:459\n check_region_inline mm/kasan/generic.c:183 [inline]\n kasan_check_range+0x1a3/0x210 mm/kasan/generic.c:189\n memcpy+0x23/0x60 mm/kasan/shadow.c:65\n memcpy include/linux/fortify-string.h:191 [inline]\n sg_copy_buffer+0x1de/0x240 lib/scatterlist.c:976\n sg_copy_from_buffer+0x33/0x40 lib/scatterlist.c:1000\n fill_from_dev_buffer.part.34+0x82/0x130 drivers/scsi/scsi_debug.c:1162\n fill_from_dev_buffer drivers/scsi/scsi_debug.c:1888 [inline]\n resp_readcap16+0x365/0x3b0 drivers/scsi/scsi_debug.c:1887\n schedule_resp+0x4d8/0x1a70 drivers/scsi/scsi_debug.c:5478\n scsi_debug_queuecommand+0x8c9/0x1ec0 drivers/scsi/scsi_debug.c:7533\n scsi_dispatch_cmd drivers/scsi/scsi_lib.c:1520 [inline]\n scsi_queue_rq+0x16b0/0x2d40 drivers/scsi/scsi_lib.c:1699\n blk_mq_dispatch_rq_list+0xb9b/0x2700 block/blk-mq.c:1639\n __blk_mq_sched_dispatch_requests+0x28f/0x590 block/blk-mq-sched.c:325\n blk_mq_sched_dispatch_requests+0x105/0x190 block/blk-mq-sched.c:358\n __blk_mq_run_hw_queue+0xe5/0x150 block/blk-mq.c:1761\n __blk_mq_delay_run_hw_queue+0x4f8/0x5c0 block/blk-mq.c:1838\n blk_mq_run_hw_queue+0x18d/0x350 block/blk-mq.c:1891\n blk_mq_sched_insert_request+0x3db/0x4e0 block/blk-mq-sched.c:474\n blk_execute_rq_nowait+0x16b/0x1c0 block/blk-exec.c:62\n sg_common_write.isra.18+0xeb3/0x2000 drivers/scsi/sg.c:836\n sg_new_write.isra.19+0x570/0x8c0 drivers/scsi/sg.c:774\n sg_ioctl_common+0x14d6/0x2710 drivers/scsi/sg.c:939\n sg_ioctl+0xa2/0x180 drivers/scsi/sg.c:1165\n vfs_ioctl fs/ioctl.c:51 [inline]\n __do_sys_ioctl fs/ioctl.c:874 [inline]\n __se_sys_ioctl fs/ioctl.c:860 [inline]\n __x64_sys_ioctl+0x19d/0x220 fs/ioctl.c:860\n do_syscall_x64 arch/x86/entry/common.c:50 [inline]\n do_syscall_64+0x3a/0x80 arch/x86/entry/common.c:80\n entry_SYSCALL_64_after_hwframe+0x44/0xae",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.170.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.170.2.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.170.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.170.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.170.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_170-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_170-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_170-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.170.2.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.170.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.170.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47580",
"url": "https://www.suse.com/security/cve/CVE-2021-47580"
},
{
"category": "external",
"summary": "SUSE Bug 1226550 for CVE-2021-47580",
"url": "https://bugzilla.suse.com/1226550"
},
{
"category": "external",
"summary": "SUSE Bug 1227611 for CVE-2021-47580",
"url": "https://bugzilla.suse.com/1227611"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.170.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.170.2.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.170.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.170.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.170.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_170-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_170-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_170-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.170.2.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.170.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.170.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:L",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.170.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.170.2.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.170.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.170.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.170.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_170-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_170-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_170-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.170.2.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.170.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.170.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-16T13:48:15Z",
"details": "moderate"
}
],
"title": "CVE-2021-47580"
},
{
"cve": "CVE-2021-47598",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47598"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsch_cake: do not call cake_destroy() from cake_init()\n\nqdiscs are not supposed to call their own destroy() method\nfrom init(), because core stack already does that.\n\nsyzbot was able to trigger use after free:\n\nDEBUG_LOCKS_WARN_ON(lock-\u003emagic != lock)\nWARNING: CPU: 0 PID: 21902 at kernel/locking/mutex.c:586 __mutex_lock_common kernel/locking/mutex.c:586 [inline]\nWARNING: CPU: 0 PID: 21902 at kernel/locking/mutex.c:586 __mutex_lock+0x9ec/0x12f0 kernel/locking/mutex.c:740\nModules linked in:\nCPU: 0 PID: 21902 Comm: syz-executor189 Not tainted 5.16.0-rc4-syzkaller #0\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011\nRIP: 0010:__mutex_lock_common kernel/locking/mutex.c:586 [inline]\nRIP: 0010:__mutex_lock+0x9ec/0x12f0 kernel/locking/mutex.c:740\nCode: 08 84 d2 0f 85 19 08 00 00 8b 05 97 38 4b 04 85 c0 0f 85 27 f7 ff ff 48 c7 c6 20 00 ac 89 48 c7 c7 a0 fe ab 89 e8 bf 76 ba ff \u003c0f\u003e 0b e9 0d f7 ff ff 48 8b 44 24 40 48 8d b8 c8 08 00 00 48 89 f8\nRSP: 0018:ffffc9000627f290 EFLAGS: 00010282\nRAX: 0000000000000000 RBX: 0000000000000000 RCX: 0000000000000000\nRDX: ffff88802315d700 RSI: ffffffff815f1db8 RDI: fffff52000c4fe44\nRBP: ffff88818f28e000 R08: 0000000000000000 R09: 0000000000000000\nR10: ffffffff815ebb5e R11: 0000000000000000 R12: 0000000000000000\nR13: dffffc0000000000 R14: ffffc9000627f458 R15: 0000000093c30000\nFS: 0000555556abc400(0000) GS:ffff8880b9c00000(0000) knlGS:0000000000000000\nCS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 00007fda689c3303 CR3: 000000001cfbb000 CR4: 0000000000350ef0\nCall Trace:\n \u003cTASK\u003e\n tcf_chain0_head_change_cb_del+0x2e/0x3d0 net/sched/cls_api.c:810\n tcf_block_put_ext net/sched/cls_api.c:1381 [inline]\n tcf_block_put_ext net/sched/cls_api.c:1376 [inline]\n tcf_block_put+0xbc/0x130 net/sched/cls_api.c:1394\n cake_destroy+0x3f/0x80 net/sched/sch_cake.c:2695\n qdisc_create.constprop.0+0x9da/0x10f0 net/sched/sch_api.c:1293\n tc_modify_qdisc+0x4c5/0x1980 net/sched/sch_api.c:1660\n rtnetlink_rcv_msg+0x413/0xb80 net/core/rtnetlink.c:5571\n netlink_rcv_skb+0x153/0x420 net/netlink/af_netlink.c:2496\n netlink_unicast_kernel net/netlink/af_netlink.c:1319 [inline]\n netlink_unicast+0x533/0x7d0 net/netlink/af_netlink.c:1345\n netlink_sendmsg+0x904/0xdf0 net/netlink/af_netlink.c:1921\n sock_sendmsg_nosec net/socket.c:704 [inline]\n sock_sendmsg+0xcf/0x120 net/socket.c:724\n ____sys_sendmsg+0x6e8/0x810 net/socket.c:2409\n ___sys_sendmsg+0xf3/0x170 net/socket.c:2463\n __sys_sendmsg+0xe5/0x1b0 net/socket.c:2492\n do_syscall_x64 arch/x86/entry/common.c:50 [inline]\n do_syscall_64+0x35/0xb0 arch/x86/entry/common.c:80\n entry_SYSCALL_64_after_hwframe+0x44/0xae\nRIP: 0033:0x7f1bb06badb9\nCode: Unable to access opcode bytes at RIP 0x7f1bb06bad8f.\nRSP: 002b:00007fff3012a658 EFLAGS: 00000246 ORIG_RAX: 000000000000002e\nRAX: ffffffffffffffda RBX: 0000000000000003 RCX: 00007f1bb06badb9\nRDX: 0000000000000000 RSI: 00000000200007c0 RDI: 0000000000000003\nRBP: 0000000000000000 R08: 0000000000000003 R09: 0000000000000003\nR10: 0000000000000003 R11: 0000000000000246 R12: 00007fff3012a688\nR13: 00007fff3012a6a0 R14: 00007fff3012a6e0 R15: 00000000000013c2\n \u003c/TASK\u003e",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.170.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.170.2.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.170.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.170.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.170.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_170-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_170-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_170-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.170.2.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.170.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.170.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47598",
"url": "https://www.suse.com/security/cve/CVE-2021-47598"
},
{
"category": "external",
"summary": "SUSE Bug 1226574 for CVE-2021-47598",
"url": "https://bugzilla.suse.com/1226574"
},
{
"category": "external",
"summary": "SUSE Bug 1227471 for CVE-2021-47598",
"url": "https://bugzilla.suse.com/1227471"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.170.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.170.2.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.170.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.170.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.170.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_170-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_170-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_170-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.170.2.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.170.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.170.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.170.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.170.2.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.170.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.170.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.170.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_170-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_170-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_170-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.170.2.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.170.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.170.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-16T13:48:15Z",
"details": "important"
}
],
"title": "CVE-2021-47598"
},
{
"cve": "CVE-2021-47600",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47600"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndm btree remove: fix use after free in rebalance_children()\n\nMove dm_tm_unlock() after dm_tm_dec().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.170.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.170.2.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.170.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.170.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.170.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_170-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_170-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_170-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.170.2.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.170.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.170.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47600",
"url": "https://www.suse.com/security/cve/CVE-2021-47600"
},
{
"category": "external",
"summary": "SUSE Bug 1226575 for CVE-2021-47600",
"url": "https://bugzilla.suse.com/1226575"
},
{
"category": "external",
"summary": "SUSE Bug 1227472 for CVE-2021-47600",
"url": "https://bugzilla.suse.com/1227472"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.170.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.170.2.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.170.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.170.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.170.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_170-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_170-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_170-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.170.2.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.170.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.170.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.170.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.170.2.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.170.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.170.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.170.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_170-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_170-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_170-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.170.2.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.170.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.170.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-16T13:48:15Z",
"details": "moderate"
}
],
"title": "CVE-2021-47600"
},
{
"cve": "CVE-2022-48792",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-48792"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: pm8001: Fix use-after-free for aborted SSP/STP sas_task\n\nCurrently a use-after-free may occur if a sas_task is aborted by the upper\nlayer before we handle the I/O completion in mpi_ssp_completion() or\nmpi_sata_completion().\n\nIn this case, the following are the two steps in handling those I/O\ncompletions:\n\n - Call complete() to inform the upper layer handler of completion of\n the I/O.\n\n - Release driver resources associated with the sas_task in\n pm8001_ccb_task_free() call.\n\nWhen complete() is called, the upper layer may free the sas_task. As such,\nwe should not touch the associated sas_task afterwards, but we do so in the\npm8001_ccb_task_free() call.\n\nFix by swapping the complete() and pm8001_ccb_task_free() calls ordering.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.170.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.170.2.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.170.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.170.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.170.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_170-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_170-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_170-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.170.2.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.170.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.170.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-48792",
"url": "https://www.suse.com/security/cve/CVE-2022-48792"
},
{
"category": "external",
"summary": "SUSE Bug 1228013 for CVE-2022-48792",
"url": "https://bugzilla.suse.com/1228013"
},
{
"category": "external",
"summary": "SUSE Bug 1228017 for CVE-2022-48792",
"url": "https://bugzilla.suse.com/1228017"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.170.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.170.2.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.170.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.170.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.170.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_170-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_170-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_170-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.170.2.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.170.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.170.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.170.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.170.2.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.170.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.170.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.170.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_170-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_170-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_170-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.170.2.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.170.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.170.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-16T13:48:15Z",
"details": "moderate"
}
],
"title": "CVE-2022-48792"
},
{
"cve": "CVE-2022-48821",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-48821"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmisc: fastrpc: avoid double fput() on failed usercopy\n\nIf the copy back to userland fails for the FASTRPC_IOCTL_ALLOC_DMA_BUFF\nioctl(), we shouldn\u0027t assume that \u0027buf-\u003edmabuf\u0027 is still valid. In fact,\ndma_buf_fd() called fd_install() before, i.e. \"consumed\" one reference,\nleaving us with none.\n\nCalling dma_buf_put() will therefore put a reference we no longer own,\nleading to a valid file descritor table entry for an already released\n\u0027file\u0027 object which is a straight use-after-free.\n\nSimply avoid calling dma_buf_put() and rely on the process exit code to\ndo the necessary cleanup, if needed, i.e. if the file descriptor is\nstill valid.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.170.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.170.2.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.170.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.170.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.170.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_170-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_170-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_170-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.170.2.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.170.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.170.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-48821",
"url": "https://www.suse.com/security/cve/CVE-2022-48821"
},
{
"category": "external",
"summary": "SUSE Bug 1227976 for CVE-2022-48821",
"url": "https://bugzilla.suse.com/1227976"
},
{
"category": "external",
"summary": "SUSE Bug 1228022 for CVE-2022-48821",
"url": "https://bugzilla.suse.com/1228022"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.170.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.170.2.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.170.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.170.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.170.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_170-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_170-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_170-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.170.2.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.170.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.170.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.170.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.170.2.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.170.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.170.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.170.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_170-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_170-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_170-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.170.2.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.170.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.170.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-16T13:48:15Z",
"details": "important"
}
],
"title": "CVE-2022-48821"
},
{
"cve": "CVE-2022-48822",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-48822"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nusb: f_fs: Fix use-after-free for epfile\n\nConsider a case where ffs_func_eps_disable is called from\nffs_func_disable as part of composition switch and at the\nsame time ffs_epfile_release get called from userspace.\nffs_epfile_release will free up the read buffer and call\nffs_data_closed which in turn destroys ffs-\u003eepfiles and\nmark it as NULL. While this was happening the driver has\nalready initialized the local epfile in ffs_func_eps_disable\nwhich is now freed and waiting to acquire the spinlock. Once\nspinlock is acquired the driver proceeds with the stale value\nof epfile and tries to free the already freed read buffer\ncausing use-after-free.\n\nFollowing is the illustration of the race:\n\n CPU1 CPU2\n\n ffs_func_eps_disable\n epfiles (local copy)\n\t\t\t\t\tffs_epfile_release\n\t\t\t\t\tffs_data_closed\n\t\t\t\t\tif (last file closed)\n\t\t\t\t\tffs_data_reset\n\t\t\t\t\tffs_data_clear\n\t\t\t\t\tffs_epfiles_destroy\nspin_lock\ndereference epfiles\n\nFix this races by taking epfiles local copy \u0026 assigning it under\nspinlock and if epfiles(local) is null then update it in ffs-\u003eepfiles\nthen finally destroy it.\nExtending the scope further from the race, protecting the ep related\nstructures, and concurrent accesses.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.170.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.170.2.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.170.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.170.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.170.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_170-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_170-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_170-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.170.2.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.170.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.170.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-48822",
"url": "https://www.suse.com/security/cve/CVE-2022-48822"
},
{
"category": "external",
"summary": "SUSE Bug 1228040 for CVE-2022-48822",
"url": "https://bugzilla.suse.com/1228040"
},
{
"category": "external",
"summary": "SUSE Bug 1228136 for CVE-2022-48822",
"url": "https://bugzilla.suse.com/1228136"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.170.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.170.2.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.170.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.170.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.170.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_170-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_170-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_170-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.170.2.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.170.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.170.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.170.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.170.2.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.170.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.170.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.170.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_170-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_170-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_170-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.170.2.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.170.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.170.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-16T13:48:15Z",
"details": "moderate"
}
],
"title": "CVE-2022-48822"
},
{
"cve": "CVE-2023-52686",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-52686"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\npowerpc/powernv: Add a null pointer check in opal_event_init()\n\nkasprintf() returns a pointer to dynamically allocated memory\nwhich can be NULL upon failure.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.170.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.170.2.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.170.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.170.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.170.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_170-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_170-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_170-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.170.2.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.170.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.170.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-52686",
"url": "https://www.suse.com/security/cve/CVE-2023-52686"
},
{
"category": "external",
"summary": "SUSE Bug 1224682 for CVE-2023-52686",
"url": "https://bugzilla.suse.com/1224682"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.170.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.170.2.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.170.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.170.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.170.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_170-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_170-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_170-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.170.2.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.170.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.170.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.170.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.170.2.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.170.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.170.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.170.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_170-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_170-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_170-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.170.2.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.170.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.170.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-16T13:48:15Z",
"details": "moderate"
}
],
"title": "CVE-2023-52686"
},
{
"cve": "CVE-2023-52885",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-52885"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nSUNRPC: Fix UAF in svc_tcp_listen_data_ready()\n\nAfter the listener svc_sock is freed, and before invoking svc_tcp_accept()\nfor the established child sock, there is a window that the newsock\nretaining a freed listener svc_sock in sk_user_data which cloning from\nparent. In the race window, if data is received on the newsock, we will\nobserve use-after-free report in svc_tcp_listen_data_ready().\n\nReproduce by two tasks:\n\n1. while :; do rpc.nfsd 0 ; rpc.nfsd; done\n2. while :; do echo \"\" | ncat -4 127.0.0.1 2049 ; done\n\nKASAN report:\n\n ==================================================================\n BUG: KASAN: slab-use-after-free in svc_tcp_listen_data_ready+0x1cf/0x1f0 [sunrpc]\n Read of size 8 at addr ffff888139d96228 by task nc/102553\n CPU: 7 PID: 102553 Comm: nc Not tainted 6.3.0+ #18\n Hardware name: VMware, Inc. VMware Virtual Platform/440BX Desktop Reference Platform, BIOS 6.00 11/12/2020\n Call Trace:\n \u003cIRQ\u003e\n dump_stack_lvl+0x33/0x50\n print_address_description.constprop.0+0x27/0x310\n print_report+0x3e/0x70\n kasan_report+0xae/0xe0\n svc_tcp_listen_data_ready+0x1cf/0x1f0 [sunrpc]\n tcp_data_queue+0x9f4/0x20e0\n tcp_rcv_established+0x666/0x1f60\n tcp_v4_do_rcv+0x51c/0x850\n tcp_v4_rcv+0x23fc/0x2e80\n ip_protocol_deliver_rcu+0x62/0x300\n ip_local_deliver_finish+0x267/0x350\n ip_local_deliver+0x18b/0x2d0\n ip_rcv+0x2fb/0x370\n __netif_receive_skb_one_core+0x166/0x1b0\n process_backlog+0x24c/0x5e0\n __napi_poll+0xa2/0x500\n net_rx_action+0x854/0xc90\n __do_softirq+0x1bb/0x5de\n do_softirq+0xcb/0x100\n \u003c/IRQ\u003e\n \u003cTASK\u003e\n ...\n \u003c/TASK\u003e\n\n Allocated by task 102371:\n kasan_save_stack+0x1e/0x40\n kasan_set_track+0x21/0x30\n __kasan_kmalloc+0x7b/0x90\n svc_setup_socket+0x52/0x4f0 [sunrpc]\n svc_addsock+0x20d/0x400 [sunrpc]\n __write_ports_addfd+0x209/0x390 [nfsd]\n write_ports+0x239/0x2c0 [nfsd]\n nfsctl_transaction_write+0xac/0x110 [nfsd]\n vfs_write+0x1c3/0xae0\n ksys_write+0xed/0x1c0\n do_syscall_64+0x38/0x90\n entry_SYSCALL_64_after_hwframe+0x72/0xdc\n\n Freed by task 102551:\n kasan_save_stack+0x1e/0x40\n kasan_set_track+0x21/0x30\n kasan_save_free_info+0x2a/0x50\n __kasan_slab_free+0x106/0x190\n __kmem_cache_free+0x133/0x270\n svc_xprt_free+0x1e2/0x350 [sunrpc]\n svc_xprt_destroy_all+0x25a/0x440 [sunrpc]\n nfsd_put+0x125/0x240 [nfsd]\n nfsd_svc+0x2cb/0x3c0 [nfsd]\n write_threads+0x1ac/0x2a0 [nfsd]\n nfsctl_transaction_write+0xac/0x110 [nfsd]\n vfs_write+0x1c3/0xae0\n ksys_write+0xed/0x1c0\n do_syscall_64+0x38/0x90\n entry_SYSCALL_64_after_hwframe+0x72/0xdc\n\nFix the UAF by simply doing nothing in svc_tcp_listen_data_ready()\nif state != TCP_LISTEN, that will avoid dereferencing svsk for all\nchild socket.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.170.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.170.2.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.170.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.170.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.170.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_170-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_170-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_170-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.170.2.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.170.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.170.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-52885",
"url": "https://www.suse.com/security/cve/CVE-2023-52885"
},
{
"category": "external",
"summary": "SUSE Bug 1227750 for CVE-2023-52885",
"url": "https://bugzilla.suse.com/1227750"
},
{
"category": "external",
"summary": "SUSE Bug 1227753 for CVE-2023-52885",
"url": "https://bugzilla.suse.com/1227753"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.170.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.170.2.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.170.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.170.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.170.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_170-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_170-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_170-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.170.2.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.170.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.170.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.170.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.170.2.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.170.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.170.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.170.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_170-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_170-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_170-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.170.2.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.170.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.170.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-16T13:48:15Z",
"details": "important"
}
],
"title": "CVE-2023-52885"
},
{
"cve": "CVE-2024-26583",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-26583"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntls: fix race between async notify and socket close\n\nThe submitting thread (one which called recvmsg/sendmsg)\nmay exit as soon as the async crypto handler calls complete()\nso any code past that point risks touching already freed data.\n\nTry to avoid the locking and extra flags altogether.\nHave the main thread hold an extra reference, this way\nwe can depend solely on the atomic ref counter for\nsynchronization.\n\nDon\u0027t futz with reiniting the completion, either, we are now\ntightly controlling when completion fires.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.170.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.170.2.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.170.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.170.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.170.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_170-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_170-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_170-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.170.2.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.170.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.170.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-26583",
"url": "https://www.suse.com/security/cve/CVE-2024-26583"
},
{
"category": "external",
"summary": "SUSE Bug 1220185 for CVE-2024-26583",
"url": "https://bugzilla.suse.com/1220185"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.170.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.170.2.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.170.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.170.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.170.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_170-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_170-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_170-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.170.2.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.170.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.170.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.170.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.170.2.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.170.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.170.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.170.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_170-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_170-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_170-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.170.2.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.170.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.170.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-16T13:48:15Z",
"details": "moderate"
}
],
"title": "CVE-2024-26583"
},
{
"cve": "CVE-2024-26584",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-26584"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: tls: handle backlogging of crypto requests\n\nSince we\u0027re setting the CRYPTO_TFM_REQ_MAY_BACKLOG flag on our\nrequests to the crypto API, crypto_aead_{encrypt,decrypt} can return\n -EBUSY instead of -EINPROGRESS in valid situations. For example, when\nthe cryptd queue for AESNI is full (easy to trigger with an\nartificially low cryptd.cryptd_max_cpu_qlen), requests will be enqueued\nto the backlog but still processed. In that case, the async callback\nwill also be called twice: first with err == -EINPROGRESS, which it\nseems we can just ignore, then with err == 0.\n\nCompared to Sabrina\u0027s original patch this version uses the new\ntls_*crypt_async_wait() helpers and converts the EBUSY to\nEINPROGRESS to avoid having to modify all the error handling\npaths. The handling is identical.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.170.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.170.2.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.170.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.170.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.170.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_170-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_170-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_170-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.170.2.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.170.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.170.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-26584",
"url": "https://www.suse.com/security/cve/CVE-2024-26584"
},
{
"category": "external",
"summary": "SUSE Bug 1220186 for CVE-2024-26584",
"url": "https://bugzilla.suse.com/1220186"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.170.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.170.2.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.170.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.170.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.170.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_170-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_170-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_170-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.170.2.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.170.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.170.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.170.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.170.2.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.170.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.170.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.170.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_170-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_170-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_170-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.170.2.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.170.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.170.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-16T13:48:15Z",
"details": "moderate"
}
],
"title": "CVE-2024-26584"
},
{
"cve": "CVE-2024-26585",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-26585"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntls: fix race between tx work scheduling and socket close\n\nSimilarly to previous commit, the submitting thread (recvmsg/sendmsg)\nmay exit as soon as the async crypto handler calls complete().\nReorder scheduling the work before calling complete().\nThis seems more logical in the first place, as it\u0027s\nthe inverse order of what the submitting thread will do.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.170.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.170.2.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.170.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.170.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.170.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_170-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_170-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_170-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.170.2.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.170.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.170.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-26585",
"url": "https://www.suse.com/security/cve/CVE-2024-26585"
},
{
"category": "external",
"summary": "SUSE Bug 1220187 for CVE-2024-26585",
"url": "https://bugzilla.suse.com/1220187"
},
{
"category": "external",
"summary": "SUSE Bug 1220211 for CVE-2024-26585",
"url": "https://bugzilla.suse.com/1220211"
},
{
"category": "external",
"summary": "SUSE Bug 1224298 for CVE-2024-26585",
"url": "https://bugzilla.suse.com/1224298"
},
{
"category": "external",
"summary": "SUSE Bug 1224878 for CVE-2024-26585",
"url": "https://bugzilla.suse.com/1224878"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.170.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.170.2.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.170.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.170.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.170.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_170-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_170-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_170-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.170.2.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.170.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.170.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.170.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.170.2.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.170.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.170.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.170.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_170-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_170-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_170-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.170.2.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.170.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.170.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-16T13:48:15Z",
"details": "moderate"
}
],
"title": "CVE-2024-26585"
},
{
"cve": "CVE-2024-26800",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-26800"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntls: fix use-after-free on failed backlog decryption\n\nWhen the decrypt request goes to the backlog and crypto_aead_decrypt\nreturns -EBUSY, tls_do_decryption will wait until all async\ndecryptions have completed. If one of them fails, tls_do_decryption\nwill return -EBADMSG and tls_decrypt_sg jumps to the error path,\nreleasing all the pages. But the pages have been passed to the async\ncallback, and have already been released by tls_decrypt_done.\n\nThe only true async case is when crypto_aead_decrypt returns\n -EINPROGRESS. With -EBUSY, we already waited so we can tell\ntls_sw_recvmsg that the data is available for immediate copy, but we\nneed to notify tls_decrypt_sg (via the new -\u003easync_done flag) that the\nmemory has already been released.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.170.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.170.2.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.170.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.170.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.170.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_170-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_170-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_170-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.170.2.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.170.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.170.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-26800",
"url": "https://www.suse.com/security/cve/CVE-2024-26800"
},
{
"category": "external",
"summary": "SUSE Bug 1222728 for CVE-2024-26800",
"url": "https://bugzilla.suse.com/1222728"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.170.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.170.2.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.170.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.170.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.170.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_170-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_170-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_170-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.170.2.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.170.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.170.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.170.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.170.2.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.170.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.170.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.170.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_170-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_170-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_170-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.170.2.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.170.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.170.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-16T13:48:15Z",
"details": "moderate"
}
],
"title": "CVE-2024-26800"
},
{
"cve": "CVE-2024-36974",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-36974"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/sched: taprio: always validate TCA_TAPRIO_ATTR_PRIOMAP\n\nIf one TCA_TAPRIO_ATTR_PRIOMAP attribute has been provided,\ntaprio_parse_mqprio_opt() must validate it, or userspace\ncan inject arbitrary data to the kernel, the second time\ntaprio_change() is called.\n\nFirst call (with valid attributes) sets dev-\u003enum_tc\nto a non zero value.\n\nSecond call (with arbitrary mqprio attributes)\nreturns early from taprio_parse_mqprio_opt()\nand bad things can happen.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.170.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.170.2.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.170.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.170.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.170.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_170-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_170-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_170-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.170.2.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.170.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.170.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-36974",
"url": "https://www.suse.com/security/cve/CVE-2024-36974"
},
{
"category": "external",
"summary": "SUSE Bug 1226519 for CVE-2024-36974",
"url": "https://bugzilla.suse.com/1226519"
},
{
"category": "external",
"summary": "SUSE Bug 1227371 for CVE-2024-36974",
"url": "https://bugzilla.suse.com/1227371"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.170.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.170.2.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.170.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.170.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.170.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_170-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_170-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_170-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.170.2.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.170.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.170.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.170.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.170.2.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.170.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.170.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.170.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_170-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_170-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_170-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.170.2.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.170.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.170.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-16T13:48:15Z",
"details": "important"
}
],
"title": "CVE-2024-36974"
},
{
"cve": "CVE-2024-38559",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-38559"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: qedf: Ensure the copied buf is NUL terminated\n\nCurrently, we allocate a count-sized kernel buffer and copy count from\nuserspace to that buffer. Later, we use kstrtouint on this buffer but we\ndon\u0027t ensure that the string is terminated inside the buffer, this can\nlead to OOB read when using kstrtouint. Fix this issue by using\nmemdup_user_nul instead of memdup_user.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.170.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.170.2.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.170.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.170.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.170.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_170-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_170-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_170-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.170.2.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.170.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.170.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-38559",
"url": "https://www.suse.com/security/cve/CVE-2024-38559"
},
{
"category": "external",
"summary": "SUSE Bug 1226785 for CVE-2024-38559",
"url": "https://bugzilla.suse.com/1226785"
},
{
"category": "external",
"summary": "SUSE Bug 1227495 for CVE-2024-38559",
"url": "https://bugzilla.suse.com/1227495"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.170.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.170.2.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.170.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.170.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.170.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_170-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_170-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_170-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.170.2.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.170.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.170.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.170.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.170.2.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.170.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.170.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.170.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_170-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_170-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_170-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.170.2.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.170.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.170.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-16T13:48:15Z",
"details": "moderate"
}
],
"title": "CVE-2024-38559"
},
{
"cve": "CVE-2024-39494",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-39494"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nima: Fix use-after-free on a dentry\u0027s dname.name\n\n-\u003ed_name.name can change on rename and the earlier value can be freed;\nthere are conditions sufficient to stabilize it (-\u003ed_lock on dentry,\n-\u003ed_lock on its parent, -\u003ei_rwsem exclusive on the parent\u0027s inode,\nrename_lock), but none of those are met at any of the sites. Take a stable\nsnapshot of the name instead.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.170.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.170.2.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.170.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.170.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.170.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_170-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_170-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_170-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.170.2.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.170.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.170.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-39494",
"url": "https://www.suse.com/security/cve/CVE-2024-39494"
},
{
"category": "external",
"summary": "SUSE Bug 1227716 for CVE-2024-39494",
"url": "https://bugzilla.suse.com/1227716"
},
{
"category": "external",
"summary": "SUSE Bug 1227901 for CVE-2024-39494",
"url": "https://bugzilla.suse.com/1227901"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.170.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.170.2.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.170.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.170.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.170.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_170-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_170-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_170-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.170.2.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.170.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.170.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.170.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.170.2.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.170.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.170.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.170.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_170-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_170-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_170-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.170.2.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.170.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.170.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-16T13:48:15Z",
"details": "important"
}
],
"title": "CVE-2024-39494"
},
{
"cve": "CVE-2024-40937",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-40937"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ngve: Clear napi-\u003eskb before dev_kfree_skb_any()\n\ngve_rx_free_skb incorrectly leaves napi-\u003eskb referencing an skb after it\nis freed with dev_kfree_skb_any(). This can result in a subsequent call\nto napi_get_frags returning a dangling pointer.\n\nFix this by clearing napi-\u003eskb before the skb is freed.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.170.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.170.2.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.170.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.170.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.170.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_170-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_170-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_170-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.170.2.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.170.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.170.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-40937",
"url": "https://www.suse.com/security/cve/CVE-2024-40937"
},
{
"category": "external",
"summary": "SUSE Bug 1227836 for CVE-2024-40937",
"url": "https://bugzilla.suse.com/1227836"
},
{
"category": "external",
"summary": "SUSE Bug 1227903 for CVE-2024-40937",
"url": "https://bugzilla.suse.com/1227903"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.170.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.170.2.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.170.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.170.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.170.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_170-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_170-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_170-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.170.2.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.170.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.170.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.170.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.170.2.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.170.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.170.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.170.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_170-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_170-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_170-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.170.2.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.170.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.170.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-16T13:48:15Z",
"details": "important"
}
],
"title": "CVE-2024-40937"
},
{
"cve": "CVE-2024-40956",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-40956"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndmaengine: idxd: Fix possible Use-After-Free in irq_process_work_list\n\nUse list_for_each_entry_safe() to allow iterating through the list and\ndeleting the entry in the iteration process. The descriptor is freed via\nidxd_desc_complete() and there\u0027s a slight chance may cause issue for\nthe list iterator when the descriptor is reused by another thread\nwithout it being deleted from the list.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.170.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.170.2.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.170.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.170.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.170.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_170-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_170-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_170-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.170.2.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.170.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.170.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-40956",
"url": "https://www.suse.com/security/cve/CVE-2024-40956"
},
{
"category": "external",
"summary": "SUSE Bug 1227810 for CVE-2024-40956",
"url": "https://bugzilla.suse.com/1227810"
},
{
"category": "external",
"summary": "SUSE Bug 1228585 for CVE-2024-40956",
"url": "https://bugzilla.suse.com/1228585"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.170.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.170.2.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.170.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.170.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.170.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_170-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_170-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_170-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.170.2.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.170.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.170.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.170.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.170.2.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.170.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.170.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.170.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_170-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_170-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_170-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.170.2.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.170.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.170.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-16T13:48:15Z",
"details": "moderate"
}
],
"title": "CVE-2024-40956"
},
{
"cve": "CVE-2024-41011",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-41011"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amdkfd: don\u0027t allow mapping the MMIO HDP page with large pages\n\nWe don\u0027t get the right offset in that case. The GPU has\nan unused 4K area of the register BAR space into which you can\nremap registers. We remap the HDP flush registers into this\nspace to allow userspace (CPU or GPU) to flush the HDP when it\nupdates VRAM. However, on systems with \u003e4K pages, we end up\nexposing PAGE_SIZE of MMIO space.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.170.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.170.2.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.170.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.170.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.170.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_170-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_170-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_170-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.170.2.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.170.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.170.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-41011",
"url": "https://www.suse.com/security/cve/CVE-2024-41011"
},
{
"category": "external",
"summary": "SUSE Bug 1228114 for CVE-2024-41011",
"url": "https://bugzilla.suse.com/1228114"
},
{
"category": "external",
"summary": "SUSE Bug 1228115 for CVE-2024-41011",
"url": "https://bugzilla.suse.com/1228115"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.170.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.170.2.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.170.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.170.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.170.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_170-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_170-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_170-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.170.2.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.170.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.170.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.170.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.170.2.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.170.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.170.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.170.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_170-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_170-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_170-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.170.2.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.170.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.170.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-16T13:48:15Z",
"details": "important"
}
],
"title": "CVE-2024-41011"
},
{
"cve": "CVE-2024-41059",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-41059"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nhfsplus: fix uninit-value in copy_name\n\n[syzbot reported]\nBUG: KMSAN: uninit-value in sized_strscpy+0xc4/0x160\n sized_strscpy+0xc4/0x160\n copy_name+0x2af/0x320 fs/hfsplus/xattr.c:411\n hfsplus_listxattr+0x11e9/0x1a50 fs/hfsplus/xattr.c:750\n vfs_listxattr fs/xattr.c:493 [inline]\n listxattr+0x1f3/0x6b0 fs/xattr.c:840\n path_listxattr fs/xattr.c:864 [inline]\n __do_sys_listxattr fs/xattr.c:876 [inline]\n __se_sys_listxattr fs/xattr.c:873 [inline]\n __x64_sys_listxattr+0x16b/0x2f0 fs/xattr.c:873\n x64_sys_call+0x2ba0/0x3b50 arch/x86/include/generated/asm/syscalls_64.h:195\n do_syscall_x64 arch/x86/entry/common.c:52 [inline]\n do_syscall_64+0xcf/0x1e0 arch/x86/entry/common.c:83\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\n\nUninit was created at:\n slab_post_alloc_hook mm/slub.c:3877 [inline]\n slab_alloc_node mm/slub.c:3918 [inline]\n kmalloc_trace+0x57b/0xbe0 mm/slub.c:4065\n kmalloc include/linux/slab.h:628 [inline]\n hfsplus_listxattr+0x4cc/0x1a50 fs/hfsplus/xattr.c:699\n vfs_listxattr fs/xattr.c:493 [inline]\n listxattr+0x1f3/0x6b0 fs/xattr.c:840\n path_listxattr fs/xattr.c:864 [inline]\n __do_sys_listxattr fs/xattr.c:876 [inline]\n __se_sys_listxattr fs/xattr.c:873 [inline]\n __x64_sys_listxattr+0x16b/0x2f0 fs/xattr.c:873\n x64_sys_call+0x2ba0/0x3b50 arch/x86/include/generated/asm/syscalls_64.h:195\n do_syscall_x64 arch/x86/entry/common.c:52 [inline]\n do_syscall_64+0xcf/0x1e0 arch/x86/entry/common.c:83\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\n[Fix]\nWhen allocating memory to strbuf, initialize memory to 0.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.170.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.170.2.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.170.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.170.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.170.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_170-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_170-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_170-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.170.2.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.170.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.170.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-41059",
"url": "https://www.suse.com/security/cve/CVE-2024-41059"
},
{
"category": "external",
"summary": "SUSE Bug 1228561 for CVE-2024-41059",
"url": "https://bugzilla.suse.com/1228561"
},
{
"category": "external",
"summary": "SUSE Bug 1228573 for CVE-2024-41059",
"url": "https://bugzilla.suse.com/1228573"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.170.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.170.2.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.170.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.170.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.170.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_170-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_170-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_170-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.170.2.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.170.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.170.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.170.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.170.2.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.170.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.170.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.170.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_170-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_170-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_170-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.170.2.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.170.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.170.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-16T13:48:15Z",
"details": "important"
}
],
"title": "CVE-2024-41059"
},
{
"cve": "CVE-2024-41069",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-41069"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nASoC: topology: Fix references to freed memory\n\nMost users after parsing a topology file, release memory used by it, so\nhaving pointer references directly into topology file contents is wrong.\nUse devm_kmemdup(), to allocate memory as needed.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.170.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.170.2.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.170.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.170.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.170.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_170-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_170-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_170-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.170.2.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.170.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.170.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-41069",
"url": "https://www.suse.com/security/cve/CVE-2024-41069"
},
{
"category": "external",
"summary": "SUSE Bug 1228644 for CVE-2024-41069",
"url": "https://bugzilla.suse.com/1228644"
},
{
"category": "external",
"summary": "SUSE Bug 1228645 for CVE-2024-41069",
"url": "https://bugzilla.suse.com/1228645"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.170.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.170.2.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.170.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.170.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.170.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_170-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_170-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_170-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.170.2.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.170.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.170.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.170.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.170.2.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.170.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.170.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.170.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_170-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_170-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_170-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.170.2.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.170.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.170.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-16T13:48:15Z",
"details": "important"
}
],
"title": "CVE-2024-41069"
},
{
"cve": "CVE-2024-41090",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-41090"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntap: add missing verification for short frame\n\nThe cited commit missed to check against the validity of the frame length\nin the tap_get_user_xdp() path, which could cause a corrupted skb to be\nsent downstack. Even before the skb is transmitted, the\ntap_get_user_xdp()--\u003eskb_set_network_header() may assume the size is more\nthan ETH_HLEN. Once transmitted, this could either cause out-of-bound\naccess beyond the actual length, or confuse the underlayer with incorrect\nor inconsistent header length in the skb metadata.\n\nIn the alternative path, tap_get_user() already prohibits short frame which\nhas the length less than Ethernet header size from being transmitted.\n\nThis is to drop any frame shorter than the Ethernet header size just like\nhow tap_get_user() does.\n\nCVE: CVE-2024-41090",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.170.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.170.2.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.170.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.170.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.170.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_170-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_170-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_170-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.170.2.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.170.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.170.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-41090",
"url": "https://www.suse.com/security/cve/CVE-2024-41090"
},
{
"category": "external",
"summary": "SUSE Bug 1228328 for CVE-2024-41090",
"url": "https://bugzilla.suse.com/1228328"
},
{
"category": "external",
"summary": "SUSE Bug 1228714 for CVE-2024-41090",
"url": "https://bugzilla.suse.com/1228714"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.170.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.170.2.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.170.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.170.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.170.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_170-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_170-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_170-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.170.2.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.170.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.170.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.170.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.170.2.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.170.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.170.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.170.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_170-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_170-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_170-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.170.2.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.170.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.170.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-16T13:48:15Z",
"details": "important"
}
],
"title": "CVE-2024-41090"
},
{
"cve": "CVE-2024-42145",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-42145"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nIB/core: Implement a limit on UMAD receive List\n\nThe existing behavior of ib_umad, which maintains received MAD\npackets in an unbounded list, poses a risk of uncontrolled growth.\nAs user-space applications extract packets from this list, the rate\nof extraction may not match the rate of incoming packets, leading\nto potential list overflow.\n\nTo address this, we introduce a limit to the size of the list. After\nconsidering typical scenarios, such as OpenSM processing, which can\nhandle approximately 100k packets per second, and the 1-second retry\ntimeout for most packets, we set the list size limit to 200k. Packets\nreceived beyond this limit are dropped, assuming they are likely timed\nout by the time they are handled by user-space.\n\nNotably, packets queued on the receive list due to reasons like\ntimed-out sends are preserved even when the list is full.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.170.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.170.2.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.170.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.170.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.170.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_170-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_170-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_170-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.170.2.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.170.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.170.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-42145",
"url": "https://www.suse.com/security/cve/CVE-2024-42145"
},
{
"category": "external",
"summary": "SUSE Bug 1223384 for CVE-2024-42145",
"url": "https://bugzilla.suse.com/1223384"
},
{
"category": "external",
"summary": "SUSE Bug 1228743 for CVE-2024-42145",
"url": "https://bugzilla.suse.com/1228743"
},
{
"category": "external",
"summary": "SUSE Bug 1228744 for CVE-2024-42145",
"url": "https://bugzilla.suse.com/1228744"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.170.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.170.2.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.170.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.170.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.170.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_170-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_170-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_170-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.170.2.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.170.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.170.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.170.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.170.2.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.170.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.170.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.170.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.170.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_170-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_170-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_170-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.170.2.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.170.1.150300.18.100.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.170.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.170.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.170.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.170.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.170.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-16T13:48:15Z",
"details": "important"
}
],
"title": "CVE-2024-42145"
}
]
}
suse-su-2021:2324-1
Vulnerability from csaf_suse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel",
"title": "Title of the patch"
},
{
"category": "description",
"text": "The SUSE Linux Enterprise 12 SP5 kernel was updated to receive various security and bugfixes.\n\nThe following security bugs were fixed:\n\n- CVE-2021-33624: Fixed a bug which allows unprivileged BPF program to leak the contents of arbitrary kernel memory (and therefore, of all physical memory) via a side-channel. (bsc#1187554)\n- CVE-2019-25045: Fixed an use-after-free issue in the Linux kernel The XFRM subsystem, related to an xfrm_state_fini panic. (bsc#1187049)\n- CVE-2021-0605: Fixed an out-of-bounds read which could lead to local information disclosure in the kernel with System execution privileges needed. (bsc#1187601)\n- CVE-2021-0512: Fixed a possible out-of-bounds write which could lead to local escalation of privilege with no additional execution privileges needed. (bsc#1187595)\n- CVE-2020-26558: Fixed a flaw in the Bluetooth LE and BR/EDR secure pairing that could permit a nearby man-in-the-middle attacker to identify the Passkey used during pairing. (bsc#1179610)\n- CVE-2021-34693: Fixed a bug in net/can/bcm.c which could allow local users to obtain sensitive information from kernel stack memory because parts of a data structure are uninitialized. (bsc#1187452)\n- CVE-2021-0129: Fixed an improper access control in BlueZ that may have allowed an authenticated user to potentially enable information disclosure via adjacent access. (bsc#1186463)\n- CVE-2020-36386: Fixed an out-of-bounds read in hci_extended_inquiry_result_evt. (bsc#1187038)\n- CVE-2020-24588: Fixed a bug that could allow an adversary to abuse devices that support receiving non-SSP A-MSDU frames to inject arbitrary network packets. (bsc#1185861)\n\nThe following non-security bugs were fixed:\n\n- ALSA: timer: Fix master timer notification (git-fixes).\n- alx: Fix an error handling path in \u0027alx_probe()\u0027 (git-fixes).\n- ASoC: sti-sas: add missing MODULE_DEVICE_TABLE (git-fixes).\n- batman-adv: Avoid WARN_ON timing related checks (git-fixes).\n- blk-mq: Swap two calls in blk_mq_exit_queue() (bsc#1187453).\n- blk-wbt: Fix missed wakeup (bsc#1186627).\n- block: Discard page cache of zone reset target range (bsc#1187402).\n- Bluetooth: fix the erroneous flush_work() order (git-fixes).\n- Bluetooth: use correct lock to prevent UAF of hdev object (git-fixes).\n- btrfs: account for new extents being deleted in total_bytes_pinned (bsc#1135481).\n- btrfs: add a comment explaining the data flush steps (bsc#1135481).\n- btrfs: add btrfs_reserve_data_bytes and use it (bsc#1135481).\n- btrfs: add flushing states for handling data reservations (bsc#1135481).\n- btrfs: add missing error handling after doing leaf/node binary search (bsc#1187833).\n- btrfs: add the data transaction commit logic into may_commit_transaction (bsc#1135481).\n- btrfs: call btrfs_try_granting_tickets when freeing reserved bytes (bsc#1135481).\n- btrfs: call btrfs_try_granting_tickets when reserving space (bsc#1135481).\n- btrfs: call btrfs_try_granting_tickets when unpinning anything (bsc#1135481).\n- btrfs: change insert_dirty_subvol to return errors (bsc#1187833).\n- btrfs: change nr to u64 in btrfs_start_delalloc_roots (bsc#1135481).\n- btrfs: check record_root_in_trans related failures in select_reloc_root (bsc#1187833).\n- btrfs: check return value of btrfs_commit_transaction in relocation (bsc#1187833).\n- btrfs: check tickets after waiting on ordered extents (bsc#1135481).\n- btrfs: cleanup error handling in prepare_to_merge (bsc#1187833).\n- btrfs: convert BUG_ON()\u0027s in relocate_tree_block (bsc#1187833).\n- btrfs: convert BUG_ON()\u0027s in select_reloc_root() to proper errors (bsc#1187833).\n- btrfs: convert logic BUG_ON()\u0027s in replace_path to ASSERT()\u0027s (bsc#1187833).\n- btrfs: convert some BUG_ON()\u0027s to ASSERT()\u0027s in do_relocation (bsc#1187833).\n- btrfs: do async reclaim for data reservations (bsc#1135481).\n- btrfs: do not force commit if we are data (bsc#1135481).\n- btrfs: do not leak reloc root if we fail to read the fs root (bsc#1187833).\n- btrfs: do not make defrag wait on async_delalloc_pages (bsc#1135481).\n- btrfs: do not panic in __add_reloc_root (bsc#1187833).\n- btrfs: do proper error handling in btrfs_update_reloc_root (bsc#1187833).\n- btrfs: do proper error handling in create_reloc_inode (bsc#1187833).\n- btrfs: do proper error handling in create_reloc_root (bsc#1187833).\n- btrfs: do proper error handling in merge_reloc_roots (bsc#1187833).\n- btrfs: do proper error handling in record_reloc_root_in_trans (bsc#1187833).\n- btrfs: drop the commit_cycles stuff for data reservations (bsc#1135481).\n- btrfs: fix possible infinite loop in data async reclaim (bsc#1135481).\n- btrfs: flush delayed refs when trying to reserve data space (bsc#1135481).\n- btrfs: handle __add_reloc_root failures in btrfs_recover_relocation (bsc#1187833).\n- btrfs: handle btrfs_cow_block errors in replace_path (bsc#1187833).\n- btrfs: handle btrfs_record_root_in_trans failure in btrfs_recover_log_trees (bsc#1187833).\n- btrfs: handle btrfs_record_root_in_trans failure in btrfs_rename (bsc#1187833).\n- btrfs: handle btrfs_record_root_in_trans failure in btrfs_rename_exchange (bsc#1187833).\n- btrfs: handle btrfs_record_root_in_trans failure in create_subvol (bsc#1187833).\n- btrfs: handle btrfs_record_root_in_trans failure in relocate_tree_block (bsc#1187833).\n- btrfs: handle btrfs_record_root_in_trans failure in start_transaction (bsc#1187833).\n- btrfs: handle btrfs_search_slot failure in replace_path (bsc#1187833).\n- btrfs: handle btrfs_update_reloc_root failure in commit_fs_roots (bsc#1187833).\n- btrfs: handle btrfs_update_reloc_root failure in insert_dirty_subvol (bsc#1187833).\n- btrfs: handle btrfs_update_reloc_root failure in prepare_to_merge (bsc#1187833).\n- btrfs: handle errors from select_reloc_root() (bsc#1187833).\n- btrfs: handle errors in reference count manipulation in replace_path (bsc#1187833).\n- btrfs: handle extent corruption with select_one_root properly (bsc#1187833).\n- btrfs: handle extent reference errors in do_relocation (bsc#1187833).\n- btrfs: handle record_root_in_trans failure in btrfs_record_root_in_trans (bsc#1187833).\n- btrfs: handle record_root_in_trans failure in create_pending_snapshot (bsc#1187833).\n- btrfs: handle record_root_in_trans failure in qgroup_account_snapshot (bsc#1187833).\n- btrfs: handle space_info::total_bytes_pinned inside the delayed ref itself (bsc#1135481).\n- btrfs: handle U64_MAX for shrink_delalloc (bsc#1135481).\n- btrfs: have proper error handling in btrfs_init_reloc_root (bsc#1187833).\n- btrfs: make ALLOC_CHUNK use the space info flags (bsc#1135481).\n- btrfs: make shrink_delalloc take space_info as an arg (bsc#1135481).\n- btrfs: reloc: clean dirty subvols if we fail to start a transaction (bsc#1187833).\n- btrfs: remove err variable from do_relocation (bsc#1187833).\n- btrfs: remove nr_async_bios (bsc#1135481).\n- btrfs: remove nr_async_submits and async_submit_draining (bsc#1135481). Preparation for ticketed data space flushing in btrfs.\n- btrfs: remove orig from shrink_delalloc (bsc#1135481).\n- btrfs: remove the extent item sanity checks in relocate_block_group (bsc#1187833).\n- btrfs: return an error from btrfs_record_root_in_trans (bsc#1187833).\n- btrfs: run delayed iputs before committing the transaction for data (bsc#1135481).\n- btrfs: serialize data reservations if we are flushing (bsc#1135481).\n- btrfs: shrink delalloc pages instead of full inodes (bsc#1135481).\n- btrfs: track ordered bytes instead of just dio ordered bytes (bsc#1135481).\n- btrfs: tree-checker: check for BTRFS_BLOCK_FLAG_FULL_BACKREF being set improperly (bsc#1187833).\n- btrfs: unset reloc control if we fail to recover (bsc#1187833).\n- btrfs: use btrfs_start_delalloc_roots in shrink_delalloc (bsc#1135481).\n- btrfs: use customized batch size for total_bytes_pinned (bsc#1135481). Turns out using the batched percpu api had an effect on timing w.r.t metadata/data reclaim. So backport this patch as well, side effect is it\u0027s also bringing the code closer to upstream so future backports shall be made easier.\n- btrfs: use tagged writepage to mitigate livelock of snapshot (bsc#1135481). Preparation for introducing ticketed space handling for data space. Due to the sequence of patches, the main patch has embedded in it changes from other patches which remove some unused arguments. This is done to ease backporting itself and shouldn\u0027t have any repercussions on functionality.\n- btrfs: use the btrfs_space_info_free_bytes_may_use helper for delalloc (bsc#1135481).\n- btrfs: use the same helper for data and metadata reservations (bsc#1135481).\n- btrfs: use ticketing for data space reservations (bsc#1135481).\n- btrfs: validate root::reloc_root after recording root in trans (bsc#1187833).\n- can: flexcan: disable completely the ECC mechanism (git-fixes).\n- can: mcba_usb: fix memory leak in mcba_usb (git-fixes).\n- can: xilinx_can: xcan_chip_start(): fix failure with invalid bus (git-fixes).\n- cgroup1: do not allow \u0027\\n\u0027 in renaming (bsc#1187972).\n- char: hpet: add checks after calling ioremap (git-fixes).\n- crypto: ccp - Fix a resource leak in an error handling path (12sp5).\n- cxgb4: avoid accessing registers when clearing filters (bsc#1136345 jsc#SLE-4681).\n- dax: Add a wakeup mode parameter to put_unlocked_entry() (bsc#1187411).\n- dax: Add an enum for specifying dax wakup mode (bsc#1187411).\n- dax: Wake up all waiters after invalidating dax entry (bsc#1187411).\n- dmaengine: pl330: fix wrong usage of spinlock flags in dma_cyclc (git-fixes).\n- dmaengine: QCOM_HIDMA_MGMT depends on HAS_IOMEM (git-fixes).\n- dmaengine: qcom_hidma: comment platform_driver_register call (git-fixes).\n- dmaengine: stedma40: add missing iounmap() on error in d40_probe() (git-fixes).\n- drbd: Remove uninitialized_var() usage (bsc#1186515).\n- drivers: video: fbcon: fix NULL dereference in fbcon_cursor() (bsc#1129770) Backporting changes: * move from driver/video/fbdev/core to driver/video/console * context changes\n- drm: Fix use-after-free read in drm_getunique() (git-fixes).\n- drm: Lock pointer access in drm_master_release() (git-fixes).\n- drm/amdgpu: Fix a use-after-free (git-fixes).\n- efi: Allow EFI_MEMORY_XP and EFI_MEMORY_RO both to be cleared (git-fixes).\n- efi: cper: fix snprintf() use in cper_dimm_err_location() (git-fixes).\n- ext4: fix bug on in ext4_es_cache_extent as ext4_split_extent_at failed (bsc#1187408).\n- ext4: fix check to prevent false positive report of incorrect used inodes (bsc#1187404).\n- ext4: fix error code in ext4_commit_super (bsc#1187407).\n- ext4: fix memory leak in ext4_fill_super (bsc#1187409).\n- FCOE: fcoe_wwn_from_mac kABI fix (bsc#1186528).\n- ftrace: Do not blindly read the ip address in ftrace_bug() (git-fixes).\n- ftrace: Free the trampoline when ftrace_startup() fails (git-fixes).\n- HID: pidff: fix error return code in hid_pidff_init() (git-fixes).\n- i2c: mpc: Make use of i2c_recover_bus() (git-fixes).\n- ima: Free IMA measurement buffer after kexec syscall (git-fixes).\n- isdn: mISDN: netjet: Fix crash in nj_probe: (git-fixes).\n- isdn: mISDNinfineon: check/cleanup ioremap failure correctly in setup_io (git-fixes).\n- ixgbe: fix large MTU request from VF (git-fixes).\n- ixgbevf: add correct exception tracing for XDP (bsc#1113994 ).\n- kabi fix for NFSv4.1: Do not rebind to the same source port when reconnecting to the server (bnc#1186264).\n- kernel: kexec_file: fix error return code of kexec_calculate_store_digests() (git-fixes).\n- kthread_worker: split code for canceling the delayed work timer (bsc#1187867).\n- kthread: prevent deadlock when kthread_mod_delayed_work() races with kthread_cancel_delayed_work_sync() (bsc#1187867).\n- libertas: register sysfs groups properly (git-fixes).\n- md: Fix missing unused status line of /proc/mdstat (git-fixes).\n- media: dvb: Add check on sp8870_readreg return (git-fixes).\n- media: gspca: properly check for errors in po1030_probe() (git-fixes).\n- mei: request autosuspend after sending rx flow control (git-fixes).\n- mlxsw: spectrum: Do not process learned records with a dummy FID (git-fixes).\n- Move nfs backports into sorted section\n- net: bnx2: Fix error return code in bnx2_init_board() (git-fixes).\n- net: caif: Fix debugfs on 64-bit platforms (git-fixes).\n- net: dsa: mv88e6xxx: Fix writing to a PHY page (git-fixes).\n- net: dsa: qca8k: Use up to 7 ports for all operations (git-fixes).\n- net: fix iteration for sctp transport seq_files (git-fixes).\n- net: hns3: Limiting the scope of vector_ring_chain variable (bsc#1104353).\n- net: netcp: Fix an error message (git-fixes).\n- net: stmmac: Correctly take timestamp for PTPv2 (git-fixes).\n- net: stmmac: ensure that the device has released ownership before reading data (git-fixes).\n- net/nfc/rawsock.c: fix a permission check bug (git-fixes).\n- net/smc: remove device from smcd_dev_list after failed device_add() (git-fixes).\n- nfc: fix NULL ptr dereference in llcp_sock_getname() after failed connect (git-fixes).\n- NFS: Always flush out writes in nfs42_proc_fallocate() (git-fixes).\n- NFS: Deal correctly with attribute generation counter overflow (git-fixes).\n- NFS: Do not corrupt the value of pg_bytes_written in nfs_do_recoalesce() (git-fixes).\n- NFS: Do not discard segments marked for return in _pnfs_return_layout() (git-fixes).\n- NFS: Do not gratuitously clear the inode cache when lookup failed (git-fixes).\n- NFS: Do not rebind to the same source port when reconnecting to the server (bnc#1186264).\n- NFS: Do not revalidate the directory permissions on a lookup failure (git-fixes).\n- NFS: Fix a NULL pointer dereference in pnfs_mark_matching_lsegs_return() (git-fixes).\n- NFS: Fix a potential NULL dereference in nfs_get_client() (git-fixes).\n- NFS: fix an incorrect limit in filelayout_decode_layout() (git-fixes).\n- NFS: Fix an Oopsable condition in __nfs_pageio_add_request() (git-fixes).\n- NFS: fix handling of sr_eof in SEEK\u0027s reply (git-fixes).\n- NFS: fix return value of _nfs4_get_security_label() (git-fixes).\n- NFS: Fix v4.0/v4.1 SEEK_DATA return -ENOTSUPP when set NFS_V4_2 config (git-fixes).\n- NFS: nfs4_proc_set_acl needs to restore NFS_CAP_UIDGID_NOMAP on error (git-fixes).\n- NFS: Repair misuse of sv_lock in 5.10.16-rt30 (git-fixes).\n- ocfs2: fix data corruption by fallocate (bsc#1187412).\n- parisc: parisc-agp requires SBA IOMMU driver (bsc#1129770)\n- pid: take a reference when initializing `cad_pid` (bsc#1114648).\n- platform/x86: hp-wireless: add AMD\u0027s hardware id to the supported list (git-fixes).\n- platform/x86: intel_punit_ipc: Append MODULE_DEVICE_TABLE for ACPI (git-fixes).\n- pNFS/flexfiles: fix incorrect size check in decode_nfs_fh() (git-fixes).\n- pNFS/NFSv4: Fix a layout segment leak in pnfs_layout_process() (git-fixes).\n- qla2xxx: synchronize rport dev_loss_tmo setting (bsc#1182470 bsc#1185486).\n- qlcnic: Add null check after calling netdev_alloc_skb (git-fixes).\n- ravb: fix invalid context bug while calling auto-negotiation by ethtool (git-fixes).\n- ravb: fix invalid context bug while changing link options by ethtool (git-fixes).\n- RDMA/mlx5: Recover from fatal event in dual port mode (bsc#1103991).\n- Revert \u0027ibmvnic: simplify reset_long_term_buff function\u0027 (bsc#1186206 ltc#191041).\n- Revert 337f13046ff0 (\u0027futex: Allow FUTEX_CLOCK_REALTIME with FUTEX_WAIT op\u0027) (git-fixes).\n- s390/stack: fix possible register corruption with stack switch helper (bsc#1185677).\n- scsi: aacraid: Fix an oops in error handling (bsc#1186698).\n- scsi: aacraid: Remove erroneous fallthrough annotation (bsc#1186516).\n- scsi: aacraid: Use memdup_user() as a cleanup (bsc#1186517).\n- scsi: acornscsi: Fix an error handling path in acornscsi_probe() (bsc#1186518).\n- scsi: be2iscsi: Fix a theoretical leak in beiscsi_create_eqs() (bsc#1186519).\n- scsi: be2iscsi: Revert \u0027Fix a theoretical leak in beiscsi_create_eqs()\u0027 (bsc#1186699).\n- scsi: bfa: Fix error return in bfad_pci_init() (bsc#1186520).\n- scsi: bnx2fc: Fix Kconfig warning and CNIC build errors (bsc#1186521).\n- scsi: bnx2i: Requires MMU (bsc#1186522).\n- scsi: csiostor: Fix wrong return value in csio_hw_prep_fw() (bsc#1186523).\n- scsi: cumana_2: Fix different dev_id between request_irq() and free_irq() (bsc#1186524).\n- scsi: cxgb3i: Fix some leaks in init_act_open() (bsc#1186525).\n- scsi: cxgb4i: Fix TLS dependency (bsc#1186526).\n- scsi: eesox: Fix different dev_id between request_irq() and free_irq() (bsc#1186527).\n- scsi: fcoe: Fix mismatched fcoe_wwn_from_mac declaration (bsc#1186528).\n- scsi: fnic: Fix error return code in fnic_probe() (bsc#1186529).\n- scsi: hisi_sas: Fix IRQ checks (bsc#1186530).\n- scsi: hisi_sas: Remove preemptible() (bsc#1186638).\n- scsi: jazz_esp: Add IRQ check (bsc#1186531).\n- scsi: libfc: Fix enum-conversion warning (bsc#1186532).\n- scsi: libsas: Fix error path in sas_notify_lldd_dev_found() (bsc#1186533).\n- scsi: libsas: Reset num_scatter if libata marks qc as NODATA (bsc#1186700).\n- scsi: libsas: Set data_dir as DMA_NONE if libata marks qc as NODATA (bsc#1186534).\n- scsi: lpfc: Fix failure to transmit ABTS on FC link (git-fixes).\n- scsi: megaraid_sas: Check user-provided offsets (bsc#1186535).\n- scsi: megaraid_sas: Fix MEGASAS_IOC_FIRMWARE regression (bsc#1186701).\n- scsi: mesh: Fix panic after host or bus reset (bsc#1186537).\n- scsi: mpt3sas: Fix error return code of mpt3sas_base_attach() (bsc#1186538).\n- scsi: pm80xx: Fix error return in pm8001_pci_probe() (bsc#1186539).\n- scsi: powertec: Fix different dev_id between request_irq() and free_irq() (bsc#1186540).\n- scsi: qedi: Check for buffer overflow in qedi_set_path() (bsc#1186541).\n- scsi: qedi: Fix error return code of qedi_alloc_global_queues() (bsc#1186542).\n- scsi: qedi: Fix missing destroy_workqueue() on error in __qedi_probe (bsc#1186543).\n- scsi: qla4xxx: Fix an error handling path in \u0027qla4xxx_get_host_stats()\u0027 (bsc#1186545).\n- scsi: qla4xxx: Remove in_interrupt() (bsc#1186546).\n- scsi: scsi_debug: Add check for sdebug_max_queue during module init (bsc#1186547).\n- scsi: scsi_dh_alua: Retry RTPG on a different path after failure (bsc#1174978 bsc#1185701).\n- scsi: sd: Fix optimal I/O size for devices that change reported values (bsc#1186548).\n- scsi: sg: add sg_remove_request in sg_write (bsc#1186635).\n- scsi: sni_53c710: Add IRQ check (bsc#1186549).\n- scsi: sun3x_esp: Add IRQ check (bsc#1186550).\n- scsi: ufs-qcom: Fix scheduling while atomic issue (bsc#1186556).\n- scsi: ufs: core: Narrow down fast path in system suspend path (bsc#1186551).\n- scsi: ufs: Do not update urgent bkops level when toggling auto bkops (bsc#1186552).\n- scsi: ufs: Fix imprecise load calculation in devfreq window (bsc#1187630).\n- SCSI: ufs: fix ktime_t kabi change (bsc#1187630).\n- scsi: ufs: Fix race between shutdown and runtime resume flow (bsc#1186554).\n- scsi: ufs: Properly release resources if a task is aborted successfully (bsc#1186555).\n- scsi: ufs: ufshcd-pltfrm depends on HAS_IOMEM (bsc#1188010).\n- scsi: ufs: ufshcd-pltfrm: Fix deferred probing (bsc#1187631).\n- serial: max310x: unregister uart driver in case of failure and abort (git-fixes).\n- serial: rp2: use \u0027request_firmware\u0027 instead of \u0027request_firmware_nowait\u0027 (git-fixes).\n- staging: rtl8723bs: Fix uninitialized variables (git-fixes).\n- SUNRPC: correct error code comment in xs_tcp_setup_socket() (git-fixes).\n- SUNRPC: fix refcount leak for rpc auth modules (git-fixes).\n- SUNRPC: Move fault injection call sites (git-fixes).\n- SUNRPC: prevent port reuse on transports which do not request it (bnc#1186264).\n- svcrdma: disable timeouts on rdma backchannel (git-fixes).\n- swiotlb: fix \u0027x86: Do not panic if can not alloc buffer for swiotlb\u0027 (git-fixes).\n- tls splice: check SPLICE_F_NONBLOCK instead of MSG_DONTWAIT (bsc#1103990).\n- tracing: Correct the length check which causes memory corruption (git-fixes).\n- tracing: Do no increment trace_clock_global() by one (git-fixes).\n- tracing: Restructure trace_clock_global() to never block (git-fixes).\n- ttyprintk: Add TTY hangup callback (git-fixes).\n- ubifs: Only check replay with inode type to judge if inode linked (bsc#1187455).\n- USB: cdc-acm: always claim data interface (git-fixes).\n- USB: cdc-acm: do not log successful probe on later errors (git-fixes).\n- USB: dwc3: ep0: fix NULL pointer exception (git-fixes).\n- USB: pd: Set PD_T_SINK_WAIT_CAP to 310ms (git-fixes).\n- USB: serial: ftdi_sio: add IDs for IDS GmbH Products (git-fixes).\n- USB: serial: ftdi_sio: add NovaTech OrionMX product ID (git-fixes).\n- USB: serial: omninet: add device id for Zyxel Omni 56K Plus (git-fixes).\n- USB: serial: option: add Telit LE910-S1 compositions 0x7010, 0x7011 (git-fixes).\n- USB: serial: pl2303: add device id for ADLINK ND-6530 GC (git-fixes).\n- USB: serial: quatech2: fix control-request directions (git-fixes).\n- USB: serial: ti_usb_3410_5052: add startech.com device id (git-fixes).\n- USB: serial: usb_wwan: fix TIOCSSERIAL jiffies conversions (git-fixes).\n- USB: typec: tcpm: Use LE to CPU conversion when accessing msg-\u003eheader (git-fixes).\n- USB: typec: ucsi: Clear PPM capability data in ucsi_init() error path (git-fixes).\n- USB: typec: ucsi: Put fwnode in any case during -\u003eprobe() (git-fixes).\n- vfio/pci: Fix error return code in vfio_ecap_init() (git-fixes).\n- vfio/pci: zap_vma_ptes() needs MMU (git-fixes).\n- vfio/platform: fix module_put call in error flow (git-fixes).\n- video: hgafb: correctly handle card detect failure during probe (bsc#1129770)\n- video: hgafb: fix potential NULL pointer dereference (bsc#1129770) Backporting changes: * context changes\n- x86: fix seq_file iteration for pat/memtype.c (git-fixes).\n- x86/cpu: Initialize MSR_TSC_AUX if RDTSCP *or* RDPID is supported (bsc#1114648).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2021-2324,SUSE-SLE-HA-12-SP5-2021-2324,SUSE-SLE-Live-Patching-12-SP5-2021-2324,SUSE-SLE-SDK-12-SP5-2021-2324,SUSE-SLE-SERVER-12-SP5-2021-2324,SUSE-SLE-WE-12-SP5-2021-2324",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2021_2324-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2021:2324-1",
"url": "https://www.suse.com/support/update/announcement/2021/suse-su-20212324-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2021:2324-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2021-July/009141.html"
},
{
"category": "self",
"summary": "SUSE Bug 1103990",
"url": "https://bugzilla.suse.com/1103990"
},
{
"category": "self",
"summary": "SUSE Bug 1103991",
"url": "https://bugzilla.suse.com/1103991"
},
{
"category": "self",
"summary": "SUSE Bug 1104353",
"url": "https://bugzilla.suse.com/1104353"
},
{
"category": "self",
"summary": "SUSE Bug 1113994",
"url": "https://bugzilla.suse.com/1113994"
},
{
"category": "self",
"summary": "SUSE Bug 1114648",
"url": "https://bugzilla.suse.com/1114648"
},
{
"category": "self",
"summary": "SUSE Bug 1129770",
"url": "https://bugzilla.suse.com/1129770"
},
{
"category": "self",
"summary": "SUSE Bug 1135481",
"url": "https://bugzilla.suse.com/1135481"
},
{
"category": "self",
"summary": "SUSE Bug 1136345",
"url": "https://bugzilla.suse.com/1136345"
},
{
"category": "self",
"summary": "SUSE Bug 1174978",
"url": "https://bugzilla.suse.com/1174978"
},
{
"category": "self",
"summary": "SUSE Bug 1179610",
"url": "https://bugzilla.suse.com/1179610"
},
{
"category": "self",
"summary": "SUSE Bug 1182470",
"url": "https://bugzilla.suse.com/1182470"
},
{
"category": "self",
"summary": "SUSE Bug 1185486",
"url": "https://bugzilla.suse.com/1185486"
},
{
"category": "self",
"summary": "SUSE Bug 1185677",
"url": "https://bugzilla.suse.com/1185677"
},
{
"category": "self",
"summary": "SUSE Bug 1185701",
"url": "https://bugzilla.suse.com/1185701"
},
{
"category": "self",
"summary": "SUSE Bug 1185861",
"url": "https://bugzilla.suse.com/1185861"
},
{
"category": "self",
"summary": "SUSE Bug 1185863",
"url": "https://bugzilla.suse.com/1185863"
},
{
"category": "self",
"summary": "SUSE Bug 1186206",
"url": "https://bugzilla.suse.com/1186206"
},
{
"category": "self",
"summary": "SUSE Bug 1186264",
"url": "https://bugzilla.suse.com/1186264"
},
{
"category": "self",
"summary": "SUSE Bug 1186463",
"url": "https://bugzilla.suse.com/1186463"
},
{
"category": "self",
"summary": "SUSE Bug 1186515",
"url": "https://bugzilla.suse.com/1186515"
},
{
"category": "self",
"summary": "SUSE Bug 1186516",
"url": "https://bugzilla.suse.com/1186516"
},
{
"category": "self",
"summary": "SUSE Bug 1186517",
"url": "https://bugzilla.suse.com/1186517"
},
{
"category": "self",
"summary": "SUSE Bug 1186518",
"url": "https://bugzilla.suse.com/1186518"
},
{
"category": "self",
"summary": "SUSE Bug 1186519",
"url": "https://bugzilla.suse.com/1186519"
},
{
"category": "self",
"summary": "SUSE Bug 1186520",
"url": "https://bugzilla.suse.com/1186520"
},
{
"category": "self",
"summary": "SUSE Bug 1186521",
"url": "https://bugzilla.suse.com/1186521"
},
{
"category": "self",
"summary": "SUSE Bug 1186522",
"url": "https://bugzilla.suse.com/1186522"
},
{
"category": "self",
"summary": "SUSE Bug 1186523",
"url": "https://bugzilla.suse.com/1186523"
},
{
"category": "self",
"summary": "SUSE Bug 1186524",
"url": "https://bugzilla.suse.com/1186524"
},
{
"category": "self",
"summary": "SUSE Bug 1186525",
"url": "https://bugzilla.suse.com/1186525"
},
{
"category": "self",
"summary": "SUSE Bug 1186526",
"url": "https://bugzilla.suse.com/1186526"
},
{
"category": "self",
"summary": "SUSE Bug 1186527",
"url": "https://bugzilla.suse.com/1186527"
},
{
"category": "self",
"summary": "SUSE Bug 1186528",
"url": "https://bugzilla.suse.com/1186528"
},
{
"category": "self",
"summary": "SUSE Bug 1186529",
"url": "https://bugzilla.suse.com/1186529"
},
{
"category": "self",
"summary": "SUSE Bug 1186530",
"url": "https://bugzilla.suse.com/1186530"
},
{
"category": "self",
"summary": "SUSE Bug 1186531",
"url": "https://bugzilla.suse.com/1186531"
},
{
"category": "self",
"summary": "SUSE Bug 1186532",
"url": "https://bugzilla.suse.com/1186532"
},
{
"category": "self",
"summary": "SUSE Bug 1186533",
"url": "https://bugzilla.suse.com/1186533"
},
{
"category": "self",
"summary": "SUSE Bug 1186534",
"url": "https://bugzilla.suse.com/1186534"
},
{
"category": "self",
"summary": "SUSE Bug 1186535",
"url": "https://bugzilla.suse.com/1186535"
},
{
"category": "self",
"summary": "SUSE Bug 1186537",
"url": "https://bugzilla.suse.com/1186537"
},
{
"category": "self",
"summary": "SUSE Bug 1186538",
"url": "https://bugzilla.suse.com/1186538"
},
{
"category": "self",
"summary": "SUSE Bug 1186539",
"url": "https://bugzilla.suse.com/1186539"
},
{
"category": "self",
"summary": "SUSE Bug 1186540",
"url": "https://bugzilla.suse.com/1186540"
},
{
"category": "self",
"summary": "SUSE Bug 1186541",
"url": "https://bugzilla.suse.com/1186541"
},
{
"category": "self",
"summary": "SUSE Bug 1186542",
"url": "https://bugzilla.suse.com/1186542"
},
{
"category": "self",
"summary": "SUSE Bug 1186543",
"url": "https://bugzilla.suse.com/1186543"
},
{
"category": "self",
"summary": "SUSE Bug 1186545",
"url": "https://bugzilla.suse.com/1186545"
},
{
"category": "self",
"summary": "SUSE Bug 1186546",
"url": "https://bugzilla.suse.com/1186546"
},
{
"category": "self",
"summary": "SUSE Bug 1186547",
"url": "https://bugzilla.suse.com/1186547"
},
{
"category": "self",
"summary": "SUSE Bug 1186548",
"url": "https://bugzilla.suse.com/1186548"
},
{
"category": "self",
"summary": "SUSE Bug 1186549",
"url": "https://bugzilla.suse.com/1186549"
},
{
"category": "self",
"summary": "SUSE Bug 1186550",
"url": "https://bugzilla.suse.com/1186550"
},
{
"category": "self",
"summary": "SUSE Bug 1186551",
"url": "https://bugzilla.suse.com/1186551"
},
{
"category": "self",
"summary": "SUSE Bug 1186552",
"url": "https://bugzilla.suse.com/1186552"
},
{
"category": "self",
"summary": "SUSE Bug 1186554",
"url": "https://bugzilla.suse.com/1186554"
},
{
"category": "self",
"summary": "SUSE Bug 1186555",
"url": "https://bugzilla.suse.com/1186555"
},
{
"category": "self",
"summary": "SUSE Bug 1186556",
"url": "https://bugzilla.suse.com/1186556"
},
{
"category": "self",
"summary": "SUSE Bug 1186627",
"url": "https://bugzilla.suse.com/1186627"
},
{
"category": "self",
"summary": "SUSE Bug 1186635",
"url": "https://bugzilla.suse.com/1186635"
},
{
"category": "self",
"summary": "SUSE Bug 1186638",
"url": "https://bugzilla.suse.com/1186638"
},
{
"category": "self",
"summary": "SUSE Bug 1186698",
"url": "https://bugzilla.suse.com/1186698"
},
{
"category": "self",
"summary": "SUSE Bug 1186699",
"url": "https://bugzilla.suse.com/1186699"
},
{
"category": "self",
"summary": "SUSE Bug 1186700",
"url": "https://bugzilla.suse.com/1186700"
},
{
"category": "self",
"summary": "SUSE Bug 1186701",
"url": "https://bugzilla.suse.com/1186701"
},
{
"category": "self",
"summary": "SUSE Bug 1187038",
"url": "https://bugzilla.suse.com/1187038"
},
{
"category": "self",
"summary": "SUSE Bug 1187049",
"url": "https://bugzilla.suse.com/1187049"
},
{
"category": "self",
"summary": "SUSE Bug 1187402",
"url": "https://bugzilla.suse.com/1187402"
},
{
"category": "self",
"summary": "SUSE Bug 1187404",
"url": "https://bugzilla.suse.com/1187404"
},
{
"category": "self",
"summary": "SUSE Bug 1187407",
"url": "https://bugzilla.suse.com/1187407"
},
{
"category": "self",
"summary": "SUSE Bug 1187408",
"url": "https://bugzilla.suse.com/1187408"
},
{
"category": "self",
"summary": "SUSE Bug 1187409",
"url": "https://bugzilla.suse.com/1187409"
},
{
"category": "self",
"summary": "SUSE Bug 1187411",
"url": "https://bugzilla.suse.com/1187411"
},
{
"category": "self",
"summary": "SUSE Bug 1187412",
"url": "https://bugzilla.suse.com/1187412"
},
{
"category": "self",
"summary": "SUSE Bug 1187452",
"url": "https://bugzilla.suse.com/1187452"
},
{
"category": "self",
"summary": "SUSE Bug 1187453",
"url": "https://bugzilla.suse.com/1187453"
},
{
"category": "self",
"summary": "SUSE Bug 1187455",
"url": "https://bugzilla.suse.com/1187455"
},
{
"category": "self",
"summary": "SUSE Bug 1187554",
"url": "https://bugzilla.suse.com/1187554"
},
{
"category": "self",
"summary": "SUSE Bug 1187595",
"url": "https://bugzilla.suse.com/1187595"
},
{
"category": "self",
"summary": "SUSE Bug 1187601",
"url": "https://bugzilla.suse.com/1187601"
},
{
"category": "self",
"summary": "SUSE Bug 1187630",
"url": "https://bugzilla.suse.com/1187630"
},
{
"category": "self",
"summary": "SUSE Bug 1187631",
"url": "https://bugzilla.suse.com/1187631"
},
{
"category": "self",
"summary": "SUSE Bug 1187833",
"url": "https://bugzilla.suse.com/1187833"
},
{
"category": "self",
"summary": "SUSE Bug 1187867",
"url": "https://bugzilla.suse.com/1187867"
},
{
"category": "self",
"summary": "SUSE Bug 1187972",
"url": "https://bugzilla.suse.com/1187972"
},
{
"category": "self",
"summary": "SUSE Bug 1188010",
"url": "https://bugzilla.suse.com/1188010"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-25045 page",
"url": "https://www.suse.com/security/cve/CVE-2019-25045/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-24588 page",
"url": "https://www.suse.com/security/cve/CVE-2020-24588/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-26558 page",
"url": "https://www.suse.com/security/cve/CVE-2020-26558/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-36386 page",
"url": "https://www.suse.com/security/cve/CVE-2020-36386/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-0129 page",
"url": "https://www.suse.com/security/cve/CVE-2021-0129/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-0512 page",
"url": "https://www.suse.com/security/cve/CVE-2021-0512/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-0605 page",
"url": "https://www.suse.com/security/cve/CVE-2021-0605/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-33624 page",
"url": "https://www.suse.com/security/cve/CVE-2021-33624/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-34693 page",
"url": "https://www.suse.com/security/cve/CVE-2021-34693/"
}
],
"title": "Security update for the Linux Kernel",
"tracking": {
"current_release_date": "2021-07-14T15:05:40Z",
"generator": {
"date": "2021-07-14T15:05:40Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2021:2324-1",
"initial_release_date": "2021-07-14T15:05:40Z",
"revision_history": [
{
"date": "2021-07-14T15:05:40Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-4.12.14-122.77.1.aarch64",
"product": {
"name": "cluster-md-kmp-default-4.12.14-122.77.1.aarch64",
"product_id": "cluster-md-kmp-default-4.12.14-122.77.1.aarch64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-4.12.14-122.77.1.aarch64",
"product": {
"name": "dlm-kmp-default-4.12.14-122.77.1.aarch64",
"product_id": "dlm-kmp-default-4.12.14-122.77.1.aarch64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-4.12.14-122.77.1.aarch64",
"product": {
"name": "gfs2-kmp-default-4.12.14-122.77.1.aarch64",
"product_id": "gfs2-kmp-default-4.12.14-122.77.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-4.12.14-122.77.1.aarch64",
"product": {
"name": "kernel-default-4.12.14-122.77.1.aarch64",
"product_id": "kernel-default-4.12.14-122.77.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-4.12.14-122.77.1.aarch64",
"product": {
"name": "kernel-default-base-4.12.14-122.77.1.aarch64",
"product_id": "kernel-default-base-4.12.14-122.77.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-4.12.14-122.77.1.aarch64",
"product": {
"name": "kernel-default-devel-4.12.14-122.77.1.aarch64",
"product_id": "kernel-default-devel-4.12.14-122.77.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-4.12.14-122.77.1.aarch64",
"product": {
"name": "kernel-default-extra-4.12.14-122.77.1.aarch64",
"product_id": "kernel-default-extra-4.12.14-122.77.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-kgraft-4.12.14-122.77.1.aarch64",
"product": {
"name": "kernel-default-kgraft-4.12.14-122.77.1.aarch64",
"product_id": "kernel-default-kgraft-4.12.14-122.77.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-kgraft-devel-4.12.14-122.77.1.aarch64",
"product": {
"name": "kernel-default-kgraft-devel-4.12.14-122.77.1.aarch64",
"product_id": "kernel-default-kgraft-devel-4.12.14-122.77.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-4.12.14-122.77.1.aarch64",
"product": {
"name": "kernel-obs-build-4.12.14-122.77.1.aarch64",
"product_id": "kernel-obs-build-4.12.14-122.77.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-4.12.14-122.77.1.aarch64",
"product": {
"name": "kernel-obs-qa-4.12.14-122.77.1.aarch64",
"product_id": "kernel-obs-qa-4.12.14-122.77.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-syms-4.12.14-122.77.1.aarch64",
"product": {
"name": "kernel-syms-4.12.14-122.77.1.aarch64",
"product_id": "kernel-syms-4.12.14-122.77.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-4.12.14-122.77.1.aarch64",
"product": {
"name": "kernel-vanilla-4.12.14-122.77.1.aarch64",
"product_id": "kernel-vanilla-4.12.14-122.77.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-base-4.12.14-122.77.1.aarch64",
"product": {
"name": "kernel-vanilla-base-4.12.14-122.77.1.aarch64",
"product_id": "kernel-vanilla-base-4.12.14-122.77.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-devel-4.12.14-122.77.1.aarch64",
"product": {
"name": "kernel-vanilla-devel-4.12.14-122.77.1.aarch64",
"product_id": "kernel-vanilla-devel-4.12.14-122.77.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-kgraft-devel-4.12.14-122.77.1.aarch64",
"product": {
"name": "kernel-vanilla-kgraft-devel-4.12.14-122.77.1.aarch64",
"product_id": "kernel-vanilla-kgraft-devel-4.12.14-122.77.1.aarch64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-4.12.14-122.77.1.aarch64",
"product": {
"name": "kselftests-kmp-default-4.12.14-122.77.1.aarch64",
"product_id": "kselftests-kmp-default-4.12.14-122.77.1.aarch64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-4.12.14-122.77.1.aarch64",
"product": {
"name": "ocfs2-kmp-default-4.12.14-122.77.1.aarch64",
"product_id": "ocfs2-kmp-default-4.12.14-122.77.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-devel-4.12.14-122.77.1.noarch",
"product": {
"name": "kernel-devel-4.12.14-122.77.1.noarch",
"product_id": "kernel-devel-4.12.14-122.77.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-docs-4.12.14-122.77.1.noarch",
"product": {
"name": "kernel-docs-4.12.14-122.77.1.noarch",
"product_id": "kernel-docs-4.12.14-122.77.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-docs-html-4.12.14-122.77.1.noarch",
"product": {
"name": "kernel-docs-html-4.12.14-122.77.1.noarch",
"product_id": "kernel-docs-html-4.12.14-122.77.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-macros-4.12.14-122.77.1.noarch",
"product": {
"name": "kernel-macros-4.12.14-122.77.1.noarch",
"product_id": "kernel-macros-4.12.14-122.77.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-4.12.14-122.77.1.noarch",
"product": {
"name": "kernel-source-4.12.14-122.77.1.noarch",
"product_id": "kernel-source-4.12.14-122.77.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-vanilla-4.12.14-122.77.1.noarch",
"product": {
"name": "kernel-source-vanilla-4.12.14-122.77.1.noarch",
"product_id": "kernel-source-vanilla-4.12.14-122.77.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-4.12.14-122.77.1.ppc64le",
"product": {
"name": "cluster-md-kmp-default-4.12.14-122.77.1.ppc64le",
"product_id": "cluster-md-kmp-default-4.12.14-122.77.1.ppc64le"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-4.12.14-122.77.1.ppc64le",
"product": {
"name": "dlm-kmp-default-4.12.14-122.77.1.ppc64le",
"product_id": "dlm-kmp-default-4.12.14-122.77.1.ppc64le"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-4.12.14-122.77.1.ppc64le",
"product": {
"name": "gfs2-kmp-default-4.12.14-122.77.1.ppc64le",
"product_id": "gfs2-kmp-default-4.12.14-122.77.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-4.12.14-122.77.1.ppc64le",
"product": {
"name": "kernel-debug-4.12.14-122.77.1.ppc64le",
"product_id": "kernel-debug-4.12.14-122.77.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-base-4.12.14-122.77.1.ppc64le",
"product": {
"name": "kernel-debug-base-4.12.14-122.77.1.ppc64le",
"product_id": "kernel-debug-base-4.12.14-122.77.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-4.12.14-122.77.1.ppc64le",
"product": {
"name": "kernel-debug-devel-4.12.14-122.77.1.ppc64le",
"product_id": "kernel-debug-devel-4.12.14-122.77.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-kgraft-devel-4.12.14-122.77.1.ppc64le",
"product": {
"name": "kernel-debug-kgraft-devel-4.12.14-122.77.1.ppc64le",
"product_id": "kernel-debug-kgraft-devel-4.12.14-122.77.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-4.12.14-122.77.1.ppc64le",
"product": {
"name": "kernel-default-4.12.14-122.77.1.ppc64le",
"product_id": "kernel-default-4.12.14-122.77.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-base-4.12.14-122.77.1.ppc64le",
"product": {
"name": "kernel-default-base-4.12.14-122.77.1.ppc64le",
"product_id": "kernel-default-base-4.12.14-122.77.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-4.12.14-122.77.1.ppc64le",
"product": {
"name": "kernel-default-devel-4.12.14-122.77.1.ppc64le",
"product_id": "kernel-default-devel-4.12.14-122.77.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-4.12.14-122.77.1.ppc64le",
"product": {
"name": "kernel-default-extra-4.12.14-122.77.1.ppc64le",
"product_id": "kernel-default-extra-4.12.14-122.77.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-kgraft-4.12.14-122.77.1.ppc64le",
"product": {
"name": "kernel-default-kgraft-4.12.14-122.77.1.ppc64le",
"product_id": "kernel-default-kgraft-4.12.14-122.77.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-kgraft-devel-4.12.14-122.77.1.ppc64le",
"product": {
"name": "kernel-default-kgraft-devel-4.12.14-122.77.1.ppc64le",
"product_id": "kernel-default-kgraft-devel-4.12.14-122.77.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-4.12.14-122.77.1.ppc64le",
"product": {
"name": "kernel-obs-build-4.12.14-122.77.1.ppc64le",
"product_id": "kernel-obs-build-4.12.14-122.77.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-4.12.14-122.77.1.ppc64le",
"product": {
"name": "kernel-obs-qa-4.12.14-122.77.1.ppc64le",
"product_id": "kernel-obs-qa-4.12.14-122.77.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-syms-4.12.14-122.77.1.ppc64le",
"product": {
"name": "kernel-syms-4.12.14-122.77.1.ppc64le",
"product_id": "kernel-syms-4.12.14-122.77.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-4.12.14-122.77.1.ppc64le",
"product": {
"name": "kernel-vanilla-4.12.14-122.77.1.ppc64le",
"product_id": "kernel-vanilla-4.12.14-122.77.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-base-4.12.14-122.77.1.ppc64le",
"product": {
"name": "kernel-vanilla-base-4.12.14-122.77.1.ppc64le",
"product_id": "kernel-vanilla-base-4.12.14-122.77.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-devel-4.12.14-122.77.1.ppc64le",
"product": {
"name": "kernel-vanilla-devel-4.12.14-122.77.1.ppc64le",
"product_id": "kernel-vanilla-devel-4.12.14-122.77.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-kgraft-devel-4.12.14-122.77.1.ppc64le",
"product": {
"name": "kernel-vanilla-kgraft-devel-4.12.14-122.77.1.ppc64le",
"product_id": "kernel-vanilla-kgraft-devel-4.12.14-122.77.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-122_77-default-1-8.3.1.ppc64le",
"product": {
"name": "kgraft-patch-4_12_14-122_77-default-1-8.3.1.ppc64le",
"product_id": "kgraft-patch-4_12_14-122_77-default-1-8.3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-4.12.14-122.77.1.ppc64le",
"product": {
"name": "kselftests-kmp-default-4.12.14-122.77.1.ppc64le",
"product_id": "kselftests-kmp-default-4.12.14-122.77.1.ppc64le"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-4.12.14-122.77.1.ppc64le",
"product": {
"name": "ocfs2-kmp-default-4.12.14-122.77.1.ppc64le",
"product_id": "ocfs2-kmp-default-4.12.14-122.77.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-4.12.14-122.77.1.s390x",
"product": {
"name": "cluster-md-kmp-default-4.12.14-122.77.1.s390x",
"product_id": "cluster-md-kmp-default-4.12.14-122.77.1.s390x"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-4.12.14-122.77.1.s390x",
"product": {
"name": "dlm-kmp-default-4.12.14-122.77.1.s390x",
"product_id": "dlm-kmp-default-4.12.14-122.77.1.s390x"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-4.12.14-122.77.1.s390x",
"product": {
"name": "gfs2-kmp-default-4.12.14-122.77.1.s390x",
"product_id": "gfs2-kmp-default-4.12.14-122.77.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-4.12.14-122.77.1.s390x",
"product": {
"name": "kernel-default-4.12.14-122.77.1.s390x",
"product_id": "kernel-default-4.12.14-122.77.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-base-4.12.14-122.77.1.s390x",
"product": {
"name": "kernel-default-base-4.12.14-122.77.1.s390x",
"product_id": "kernel-default-base-4.12.14-122.77.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-4.12.14-122.77.1.s390x",
"product": {
"name": "kernel-default-devel-4.12.14-122.77.1.s390x",
"product_id": "kernel-default-devel-4.12.14-122.77.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-4.12.14-122.77.1.s390x",
"product": {
"name": "kernel-default-extra-4.12.14-122.77.1.s390x",
"product_id": "kernel-default-extra-4.12.14-122.77.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-kgraft-4.12.14-122.77.1.s390x",
"product": {
"name": "kernel-default-kgraft-4.12.14-122.77.1.s390x",
"product_id": "kernel-default-kgraft-4.12.14-122.77.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-kgraft-devel-4.12.14-122.77.1.s390x",
"product": {
"name": "kernel-default-kgraft-devel-4.12.14-122.77.1.s390x",
"product_id": "kernel-default-kgraft-devel-4.12.14-122.77.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-man-4.12.14-122.77.1.s390x",
"product": {
"name": "kernel-default-man-4.12.14-122.77.1.s390x",
"product_id": "kernel-default-man-4.12.14-122.77.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-4.12.14-122.77.1.s390x",
"product": {
"name": "kernel-obs-build-4.12.14-122.77.1.s390x",
"product_id": "kernel-obs-build-4.12.14-122.77.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-4.12.14-122.77.1.s390x",
"product": {
"name": "kernel-obs-qa-4.12.14-122.77.1.s390x",
"product_id": "kernel-obs-qa-4.12.14-122.77.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-syms-4.12.14-122.77.1.s390x",
"product": {
"name": "kernel-syms-4.12.14-122.77.1.s390x",
"product_id": "kernel-syms-4.12.14-122.77.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-4.12.14-122.77.1.s390x",
"product": {
"name": "kernel-vanilla-4.12.14-122.77.1.s390x",
"product_id": "kernel-vanilla-4.12.14-122.77.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-base-4.12.14-122.77.1.s390x",
"product": {
"name": "kernel-vanilla-base-4.12.14-122.77.1.s390x",
"product_id": "kernel-vanilla-base-4.12.14-122.77.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-devel-4.12.14-122.77.1.s390x",
"product": {
"name": "kernel-vanilla-devel-4.12.14-122.77.1.s390x",
"product_id": "kernel-vanilla-devel-4.12.14-122.77.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-kgraft-devel-4.12.14-122.77.1.s390x",
"product": {
"name": "kernel-vanilla-kgraft-devel-4.12.14-122.77.1.s390x",
"product_id": "kernel-vanilla-kgraft-devel-4.12.14-122.77.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-4.12.14-122.77.1.s390x",
"product": {
"name": "kernel-zfcpdump-4.12.14-122.77.1.s390x",
"product_id": "kernel-zfcpdump-4.12.14-122.77.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-man-4.12.14-122.77.1.s390x",
"product": {
"name": "kernel-zfcpdump-man-4.12.14-122.77.1.s390x",
"product_id": "kernel-zfcpdump-man-4.12.14-122.77.1.s390x"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-122_77-default-1-8.3.1.s390x",
"product": {
"name": "kgraft-patch-4_12_14-122_77-default-1-8.3.1.s390x",
"product_id": "kgraft-patch-4_12_14-122_77-default-1-8.3.1.s390x"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-4.12.14-122.77.1.s390x",
"product": {
"name": "kselftests-kmp-default-4.12.14-122.77.1.s390x",
"product_id": "kselftests-kmp-default-4.12.14-122.77.1.s390x"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-4.12.14-122.77.1.s390x",
"product": {
"name": "ocfs2-kmp-default-4.12.14-122.77.1.s390x",
"product_id": "ocfs2-kmp-default-4.12.14-122.77.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-4.12.14-122.77.1.x86_64",
"product": {
"name": "cluster-md-kmp-default-4.12.14-122.77.1.x86_64",
"product_id": "cluster-md-kmp-default-4.12.14-122.77.1.x86_64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-4.12.14-122.77.1.x86_64",
"product": {
"name": "dlm-kmp-default-4.12.14-122.77.1.x86_64",
"product_id": "dlm-kmp-default-4.12.14-122.77.1.x86_64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-4.12.14-122.77.1.x86_64",
"product": {
"name": "gfs2-kmp-default-4.12.14-122.77.1.x86_64",
"product_id": "gfs2-kmp-default-4.12.14-122.77.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-4.12.14-122.77.1.x86_64",
"product": {
"name": "kernel-debug-4.12.14-122.77.1.x86_64",
"product_id": "kernel-debug-4.12.14-122.77.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-base-4.12.14-122.77.1.x86_64",
"product": {
"name": "kernel-debug-base-4.12.14-122.77.1.x86_64",
"product_id": "kernel-debug-base-4.12.14-122.77.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-4.12.14-122.77.1.x86_64",
"product": {
"name": "kernel-debug-devel-4.12.14-122.77.1.x86_64",
"product_id": "kernel-debug-devel-4.12.14-122.77.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-kgraft-devel-4.12.14-122.77.1.x86_64",
"product": {
"name": "kernel-debug-kgraft-devel-4.12.14-122.77.1.x86_64",
"product_id": "kernel-debug-kgraft-devel-4.12.14-122.77.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-4.12.14-122.77.1.x86_64",
"product": {
"name": "kernel-default-4.12.14-122.77.1.x86_64",
"product_id": "kernel-default-4.12.14-122.77.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-4.12.14-122.77.1.x86_64",
"product": {
"name": "kernel-default-base-4.12.14-122.77.1.x86_64",
"product_id": "kernel-default-base-4.12.14-122.77.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-4.12.14-122.77.1.x86_64",
"product": {
"name": "kernel-default-devel-4.12.14-122.77.1.x86_64",
"product_id": "kernel-default-devel-4.12.14-122.77.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-4.12.14-122.77.1.x86_64",
"product": {
"name": "kernel-default-extra-4.12.14-122.77.1.x86_64",
"product_id": "kernel-default-extra-4.12.14-122.77.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-kgraft-4.12.14-122.77.1.x86_64",
"product": {
"name": "kernel-default-kgraft-4.12.14-122.77.1.x86_64",
"product_id": "kernel-default-kgraft-4.12.14-122.77.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-kgraft-devel-4.12.14-122.77.1.x86_64",
"product": {
"name": "kernel-default-kgraft-devel-4.12.14-122.77.1.x86_64",
"product_id": "kernel-default-kgraft-devel-4.12.14-122.77.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-4.12.14-122.77.1.x86_64",
"product": {
"name": "kernel-kvmsmall-4.12.14-122.77.1.x86_64",
"product_id": "kernel-kvmsmall-4.12.14-122.77.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-base-4.12.14-122.77.1.x86_64",
"product": {
"name": "kernel-kvmsmall-base-4.12.14-122.77.1.x86_64",
"product_id": "kernel-kvmsmall-base-4.12.14-122.77.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-devel-4.12.14-122.77.1.x86_64",
"product": {
"name": "kernel-kvmsmall-devel-4.12.14-122.77.1.x86_64",
"product_id": "kernel-kvmsmall-devel-4.12.14-122.77.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-kgraft-devel-4.12.14-122.77.1.x86_64",
"product": {
"name": "kernel-kvmsmall-kgraft-devel-4.12.14-122.77.1.x86_64",
"product_id": "kernel-kvmsmall-kgraft-devel-4.12.14-122.77.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-4.12.14-122.77.1.x86_64",
"product": {
"name": "kernel-obs-build-4.12.14-122.77.1.x86_64",
"product_id": "kernel-obs-build-4.12.14-122.77.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-4.12.14-122.77.1.x86_64",
"product": {
"name": "kernel-obs-qa-4.12.14-122.77.1.x86_64",
"product_id": "kernel-obs-qa-4.12.14-122.77.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-syms-4.12.14-122.77.1.x86_64",
"product": {
"name": "kernel-syms-4.12.14-122.77.1.x86_64",
"product_id": "kernel-syms-4.12.14-122.77.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-4.12.14-122.77.1.x86_64",
"product": {
"name": "kernel-vanilla-4.12.14-122.77.1.x86_64",
"product_id": "kernel-vanilla-4.12.14-122.77.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-base-4.12.14-122.77.1.x86_64",
"product": {
"name": "kernel-vanilla-base-4.12.14-122.77.1.x86_64",
"product_id": "kernel-vanilla-base-4.12.14-122.77.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-devel-4.12.14-122.77.1.x86_64",
"product": {
"name": "kernel-vanilla-devel-4.12.14-122.77.1.x86_64",
"product_id": "kernel-vanilla-devel-4.12.14-122.77.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-kgraft-devel-4.12.14-122.77.1.x86_64",
"product": {
"name": "kernel-vanilla-kgraft-devel-4.12.14-122.77.1.x86_64",
"product_id": "kernel-vanilla-kgraft-devel-4.12.14-122.77.1.x86_64"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-122_77-default-1-8.3.1.x86_64",
"product": {
"name": "kgraft-patch-4_12_14-122_77-default-1-8.3.1.x86_64",
"product_id": "kgraft-patch-4_12_14-122_77-default-1-8.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-4.12.14-122.77.1.x86_64",
"product": {
"name": "kselftests-kmp-default-4.12.14-122.77.1.x86_64",
"product_id": "kselftests-kmp-default-4.12.14-122.77.1.x86_64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-4.12.14-122.77.1.x86_64",
"product": {
"name": "ocfs2-kmp-default-4.12.14-122.77.1.x86_64",
"product_id": "ocfs2-kmp-default-4.12.14-122.77.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Availability Extension 12 SP5",
"product": {
"name": "SUSE Linux Enterprise High Availability Extension 12 SP5",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-ha:12:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 12 SP5",
"product": {
"name": "SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-live-patching:12:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Software Development Kit 12 SP5",
"product": {
"name": "SUSE Linux Enterprise Software Development Kit 12 SP5",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-sdk:12:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 12 SP5",
"product": {
"name": "SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles:12:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:12:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Workstation Extension 12 SP5",
"product": {
"name": "SUSE Linux Enterprise Workstation Extension 12 SP5",
"product_id": "SUSE Linux Enterprise Workstation Extension 12 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-we:12:sp5"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-4.12.14-122.77.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP5",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.77.1.ppc64le"
},
"product_reference": "cluster-md-kmp-default-4.12.14-122.77.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-4.12.14-122.77.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP5",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.77.1.s390x"
},
"product_reference": "cluster-md-kmp-default-4.12.14-122.77.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-4.12.14-122.77.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP5",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.77.1.x86_64"
},
"product_reference": "cluster-md-kmp-default-4.12.14-122.77.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-4.12.14-122.77.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP5",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.77.1.ppc64le"
},
"product_reference": "dlm-kmp-default-4.12.14-122.77.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-4.12.14-122.77.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP5",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.77.1.s390x"
},
"product_reference": "dlm-kmp-default-4.12.14-122.77.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-4.12.14-122.77.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP5",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.77.1.x86_64"
},
"product_reference": "dlm-kmp-default-4.12.14-122.77.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-4.12.14-122.77.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP5",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.77.1.ppc64le"
},
"product_reference": "gfs2-kmp-default-4.12.14-122.77.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-4.12.14-122.77.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP5",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.77.1.s390x"
},
"product_reference": "gfs2-kmp-default-4.12.14-122.77.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-4.12.14-122.77.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP5",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.77.1.x86_64"
},
"product_reference": "gfs2-kmp-default-4.12.14-122.77.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-4.12.14-122.77.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP5",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.77.1.ppc64le"
},
"product_reference": "ocfs2-kmp-default-4.12.14-122.77.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-4.12.14-122.77.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP5",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.77.1.s390x"
},
"product_reference": "ocfs2-kmp-default-4.12.14-122.77.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-4.12.14-122.77.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP5",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.77.1.x86_64"
},
"product_reference": "ocfs2-kmp-default-4.12.14-122.77.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-kgraft-4.12.14-122.77.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.77.1.ppc64le"
},
"product_reference": "kernel-default-kgraft-4.12.14-122.77.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-kgraft-4.12.14-122.77.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.77.1.s390x"
},
"product_reference": "kernel-default-kgraft-4.12.14-122.77.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-kgraft-4.12.14-122.77.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.77.1.x86_64"
},
"product_reference": "kernel-default-kgraft-4.12.14-122.77.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-kgraft-devel-4.12.14-122.77.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.77.1.ppc64le"
},
"product_reference": "kernel-default-kgraft-devel-4.12.14-122.77.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-kgraft-devel-4.12.14-122.77.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.77.1.s390x"
},
"product_reference": "kernel-default-kgraft-devel-4.12.14-122.77.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-kgraft-devel-4.12.14-122.77.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.77.1.x86_64"
},
"product_reference": "kernel-default-kgraft-devel-4.12.14-122.77.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_77-default-1-8.3.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_77-default-1-8.3.1.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_77-default-1-8.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_77-default-1-8.3.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_77-default-1-8.3.1.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_77-default-1-8.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_77-default-1-8.3.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_77-default-1-8.3.1.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_77-default-1-8.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-docs-4.12.14-122.77.1.noarch as component of SUSE Linux Enterprise Software Development Kit 12 SP5",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.77.1.noarch"
},
"product_reference": "kernel-docs-4.12.14-122.77.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.12.14-122.77.1.aarch64 as component of SUSE Linux Enterprise Software Development Kit 12 SP5",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.77.1.aarch64"
},
"product_reference": "kernel-obs-build-4.12.14-122.77.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.12.14-122.77.1.ppc64le as component of SUSE Linux Enterprise Software Development Kit 12 SP5",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.77.1.ppc64le"
},
"product_reference": "kernel-obs-build-4.12.14-122.77.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.12.14-122.77.1.s390x as component of SUSE Linux Enterprise Software Development Kit 12 SP5",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.77.1.s390x"
},
"product_reference": "kernel-obs-build-4.12.14-122.77.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.12.14-122.77.1.x86_64 as component of SUSE Linux Enterprise Software Development Kit 12 SP5",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.77.1.x86_64"
},
"product_reference": "kernel-obs-build-4.12.14-122.77.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-122.77.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.77.1.aarch64"
},
"product_reference": "kernel-default-4.12.14-122.77.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-122.77.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.77.1.ppc64le"
},
"product_reference": "kernel-default-4.12.14-122.77.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-122.77.1.s390x as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.77.1.s390x"
},
"product_reference": "kernel-default-4.12.14-122.77.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-122.77.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.77.1.x86_64"
},
"product_reference": "kernel-default-4.12.14-122.77.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-122.77.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.77.1.aarch64"
},
"product_reference": "kernel-default-base-4.12.14-122.77.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-122.77.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.77.1.ppc64le"
},
"product_reference": "kernel-default-base-4.12.14-122.77.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-122.77.1.s390x as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.77.1.s390x"
},
"product_reference": "kernel-default-base-4.12.14-122.77.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-122.77.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.77.1.x86_64"
},
"product_reference": "kernel-default-base-4.12.14-122.77.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-122.77.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.77.1.aarch64"
},
"product_reference": "kernel-default-devel-4.12.14-122.77.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-122.77.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.77.1.ppc64le"
},
"product_reference": "kernel-default-devel-4.12.14-122.77.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-122.77.1.s390x as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.77.1.s390x"
},
"product_reference": "kernel-default-devel-4.12.14-122.77.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-122.77.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.77.1.x86_64"
},
"product_reference": "kernel-default-devel-4.12.14-122.77.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-man-4.12.14-122.77.1.s390x as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.77.1.s390x"
},
"product_reference": "kernel-default-man-4.12.14-122.77.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-4.12.14-122.77.1.noarch as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.77.1.noarch"
},
"product_reference": "kernel-devel-4.12.14-122.77.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-4.12.14-122.77.1.noarch as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.77.1.noarch"
},
"product_reference": "kernel-macros-4.12.14-122.77.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-4.12.14-122.77.1.noarch as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.77.1.noarch"
},
"product_reference": "kernel-source-4.12.14-122.77.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-122.77.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.77.1.aarch64"
},
"product_reference": "kernel-syms-4.12.14-122.77.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-122.77.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.77.1.ppc64le"
},
"product_reference": "kernel-syms-4.12.14-122.77.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-122.77.1.s390x as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.77.1.s390x"
},
"product_reference": "kernel-syms-4.12.14-122.77.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-122.77.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.77.1.x86_64"
},
"product_reference": "kernel-syms-4.12.14-122.77.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-122.77.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.77.1.aarch64"
},
"product_reference": "kernel-default-4.12.14-122.77.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-122.77.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.77.1.ppc64le"
},
"product_reference": "kernel-default-4.12.14-122.77.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-122.77.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.77.1.s390x"
},
"product_reference": "kernel-default-4.12.14-122.77.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-122.77.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.77.1.x86_64"
},
"product_reference": "kernel-default-4.12.14-122.77.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-122.77.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.77.1.aarch64"
},
"product_reference": "kernel-default-base-4.12.14-122.77.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-122.77.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.77.1.ppc64le"
},
"product_reference": "kernel-default-base-4.12.14-122.77.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-122.77.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.77.1.s390x"
},
"product_reference": "kernel-default-base-4.12.14-122.77.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-122.77.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.77.1.x86_64"
},
"product_reference": "kernel-default-base-4.12.14-122.77.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-122.77.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.77.1.aarch64"
},
"product_reference": "kernel-default-devel-4.12.14-122.77.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-122.77.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.77.1.ppc64le"
},
"product_reference": "kernel-default-devel-4.12.14-122.77.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-122.77.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.77.1.s390x"
},
"product_reference": "kernel-default-devel-4.12.14-122.77.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-122.77.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.77.1.x86_64"
},
"product_reference": "kernel-default-devel-4.12.14-122.77.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-man-4.12.14-122.77.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.77.1.s390x"
},
"product_reference": "kernel-default-man-4.12.14-122.77.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-4.12.14-122.77.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.77.1.noarch"
},
"product_reference": "kernel-devel-4.12.14-122.77.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-4.12.14-122.77.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.77.1.noarch"
},
"product_reference": "kernel-macros-4.12.14-122.77.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-4.12.14-122.77.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.77.1.noarch"
},
"product_reference": "kernel-source-4.12.14-122.77.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-122.77.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.77.1.aarch64"
},
"product_reference": "kernel-syms-4.12.14-122.77.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-122.77.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.77.1.ppc64le"
},
"product_reference": "kernel-syms-4.12.14-122.77.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-122.77.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.77.1.s390x"
},
"product_reference": "kernel-syms-4.12.14-122.77.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-122.77.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.77.1.x86_64"
},
"product_reference": "kernel-syms-4.12.14-122.77.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-extra-4.12.14-122.77.1.x86_64 as component of SUSE Linux Enterprise Workstation Extension 12 SP5",
"product_id": "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.77.1.x86_64"
},
"product_reference": "kernel-default-extra-4.12.14-122.77.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Workstation Extension 12 SP5"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2019-25045",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-25045"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel before 5.0.19. The XFRM subsystem has a use-after-free, related to an xfrm_state_fini panic, aka CID-dbb2483b2a46.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_77-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_77-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_77-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.77.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.77.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.77.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.77.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.77.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.77.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.77.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.77.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.77.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.77.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.77.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.77.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.77.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-25045",
"url": "https://www.suse.com/security/cve/CVE-2019-25045"
},
{
"category": "external",
"summary": "SUSE Bug 1187049 for CVE-2019-25045",
"url": "https://bugzilla.suse.com/1187049"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_77-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_77-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_77-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.77.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.77.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.77.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.77.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.77.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.77.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.77.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.77.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.77.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.77.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.77.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.77.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.77.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_77-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_77-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_77-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.77.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.77.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.77.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.77.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.77.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.77.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.77.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.77.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.77.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.77.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.77.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.77.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.77.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-14T15:05:40Z",
"details": "important"
}
],
"title": "CVE-2019-25045"
},
{
"cve": "CVE-2020-24588",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-24588"
}
],
"notes": [
{
"category": "general",
"text": "The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn\u0027t require that the A-MSDU flag in the plaintext QoS header field is authenticated. Against devices that support receiving non-SSP A-MSDU frames (which is mandatory as part of 802.11n), an adversary can abuse this to inject arbitrary network packets.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_77-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_77-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_77-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.77.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.77.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.77.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.77.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.77.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.77.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.77.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.77.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.77.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.77.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.77.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.77.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.77.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-24588",
"url": "https://www.suse.com/security/cve/CVE-2020-24588"
},
{
"category": "external",
"summary": "SUSE Bug 1185861 for CVE-2020-24588",
"url": "https://bugzilla.suse.com/1185861"
},
{
"category": "external",
"summary": "SUSE Bug 1192868 for CVE-2020-24588",
"url": "https://bugzilla.suse.com/1192868"
},
{
"category": "external",
"summary": "SUSE Bug 1199701 for CVE-2020-24588",
"url": "https://bugzilla.suse.com/1199701"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_77-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_77-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_77-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.77.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.77.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.77.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.77.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.77.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.77.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.77.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.77.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.77.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.77.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.77.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.77.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.77.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_77-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_77-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_77-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.77.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.77.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.77.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.77.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.77.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.77.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.77.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.77.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.77.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.77.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.77.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.77.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.77.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-14T15:05:40Z",
"details": "moderate"
}
],
"title": "CVE-2020-24588"
},
{
"cve": "CVE-2020-26558",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-26558"
}
],
"notes": [
{
"category": "general",
"text": "Bluetooth LE and BR/EDR secure pairing in Bluetooth Core Specification 2.1 through 5.2 may permit a nearby man-in-the-middle attacker to identify the Passkey used during pairing (in the Passkey authentication procedure) by reflection of the public key and the authentication evidence of the initiating device, potentially permitting this attacker to complete authenticated pairing with the responding device using the correct Passkey for the pairing session. The attack methodology determines the Passkey value one bit at a time.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_77-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_77-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_77-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.77.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.77.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.77.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.77.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.77.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.77.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.77.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.77.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.77.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.77.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.77.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.77.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.77.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-26558",
"url": "https://www.suse.com/security/cve/CVE-2020-26558"
},
{
"category": "external",
"summary": "SUSE Bug 1179610 for CVE-2020-26558",
"url": "https://bugzilla.suse.com/1179610"
},
{
"category": "external",
"summary": "SUSE Bug 1186463 for CVE-2020-26558",
"url": "https://bugzilla.suse.com/1186463"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_77-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_77-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_77-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.77.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.77.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.77.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.77.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.77.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.77.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.77.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.77.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.77.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.77.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.77.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.77.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.77.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_77-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_77-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_77-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.77.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.77.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.77.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.77.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.77.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.77.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.77.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.77.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.77.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.77.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.77.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.77.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.77.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-14T15:05:40Z",
"details": "moderate"
}
],
"title": "CVE-2020-26558"
},
{
"cve": "CVE-2020-36386",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-36386"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel before 5.8.1. net/bluetooth/hci_event.c has a slab out-of-bounds read in hci_extended_inquiry_result_evt, aka CID-51c19bf3d5cf.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_77-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_77-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_77-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.77.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.77.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.77.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.77.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.77.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.77.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.77.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.77.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.77.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.77.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.77.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.77.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.77.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-36386",
"url": "https://www.suse.com/security/cve/CVE-2020-36386"
},
{
"category": "external",
"summary": "SUSE Bug 1187038 for CVE-2020-36386",
"url": "https://bugzilla.suse.com/1187038"
},
{
"category": "external",
"summary": "SUSE Bug 1192868 for CVE-2020-36386",
"url": "https://bugzilla.suse.com/1192868"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_77-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_77-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_77-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.77.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.77.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.77.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.77.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.77.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.77.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.77.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.77.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.77.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.77.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.77.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.77.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.77.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_77-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_77-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_77-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.77.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.77.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.77.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.77.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.77.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.77.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.77.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.77.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.77.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.77.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.77.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.77.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.77.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-14T15:05:40Z",
"details": "moderate"
}
],
"title": "CVE-2020-36386"
},
{
"cve": "CVE-2021-0129",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-0129"
}
],
"notes": [
{
"category": "general",
"text": "Improper access control in BlueZ may allow an authenticated user to potentially enable information disclosure via adjacent access.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_77-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_77-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_77-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.77.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.77.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.77.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.77.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.77.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.77.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.77.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.77.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.77.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.77.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.77.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.77.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.77.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-0129",
"url": "https://www.suse.com/security/cve/CVE-2021-0129"
},
{
"category": "external",
"summary": "SUSE Bug 1186463 for CVE-2021-0129",
"url": "https://bugzilla.suse.com/1186463"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_77-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_77-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_77-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.77.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.77.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.77.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.77.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.77.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.77.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.77.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.77.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.77.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.77.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.77.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.77.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.77.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_77-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_77-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_77-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.77.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.77.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.77.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.77.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.77.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.77.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.77.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.77.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.77.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.77.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.77.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.77.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.77.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-14T15:05:40Z",
"details": "moderate"
}
],
"title": "CVE-2021-0129"
},
{
"cve": "CVE-2021-0512",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-0512"
}
],
"notes": [
{
"category": "general",
"text": "In __hidinput_change_resolution_multipliers of hid-input.c, there is a possible out of bounds write due to a heap buffer overflow. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-173843328References: Upstream kernel",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_77-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_77-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_77-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.77.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.77.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.77.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.77.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.77.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.77.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.77.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.77.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.77.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.77.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.77.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.77.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.77.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-0512",
"url": "https://www.suse.com/security/cve/CVE-2021-0512"
},
{
"category": "external",
"summary": "SUSE Bug 1187595 for CVE-2021-0512",
"url": "https://bugzilla.suse.com/1187595"
},
{
"category": "external",
"summary": "SUSE Bug 1187597 for CVE-2021-0512",
"url": "https://bugzilla.suse.com/1187597"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_77-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_77-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_77-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.77.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.77.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.77.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.77.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.77.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.77.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.77.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.77.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.77.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.77.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.77.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.77.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.77.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_77-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_77-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_77-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.77.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.77.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.77.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.77.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.77.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.77.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.77.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.77.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.77.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.77.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.77.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.77.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.77.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-14T15:05:40Z",
"details": "important"
}
],
"title": "CVE-2021-0512"
},
{
"cve": "CVE-2021-0605",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-0605"
}
],
"notes": [
{
"category": "general",
"text": "In pfkey_dump of af_key.c, there is a possible out-of-bounds read due to a missing bounds check. This could lead to local information disclosure in the kernel with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-110373476",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_77-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_77-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_77-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.77.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.77.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.77.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.77.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.77.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.77.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.77.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.77.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.77.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.77.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.77.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.77.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.77.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-0605",
"url": "https://www.suse.com/security/cve/CVE-2021-0605"
},
{
"category": "external",
"summary": "SUSE Bug 1187601 for CVE-2021-0605",
"url": "https://bugzilla.suse.com/1187601"
},
{
"category": "external",
"summary": "SUSE Bug 1187687 for CVE-2021-0605",
"url": "https://bugzilla.suse.com/1187687"
},
{
"category": "external",
"summary": "SUSE Bug 1188381 for CVE-2021-0605",
"url": "https://bugzilla.suse.com/1188381"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_77-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_77-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_77-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.77.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.77.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.77.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.77.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.77.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.77.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.77.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.77.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.77.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.77.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.77.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.77.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.77.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_77-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_77-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_77-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.77.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.77.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.77.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.77.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.77.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.77.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.77.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.77.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.77.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.77.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.77.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.77.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.77.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-14T15:05:40Z",
"details": "important"
}
],
"title": "CVE-2021-0605"
},
{
"cve": "CVE-2021-33624",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-33624"
}
],
"notes": [
{
"category": "general",
"text": "In kernel/bpf/verifier.c in the Linux kernel before 5.12.13, a branch can be mispredicted (e.g., because of type confusion) and consequently an unprivileged BPF program can read arbitrary memory locations via a side-channel attack, aka CID-9183671af6db.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_77-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_77-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_77-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.77.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.77.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.77.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.77.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.77.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.77.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.77.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.77.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.77.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.77.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.77.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.77.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.77.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-33624",
"url": "https://www.suse.com/security/cve/CVE-2021-33624"
},
{
"category": "external",
"summary": "SUSE Bug 1187554 for CVE-2021-33624",
"url": "https://bugzilla.suse.com/1187554"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_77-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_77-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_77-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.77.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.77.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.77.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.77.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.77.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.77.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.77.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.77.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.77.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.77.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.77.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.77.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.77.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_77-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_77-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_77-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.77.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.77.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.77.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.77.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.77.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.77.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.77.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.77.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.77.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.77.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.77.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.77.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.77.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-14T15:05:40Z",
"details": "moderate"
}
],
"title": "CVE-2021-33624"
},
{
"cve": "CVE-2021-34693",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-34693"
}
],
"notes": [
{
"category": "general",
"text": "net/can/bcm.c in the Linux kernel through 5.12.10 allows local users to obtain sensitive information from kernel stack memory because parts of a data structure are uninitialized.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_77-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_77-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_77-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.77.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.77.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.77.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.77.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.77.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.77.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.77.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.77.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.77.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.77.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.77.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.77.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.77.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-34693",
"url": "https://www.suse.com/security/cve/CVE-2021-34693"
},
{
"category": "external",
"summary": "SUSE Bug 1187452 for CVE-2021-34693",
"url": "https://bugzilla.suse.com/1187452"
},
{
"category": "external",
"summary": "SUSE Bug 1192868 for CVE-2021-34693",
"url": "https://bugzilla.suse.com/1192868"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_77-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_77-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_77-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.77.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.77.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.77.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.77.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.77.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.77.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.77.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.77.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.77.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.77.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.77.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.77.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.77.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_77-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_77-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_77-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.77.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.77.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.77.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.77.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.77.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.77.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.77.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.77.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.77.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.77.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.77.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.77.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.77.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.77.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.77.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.77.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-14T15:05:40Z",
"details": "moderate"
}
],
"title": "CVE-2021-34693"
}
]
}
suse-su-2021:2426-1
Vulnerability from csaf_suse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel",
"title": "Title of the patch"
},
{
"category": "description",
"text": "The SUSE Linux Enterprise 15 SP2 RT kernel was updated to receive various security and bugfixes.\n\n\nThe following security bugs were fixed:\n\n- CVE-2021-3573: Fixed an UAF vulnerability in function that can allow attackers to corrupt kernel heaps and adopt further exploitations. (bsc#1186666)\n- CVE-2021-0605: Fixed an out-of-bounds read which could lead to local information disclosure in the kernel with System execution privileges needed. (bsc#1187601)\n- CVE-2021-0512: Fixed a possible out-of-bounds write which could lead to local escalation of privilege with no additional execution privileges needed. (bsc#1187595)\n- CVE-2021-33624: Fixed a bug which allows unprivileged BPF program to leak the contents of arbitrary kernel memory (and therefore, of all physical memory) via a side-channel. (bsc#1187554)\n- CVE-2021-34693: Fixed a bug in net/can/bcm.c which could allow local users to obtain sensitive information from kernel stack memory because parts of a data structure are uninitialized. (bsc#1187452)\n- CVE-2021-0129: Fixed improper access control in BlueZ that may have allowed an authenticated user to potentially enable information disclosure via adjacent access (bnc#1186463).\n- CVE-2020-36385: Fixed a use-after-free via the ctx_list in some ucma_migrate_id situations where ucma_close is called (bnc#1187050).\n- CVE-2020-26558: Fixed Bluetooth LE and BR/EDR secure pairing in Bluetooth Core Specification 2.1 (bnc#1179610, bnc#1186463).\n- CVE-2020-36386: Fixed an out-of-bounds read issue in hci_extended_inquiry_result_evt (bnc#1187038).\n\nThe following non-security bugs were fixed:\n\n- acpica: Clean up context mutex during object deletion (git-fixes).\n- alsa: hda/cirrus: Set Initial DMIC volume to -26 dB (git-fixes).\n- alsa: hda: Fix for mute key LED for HP Pavilion 15-CK0xx (git-fixes).\n- alsa: timer: Fix master timer notification (git-fixes).\n- alx: Fix an error handling path in \u0027alx_probe()\u0027 (git-fixes).\n- arch: Add arch-dependent support markers in supported.conf (bsc#1186672)\n- arch: Add the support for kernel-FLAVOR-optional subpackage (jsc#SLE-11796)\n- ASoC: Intel: bytcr_rt5640: Add quirk for the Glavey TM800A550L tablet (git-fixes).\n- ASoC: Intel: bytcr_rt5640: Add quirk for the Lenovo Miix 3-830 tablet (git-fixes).\n- ASoC: max98088: fix ni clock divider calculation (git-fixes).\n- ASoC: rt5659: Fix the lost powers for the HDA header (git-fixes).\n- ASoC: sti-sas: add missing MODULE_DEVICE_TABLE (git-fixes).\n- ath6kl: return error code in ath6kl_wmi_set_roam_lrssi_cmd() (git-fixes).\n- batman-adv: Avoid WARN_ON timing related checks (git-fixes).\n- be2net: Fix an error handling path in \u0027be_probe()\u0027 (git-fixes).\n- blk-settings: align max_sectors on \u0027logical_block_size\u0027 boundary (bsc#1185195).\n- block: Discard page cache of zone reset target range (bsc#1187402).\n- block: return the correct bvec when checking for gaps (bsc#1187143).\n- block: return the correct bvec when checking for gaps (bsc#1187144).\n- bluetooth: fix the erroneous flush_work() order (git-fixes).\n- bluetooth: use correct lock to prevent UAF of hdev object (git-fixes).\n- bnxt_en: Call bnxt_ethtool_free() in bnxt_init_one() error path (jsc#SLE-8371 bsc#1153274).\n- bnxt_en: Fix TQM fastpath ring backing store computation (jsc#SLE-8371 bsc#1153274).\n- bnxt_en: Rediscover PHY capabilities after firmware reset (jsc#SLE-8371 bsc#1153274).\n- bpfilter: Specify the log level for the kmsg message (bsc#1155518).\n- brcmfmac: properly check for bus register errors (git-fixes).\n- btrfs: open device without device_list_mutex (bsc#1176771).\n- bus: ti-sysc: Fix flakey idling of uarts and stop using swsup_sidle_act (git-fixes).\n- can: mcba_usb: fix memory leak in mcba_usb (git-fixes).\n- ceph: must hold snap_rwsem when filling inode for async create (bsc#1187927).\n- cfg80211: avoid double free of PMSR request (git-fixes).\n- cfg80211: make certificate generation more robust (git-fixes).\n- cgroup1: do not allow \u0027\\n\u0027 in renaming (bsc#1187972).\n- char: hpet: add checks after calling ioremap (git-fixes).\n- CPU: Startup failed when SNC (sub-numa cluster) is enabled with 3 NIC add-on cards installed (bsc#1187263).\n- cxgb4: avoid accessing registers when clearing filters (git-fixes).\n- cxgb4: avoid link re-train during TC-MQPRIO configuration (jsc#SLE-8389).\n- cxgb4: fix wrong shift (git-fixes).\n- dax: Add a wakeup mode parameter to put_unlocked_entry() (bsc#1187411).\n- dax: Add an enum for specifying dax wakup mode (bsc#1187411).\n- dax: fix ENOMEM handling in grab_mapping_entry() (bsc#1184212).\n- dax: Wake up all waiters after invalidating dax entry (bsc#1187411).\n- dmaengine: ALTERA_MSGDMA depends on HAS_IOMEM (git-fixes).\n- dmaengine: pl330: fix wrong usage of spinlock flags in dma_cyclc (git-fixes).\n- dmaengine: qcom_hidma: comment platform_driver_register call (git-fixes).\n- dmaengine: QCOM_HIDMA_MGMT depends on HAS_IOMEM (git-fixes).\n- dmaengine: stedma40: add missing iounmap() on error in d40_probe() (git-fixes).\n- drm/amd/amdgpu: fix a potential deadlock in gpu reset (git-fixes).\n- drm/amd/amdgpu: fix refcount leak (git-fixes).\n- drm/amd/display: Allow bandwidth validation for 0 streams (git-fixes).\n- drm/amd/display: Disconnect non-DP with no EDID (git-fixes).\n- drm/amdgpu: Fix a use-after-free (git-fixes).\n- drm/amdgpu: make sure we unpin the UVD BO (git-fixes).\n- drm/tegra: sor: Do not leak runtime PM reference (git-fixes).\n- drm: Fix use-after-free read in drm_getunique() (git-fixes).\n- drm: Lock pointer access in drm_master_release() (git-fixes).\n- dt-bindings: reset: meson8b: fix duplicate reset IDs (git-fixes).\n- efi: Allow EFI_MEMORY_XP and EFI_MEMORY_RO both to be cleared (git-fixes).\n- efi: cper: fix snprintf() use in cper_dimm_err_location() (git-fixes).\n- ext4: fix bug on in ext4_es_cache_extent as ext4_split_extent_at failed (bsc#1187408).\n- ext4: fix check to prevent false positive report of incorrect used inodes (bsc#1187404).\n- ext4: fix error code in ext4_commit_super (bsc#1187407).\n- ext4: fix memory leak in ext4_fill_super (bsc#1187409).\n- FCOE: fcoe_wwn_from_mac kABI fix (bsc#1187886).\n- fs/nfs: Use fatal_signal_pending instead of signal_pending (git-fixes).\n- fs: fix reporting supported extra file attributes for statx() (bsc#1187410).\n- ftrace: Do not blindly read the ip address in ftrace_bug() (git-fixes).\n- ftrace: Free the trampoline when ftrace_startup() fails (git-fixes).\n- fuse: BUG_ON correction in fuse_dev_splice_write() (bsc#1187356).\n- gpio: cadence: Add missing MODULE_DEVICE_TABLE (git-fixes).\n- gpu: Enable CONFIG_PCI_PF_STUB for Nvidia Ampere vGPU support (jsc#SLE-17882 jsc#ECO-3691)\n- gve: Add NULL pointer checks when freeing irqs (git-fixes).\n- gve: Correct SKB queue index validation (git-fixes).\n- gve: Upgrade memory barrier in poll routine (git-fixes).\n- HID: Add BUS_VIRTUAL to hid_connect logging (git-fixes).\n- HID: gt683r: add missing MODULE_DEVICE_TABLE (git-fixes).\n- HID: hid-input: add mapping for emoji picker key (git-fixes).\n- HID: hid-sensor-hub: Return error for hid_set_field() failure (git-fixes).\n- HID: i2c-hid: fix format string mismatch (git-fixes).\n- HID: i2c-hid: Skip ELAN power-on command after reset (git-fixes).\n- HID: magicmouse: fix NULL-deref on disconnect (git-fixes).\n- HID: multitouch: require Finger field to mark Win8 reports as MT (git-fixes).\n- HID: pidff: fix error return code in hid_pidff_init() (git-fixes).\n- HID: quirks: Set INCREMENT_USAGE_ON_DUPLICATE for Saitek X65 (git-fixes).\n- HID: usbhid: fix info leak in hid_submit_ctrl (git-fixes).\n- HID: usbhid: Fix race between usbhid_close() and usbhid_stop() (git-fixes).\n- hwmon: (dell-smm-hwmon) Fix index values (git-fixes).\n- hwmon: (scpi-hwmon) shows the negative temperature properly (git-fixes).\n- i2c: mpc: Make use of i2c_recover_bus() (git-fixes).\n- i2c: qcom-geni: Suspend and resume the bus during SYSTEM_SLEEP_PM ops (git-fixes).\n- ice: add ndo_bpf callback for safe mode netdev ops (jsc#SLE-7926).\n- ice: Allow all LLDP packets from PF to Tx (jsc#SLE-7926).\n- ice: Fix VFR issues for AVF drivers that expect ATQLEN cleared (git-fixes).\n- isdn: mISDN: correctly handle ph_info allocation failure in hfcsusb_ph_info (git-fixes).\n- isdn: mISDN: netjet: Fix crash in nj_probe: (git-fixes).\n- isdn: mISDNinfineon: check/cleanup ioremap failure correctly in setup_io (git-fixes).\n- ixgbe: fix large MTU request from VF (git-fixes).\n- kABI workaround for struct lis3lv02d change (git-fixes).\n- kernel-binary.spec.in: Add Supplements: for -extra package on Leap kernel-$flavor-extra should supplement kernel-$flavor on Leap, like it does on SLED, and like the kernel-$flavor-optional package does.\n- kernel-binary.spec.in: build-id check requires elfutils.\n- kernel-binary.spec.in: Regenerate makefile when not using mkmakefile.\n- kernel-binary.spec: Only use mkmakefile when it exists Linux 5.13 no longer had a mkmakefile script\n- kernel: kexec_file: fix error return code of kexec_calculate_store_digests() (git-fixes).\n- kthread: prevent deadlock when kthread_mod_delayed_work() races with kthread_cancel_delayed_work_sync() (bsc#1187867).\n- kthread_worker: split code for canceling the delayed work timer (bsc#1187867).\n- kyber: fix out of bounds access when preempted (bsc#1187403).\n- lib: vdso: Remove CROSS_COMPILE_COMPAT_VDSO (bsc#1164648,jsc#SLE-11493).\n- libertas: register sysfs groups properly (git-fixes).\n- locking/mutex: clear MUTEX_FLAGS if wait_list is empty due to signal (git-fixes).\n- md: Fix missing unused status line of /proc/mdstat (git-fixes).\n- media: dvb: Add check on sp8870_readreg return (git-fixes).\n- media: dvb: Add check on sp8870_readreg return (git-fixes).\n- media: gspca: mt9m111: Check write_bridge for timeout (git-fixes).\n- media: gspca: mt9m111: Check write_bridge for timeout (git-fixes).\n- media: gspca: properly check for errors in po1030_probe() (git-fixes).\n- media: gspca: properly check for errors in po1030_probe() (git-fixes).\n- media: mtk-mdp: Check return value of of_clk_get (git-fixes).\n- media: mtk-mdp: Fix a refcounting bug on error in init (git-fixes).\n- media: s5p-g2d: Fix a memory leak in an error handling path in \u0027g2d_probe()\u0027 (git-fixes).\n- mei: request autosuspend after sending rx flow control (git-fixes).\n- mmc: meson-gx: use memcpy_to/fromio for dram-access-quirk (git-fixes).\n- module: limit enabling module.sig_enforce (git-fixes).\n- net/mlx4: Fix EEPROM dump support (git-fixes).\n- net/mlx5: Consider RoCE cap before init RDMA resources (git-fixes).\n- net/mlx5: DR, Create multi-destination flow table with level less than 64 (jsc#SLE-8464).\n- net/mlx5: Fix PBMC register mapping (git-fixes).\n- net/mlx5: Fix placement of log_max_flow_counter (git-fixes).\n- net/mlx5: Fix sleep while atomic in mlx5_eswitch_get_vepa (git-fixes).\n- net/mlx5e: Block offload of outer header csum for UDP tunnels (git-fixes).\n- net/mlx5e: Fix multipath lag activation (git-fixes).\n- net/mlx5e: Fix nullptr in add_vlan_push_action() (git-fixes).\n- net/mlx5e: Fix page reclaim for dead peer hairpin (git-fixes).\n- net/mlx5e: Remove dependency in IPsec initialization flows (git-fixes).\n- net/nfc/rawsock.c: fix a permission check bug (git-fixes).\n- net/sched: act_ct: handle DNAT tuple collision (bsc#1154353).\n- net/x25: Return the correct errno code (git-fixes).\n- net: bnx2: Fix error return code in bnx2_init_board() (git-fixes).\n- net: fix iteration for sctp transport seq_files (git-fixes).\n- net: hns3: Limiting the scope of vector_ring_chain variable (git-fixes).\n- net: hns3: put off calling register_netdev() until client initialize complete (bsc#1154353).\n- net: mvpp2: add mvpp2_phylink_to_port() helper (bsc#1187171).\n- net: Treat __napi_schedule_irqoff() as __napi_schedule() on PREEMPT_RT (bsc#1187834).\n- netxen_nic: Fix an error handling path in \u0027netxen_nic_probe()\u0027 (git-fixes).\n- nfc: fix NULL ptr dereference in llcp_sock_getname() after failed connect (git-fixes).\n- NFC: SUSE specific brutal fix for runtime PM (bsc#1185589).\n- NFS: Deal correctly with attribute generation counter overflow (git-fixes).\n- NFS: Do not corrupt the value of pg_bytes_written in nfs_do_recoalesce() (git-fixes).\n- NFS: Do not discard pNFS layout segments that are marked for return (git-fixes).\n- NFS: Do not gratuitously clear the inode cache when lookup failed (git-fixes).\n- NFS: Do not revalidate the directory permissions on a lookup failure (git-fixes).\n- NFS: Fix a potential NULL dereference in nfs_get_client() (git-fixes).\n- NFS: fix an incorrect limit in filelayout_decode_layout() (git-fixes).\n- NFS: Fix an Oopsable condition in __nfs_pageio_add_request() (git-fixes).\n- NFS: Fix use-after-free in nfs4_init_client() (git-fixes).\n- nfsd: register pernet ops last, unregister first (git-fixes).\n- NFSD: Repair misuse of sv_lock in 5.10.16-rt30 (git-fixes).\n- NFSv4.2 fix handling of sr_eof in SEEK\u0027s reply (git-fixes).\n- NFSv4.2: Always flush out writes in nfs42_proc_fallocate() (git-fixes).\n- NFSv4.2: fix return value of _nfs4_get_security_label() (git-fixes).\n- NFSv4: Do not discard segments marked for return in _pnfs_return_layout() (git-fixes).\n- NFSv4: Fix a NULL pointer dereference in pnfs_mark_matching_lsegs_return() (git-fixes).\n- NFSv4: Fix deadlock between nfs4_evict_inode() and nfs4_opendata_get_inode() (git-fixes).\n- NFSv4: Fix v4.0/v4.1 SEEK_DATA return -ENOTSUPP when set NFS_V4_2 config (git-fixes).\n- ocfs2: fix data corruption by fallocate (bsc#1187412).\n- PCI/LINK: Remove bandwidth notification (bsc#1183712).\n- PCI: aardvark: Do not rely on jiffies while holding spinlock (git-fixes).\n- PCI: aardvark: Fix kernel panic during PIO transfer (git-fixes).\n- PCI: Add ACS quirk for Broadcom BCM57414 NIC (git-fixes).\n- PCI: Mark some NVIDIA GPUs to avoid bus reset (git-fixes).\n- PCI: Mark TI C667X to avoid bus reset (git-fixes).\n- PCI: Work around Huawei Intelligent NIC VF FLR erratum (git-fixes).\n- perf/x86/intel/uncore: Remove uncore extra PCI dev HSWEP_PCI_PCU_3 (bsc#1184685).\n- pid: take a reference when initializing `cad_pid` (bsc#1152489).\n- platform/x86: hp-wireless: add AMD\u0027s hardware id to the supported list (git-fixes).\n- platform/x86: hp_accel: Avoid invoking _INI to speed up resume (git-fixes).\n- platform/x86: intel_punit_ipc: Append MODULE_DEVICE_TABLE for ACPI (git-fixes).\n- platform/x86: touchscreen_dmi: Add info for the Mediacom Winpad 7.0 W700 tablet (git-fixes).\n- PM: sleep: Add pm_debug_messages kernel command line option (bsc#1186752).\n- pNFS/flexfiles: fix incorrect size check in decode_nfs_fh() (git-fixes).\n- pNFS/NFSv4: Fix a layout segment leak in pnfs_layout_process() (git-fixes).\n- qla2xxx: synchronize rport dev_loss_tmo setting (bsc#1182470 bsc#1185486).\n- qlcnic: Fix an error handling path in \u0027qlcnic_probe()\u0027 (git-fixes).\n- radeon: use memcpy_to/fromio for UVD fw upload (git-fixes).\n- regulator: bd70528: Fix off-by-one for buck123 .n_voltages setting (git-fixes).\n- regulator: core: resolve supply for boot-on/always-on regulators (git-fixes).\n- regulator: max77620: Use device_set_of_node_from_dev() (git-fixes).\n- Revert \u0027ath6kl: return error code in ath6kl_wmi_set_roam_lrssi_cmd()\u0027 (git-fixes).\n- Revert \u0027brcmfmac: add a check for the status of usb_register\u0027 (git-fixes).\n- Revert \u0027char: hpet: fix a missing check of ioremap\u0027 (git-fixes).\n- Revert \u0027char: hpet: fix a missing check of ioremap\u0027 (git-fixes).\n- Revert \u0027dmaengine: qcom_hidma: Check for driver register failure\u0027 (git-fixes).\n- Revert \u0027ecryptfs: replace BUG_ON with error handling code\u0027 (bsc#1187413).\n- Revert \u0027ibmvnic: simplify reset_long_term_buff function\u0027 (bsc#1186206 ltc#191041).\n- Revert \u0027isdn: mISDN: Fix potential NULL pointer dereference of kzalloc\u0027 (git-fixes).\n- Revert \u0027isdn: mISDNinfineon: fix potential NULL pointer dereference\u0027 (git-fixes).\n- Revert \u0027libertas: add checks for the return value of sysfs_create_group\u0027 (git-fixes).\n- Revert \u0027media: dvb: Add check on sp8870_readreg\u0027 (git-fixes).\n- Revert \u0027media: dvb: Add check on sp8870_readreg\u0027 (git-fixes).\n- Revert \u0027media: gspca: Check the return value of write_bridge for timeout\u0027 (git-fixes).\n- Revert \u0027media: gspca: Check the return value of write_bridge for timeout\u0027 (git-fixes).\n- Revert \u0027media: gspca: mt9m111: Check write_bridge for timeout\u0027 (git-fixes).\n- Revert \u0027media: gspca: mt9m111: Check write_bridge for timeout\u0027 (git-fixes).\n- Revert \u0027media: usb: gspca: add a missed check for goto_low_power\u0027 (git-fixes).\n- Revert \u0027net: liquidio: fix a NULL pointer dereference\u0027 (git-fixes).\n- Revert \u0027PCI: PM: Do not read power state in pci_enable_device_flags()\u0027 (git-fixes).\n- Revert \u0027qlcnic: Avoid potential NULL pointer dereference\u0027 (git-fixes).\n- Revert \u0027scsi: core: run queue if SCSI device queue isn\u0027t ready and queue is idle\u0027 (bsc#1186949).\n- Revert \u0027serial: max310x: pass return value of spi_register_driver\u0027 (git-fixes).\n- Revert \u0027video: hgafb: fix potential NULL pointer dereference\u0027 (git-fixes).\n- Revert \u0027video: imsttfb: fix potential NULL pointer dereferences\u0027 (bsc#1152489)\n- rpm/kernel-binary.spec.in: Correct Supplements in optional subpkg (jsc#SLE-11796)\n- rpm/kernel-binary.spec.in: Fix handling of +arch marker (bsc#1186672)\n- rpm/split-modules: Avoid errors even if Module.* are not present\n- s390/stack: fix possible register corruption with stack switch helper (bsc#1185677).\n- sched/debug: Fix cgroup_path[] serialization (git-fixes)\n- sched/fair: Keep load_avg and load_sum synced (git-fixes)\n- scsi: aacraid: Fix an oops in error handling (bsc#1187072).\n- scsi: aacraid: Remove erroneous fallthrough annotation (bsc#1186950).\n- scsi: aacraid: Use memdup_user() as a cleanup (bsc#1186951).\n- scsi: acornscsi: Fix an error handling path in acornscsi_probe() (bsc#1186952).\n- scsi: be2iscsi: Fix a theoretical leak in beiscsi_create_eqs() (bsc#1186953).\n- scsi: be2iscsi: Revert \u0027Fix a theoretical leak in beiscsi_create_eqs()\u0027 (bsc#1187067).\n- scsi: bfa: Fix error return in bfad_pci_init() (bsc#1186954).\n- scsi: bnx2fc: Fix Kconfig warning and CNIC build errors (bsc#1186955).\n- scsi: bnx2i: Requires MMU (bsc#1186956).\n- scsi: core: Fix race between handling STS_RESOURCE and completion (bsc#1187883).\n- scsi: csiostor: Fix wrong return value in csio_hw_prep_fw() (bsc#1186957).\n- scsi: cumana_2: Fix different dev_id between request_irq() and free_irq() (bsc#1186958).\n- scsi: cxgb3i: Fix some leaks in init_act_open() (bsc#1186959).\n- scsi: cxgb4i: Fix TLS dependency (bsc#1186960).\n- scsi: eesox: Fix different dev_id between request_irq() and free_irq() (bsc#1186961).\n- scsi: fcoe: Fix mismatched fcoe_wwn_from_mac declaration (bsc#1187886).\n- scsi: fnic: Fix error return code in fnic_probe() (bsc#1186962).\n- scsi: hisi_sas: Fix IRQ checks (bsc#1186963).\n- scsi: hisi_sas: Remove preemptible() (bsc#1186964).\n- scsi: jazz_esp: Add IRQ check (bsc#1186965).\n- scsi: libfc: Fix enum-conversion warning (bsc#1186966).\n- scsi: libsas: Fix error path in sas_notify_lldd_dev_found() (bsc#1186967).\n- scsi: libsas: Reset num_scatter if libata marks qc as NODATA (bsc#1187068).\n- scsi: libsas: Set data_dir as DMA_NONE if libata marks qc as NODATA (bsc#1186968).\n- scsi: lpfc: Fix ancient double free (bsc#1186969).\n- scsi: lpfc: Fix failure to transmit ABTS on FC link (git-fixes).\n- scsi: megaraid_sas: Check user-provided offsets (bsc#1186970).\n- scsi: megaraid_sas: Clear affinity hint (bsc#1186971).\n- scsi: megaraid_sas: Do not call disable_irq from process IRQ poll (bsc#1186972).\n- scsi: megaraid_sas: Fix MEGASAS_IOC_FIRMWARE regression (bsc#1186973).\n- scsi: megaraid_sas: Remove undefined ENABLE_IRQ_POLL macro (bsc#1186974).\n- scsi: mesh: Fix panic after host or bus reset (bsc#1186976).\n- scsi: mpt3sas: Do not use GFP_KERNEL in atomic context (bsc#1186977).\n- scsi: mpt3sas: Fix error return code of mpt3sas_base_attach() (bsc#1186978).\n- scsi: mpt3sas: Fix ioctl timeout (bsc#1186979).\n- scsi: myrs: Fix a double free in myrs_cleanup() (bsc#1186980).\n- scsi: pm80xx: Fix error return in pm8001_pci_probe() (bsc#1186981).\n- scsi: powertec: Fix different dev_id between request_irq() and free_irq() (bsc#1186982).\n- scsi: qedi: Check for buffer overflow in qedi_set_path() (bsc#1186983).\n- scsi: qedi: Fix error return code of qedi_alloc_global_queues() (bsc#1186984).\n- scsi: qedi: Fix missing destroy_workqueue() on error in __qedi_probe (bsc#1186985).\n- scsi: qla2xxx: Prevent PRLI in target mode (git-fixes).\n- scsi: qla4xxx: Fix an error handling path in \u0027qla4xxx_get_host_stats()\u0027 (bsc#1186986).\n- scsi: qla4xxx: Remove in_interrupt() (bsc#1186987).\n- scsi: scsi_debug: Add check for sdebug_max_queue during module init (bsc#1186988).\n- scsi: scsi_dh_alua: Retry RTPG on a different path after failure (bsc#1174978 bsc#1185701).\n- scsi: sd: Fix Opal support (bsc#1186989).\n- scsi: sni_53c710: Add IRQ check (bsc#1186990).\n- scsi: sun3x_esp: Add IRQ check (bsc#1186991).\n- scsi: ufs-qcom: Fix scheduling while atomic issue (bsc#1187002).\n- scsi: ufs: Add quirk to disallow reset of interrupt aggregation (bsc#1186992).\n- scsi: ufs: Add quirk to enable host controller without hce (bsc#1186993).\n- scsi: ufs: Add quirk to fix abnormal ocs fatal error (bsc#1186994).\n- scsi: ufs: Add quirk to fix mishandling utrlclr/utmrlclr (bsc#1186995).\n- scsi: ufs: core: Narrow down fast path in system suspend path (bsc#1186996).\n- scsi: ufs: Do not update urgent bkops level when toggling auto bkops (bsc#1186997).\n- scsi: ufs: Fix imprecise load calculation in devfreq window (bsc#1187795).\n- SCSI: ufs: fix ktime_t kabi change (bsc#1187795).\n- scsi: ufs: Fix race between shutdown and runtime resume flow (bsc#1186998).\n- scsi: ufs: Introduce UFSHCD_QUIRK_PRDT_BYTE_GRAN quirk (bsc#1187000).\n- scsi: ufs: Make ufshcd_print_trs() consider UFSHCD_QUIRK_PRDT_BYTE_GRAN (bsc#1187069).\n- scsi: ufs: Properly release resources if a task is aborted successfully (bsc#1187001).\n- scsi: ufs: ufshcd-pltfrm depends on HAS_IOMEM (bsc#1187980).\n- scsi: ufs: ufshcd-pltfrm: Fix deferred probing (bsc#1187003).\n- scsi: ufshcd: use an enum for quirks (bsc#1186999).\n- serial: max310x: unregister uart driver in case of failure and abort (git-fixes).\n- serial: rp2: use \u0027request_firmware\u0027 instead of \u0027request_firmware_nowait\u0027 (git-fixes).\n- spi: spi-nxp-fspi: move the register operation after the clock enable (git-fixes).\n- spi: sprd: Add missing MODULE_DEVICE_TABLE (git-fixes).\n- spi: stm32-qspi: Always wait BUSY bit to be cleared in stm32_qspi_wait_cmd() (git-fixes).\n- staging: rtl8723bs: Fix uninitialized variables (git-fixes).\n- sunrpc: fix refcount leak for rpc auth modules (git-fixes).\n- SUNRPC: Handle major timeout in xprt_adjust_timeout() (git-fixes).\n- SUNRPC: Move fault injection call sites (git-fixes).\n- SUNRPC: Set memalloc_nofs_save() for sync tasks (git-fixes).\n- svcrdma: disable timeouts on rdma backchannel (git-fixes).\n- thermal/drivers/intel: Initialize RW trip to THERMAL_TEMP_INVALID (git-fixes).\n- tpm: fix error return code in tpm2_get_cc_attrs_tbl() (git-fixes).\n- tracing: Correct the length check which causes memory corruption (git-fixes).\n- tracing: Do no increment trace_clock_global() by one (git-fixes).\n- tracing: Do not stop recording cmdlines when tracing is off (git-fixes).\n- tracing: Do not stop recording comms if the trace file is being read (git-fixes).\n- tracing: Restructure trace_clock_global() to never block (git-fixes).\n- ttyprintk: Add TTY hangup callback (git-fixes).\n- usb: core: hub: Disable autosuspend for Cypress CY7C65632 (git-fixes).\n- usb: core: reduce power-on-good delay time of root hub (git-fixes).\n- usb: dwc3: core: fix kernel panic when do reboot (git-fixes).\n- usb: dwc3: core: fix kernel panic when do reboot (git-fixes).\n- usb: dwc3: debugfs: Add and remove endpoint dirs dynamically (git-fixes).\n- usb: dwc3: ep0: fix NULL pointer exception (git-fixes).\n- USB: f_ncm: ncm_bitrate (speed) is unsigned (git-fixes).\n- usb: f_ncm: only first packet of aggregate needs to start timer (git-fixes).\n- usb: f_ncm: only first packet of aggregate needs to start timer (git-fixes).\n- usb: fix various gadget panics on 10gbps cabling (git-fixes).\n- usb: fix various gadget panics on 10gbps cabling (git-fixes).\n- usb: fix various gadgets null ptr deref on 10gbps cabling (git-fixes).\n- usb: gadget: eem: fix wrong eem header operation (git-fixes).\n- usb: gadget: eem: fix wrong eem header operation (git-fixes).\n- usb: gadget: f_fs: Ensure io_completion_wq is idle during unbind (git-fixes).\n- usb: gadget: f_fs: Ensure io_completion_wq is idle during unbind (git-fixes).\n- usb: musb: fix MUSB_QUIRK_B_DISCONNECT_99 handling (git-fixes).\n- usb: pd: Set PD_T_SINK_WAIT_CAP to 310ms (git-fixes).\n- USB: serial: cp210x: fix alternate function for CP2102N QFN20 (git-fixes).\n- USB: serial: ftdi_sio: add IDs for IDS GmbH Products (git-fixes).\n- USB: serial: ftdi_sio: add NovaTech OrionMX product ID (git-fixes).\n- USB: serial: ftdi_sio: add NovaTech OrionMX product ID (git-fixes).\n- USB: serial: omninet: add device id for Zyxel Omni 56K Plus (git-fixes).\n- USB: serial: omninet: add device id for Zyxel Omni 56K Plus (git-fixes).\n- USB: serial: option: add Telit LE910-S1 compositions 0x7010, 0x7011 (git-fixes).\n- USB: serial: pl2303: add device id for ADLINK ND-6530 GC (git-fixes).\n- USB: serial: quatech2: fix control-request directions (git-fixes).\n- USB: serial: ti_usb_3410_5052: add startech.com device id (git-fixes).\n- usb: typec: mux: Fix copy-paste mistake in typec_mux_match (git-fixes).\n- usb: typec: mux: Fix matching with typec_altmode_desc (git-fixes).\n- usb: typec: tcpm: Use LE to CPU conversion when accessing msg-\u003eheader (git-fixes).\n- usb: typec: ucsi: Clear PPM capability data in ucsi_init() error path (git-fixes).\n- usb: typec: wcove: Use LE to CPU conversion when accessing msg-\u003eheader (git-fixes).\n- USB: usbfs: Do not WARN about excessively large memory allocations (git-fixes).\n- vfio/pci: Fix error return code in vfio_ecap_init() (git-fixes).\n- vfio/pci: zap_vma_ptes() needs MMU (git-fixes).\n- vfio/platform: fix module_put call in error flow (git-fixes).\n- video: hgafb: correctly handle card detect failure during probe (git-fixes).\n- video: hgafb: fix potential NULL pointer dereference (git-fixes).\n- vmlinux.lds.h: Avoid orphan section with !SMP (git-fixes).\n- vrf: fix maximum MTU (git-fixes).\n- vsock/vmci: log once the failed queue pair allocation (git-fixes).\n- wireguard: allowedips: initialize list head in selftest (git-fixes).\n- wireguard: do not use -O3 (git-fixes).\n- wireguard: peer: allocate in kmem_cache (git-fixes).\n- wireguard: peer: put frequently used members above cache lines (git-fixes).\n- wireguard: queueing: get rid of per-peer ring buffers (git-fixes).\n- wireguard: selftests: make sure rp_filter is disabled on vethc (git-fixes).\n- wireguard: selftests: remove old conntrack kconfig value (git-fixes).\n- wireguard: use synchronize_net rather than synchronize_rcu (git-fixes).\n- x86/apic: Mark _all_ legacy interrupts when IO/APIC is missing (bsc#1152489).\n- x86/fault: Do not send SIGSEGV twice on SEGV_PKUERR (bsc#1152489).\n- x86/pkru: Write hardware init value to PKRU when xstate is init (bsc#1152489).\n- x86/process: Check PF_KTHREAD and not current-\u003emm for kernel threads (bsc#1152489).\n- x86: fix seq_file iteration for pat.c (git-fixes).\n- xen-blkback: fix compatibility bug with single page rings (git-fixes).\n- xen-pciback: reconfigure also from backend watch handler (git-fixes).\n- xen-pciback: redo VF placement in the virtual topology (git-fixes).\n- xen/evtchn: Change irq_info lock to raw_spinlock_t (git-fixes).\n- xfrm: Fix RCU vs hash_resize_mutex lock inversion (bsc#1185675).\n- xfrm: policy: Read seqcount outside of rcu-read side in xfrm_policy_lookup_bytype (bsc#1185675).\n- xprtrdma: Avoid Receive Queue wrapping (git-fixes).\n- xprtrdma: rpcrdma_mr_pop() already does list_del_init() (git-fixes).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2021-2426,SUSE-SLE-Module-RT-15-SP2-2021-2426",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2021_2426-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2021:2426-1",
"url": "https://www.suse.com/support/update/announcement/2021/suse-su-20212426-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2021:2426-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2021-July/009188.html"
},
{
"category": "self",
"summary": "SUSE Bug 1152489",
"url": "https://bugzilla.suse.com/1152489"
},
{
"category": "self",
"summary": "SUSE Bug 1153274",
"url": "https://bugzilla.suse.com/1153274"
},
{
"category": "self",
"summary": "SUSE Bug 1154353",
"url": "https://bugzilla.suse.com/1154353"
},
{
"category": "self",
"summary": "SUSE Bug 1155518",
"url": "https://bugzilla.suse.com/1155518"
},
{
"category": "self",
"summary": "SUSE Bug 1164648",
"url": "https://bugzilla.suse.com/1164648"
},
{
"category": "self",
"summary": "SUSE Bug 1174978",
"url": "https://bugzilla.suse.com/1174978"
},
{
"category": "self",
"summary": "SUSE Bug 1176771",
"url": "https://bugzilla.suse.com/1176771"
},
{
"category": "self",
"summary": "SUSE Bug 1179610",
"url": "https://bugzilla.suse.com/1179610"
},
{
"category": "self",
"summary": "SUSE Bug 1182470",
"url": "https://bugzilla.suse.com/1182470"
},
{
"category": "self",
"summary": "SUSE Bug 1183712",
"url": "https://bugzilla.suse.com/1183712"
},
{
"category": "self",
"summary": "SUSE Bug 1184212",
"url": "https://bugzilla.suse.com/1184212"
},
{
"category": "self",
"summary": "SUSE Bug 1184685",
"url": "https://bugzilla.suse.com/1184685"
},
{
"category": "self",
"summary": "SUSE Bug 1185195",
"url": "https://bugzilla.suse.com/1185195"
},
{
"category": "self",
"summary": "SUSE Bug 1185486",
"url": "https://bugzilla.suse.com/1185486"
},
{
"category": "self",
"summary": "SUSE Bug 1185589",
"url": "https://bugzilla.suse.com/1185589"
},
{
"category": "self",
"summary": "SUSE Bug 1185675",
"url": "https://bugzilla.suse.com/1185675"
},
{
"category": "self",
"summary": "SUSE Bug 1185677",
"url": "https://bugzilla.suse.com/1185677"
},
{
"category": "self",
"summary": "SUSE Bug 1185701",
"url": "https://bugzilla.suse.com/1185701"
},
{
"category": "self",
"summary": "SUSE Bug 1186206",
"url": "https://bugzilla.suse.com/1186206"
},
{
"category": "self",
"summary": "SUSE Bug 1186463",
"url": "https://bugzilla.suse.com/1186463"
},
{
"category": "self",
"summary": "SUSE Bug 1186666",
"url": "https://bugzilla.suse.com/1186666"
},
{
"category": "self",
"summary": "SUSE Bug 1186672",
"url": "https://bugzilla.suse.com/1186672"
},
{
"category": "self",
"summary": "SUSE Bug 1186752",
"url": "https://bugzilla.suse.com/1186752"
},
{
"category": "self",
"summary": "SUSE Bug 1186949",
"url": "https://bugzilla.suse.com/1186949"
},
{
"category": "self",
"summary": "SUSE Bug 1186950",
"url": "https://bugzilla.suse.com/1186950"
},
{
"category": "self",
"summary": "SUSE Bug 1186951",
"url": "https://bugzilla.suse.com/1186951"
},
{
"category": "self",
"summary": "SUSE Bug 1186952",
"url": "https://bugzilla.suse.com/1186952"
},
{
"category": "self",
"summary": "SUSE Bug 1186953",
"url": "https://bugzilla.suse.com/1186953"
},
{
"category": "self",
"summary": "SUSE Bug 1186954",
"url": "https://bugzilla.suse.com/1186954"
},
{
"category": "self",
"summary": "SUSE Bug 1186955",
"url": "https://bugzilla.suse.com/1186955"
},
{
"category": "self",
"summary": "SUSE Bug 1186956",
"url": "https://bugzilla.suse.com/1186956"
},
{
"category": "self",
"summary": "SUSE Bug 1186957",
"url": "https://bugzilla.suse.com/1186957"
},
{
"category": "self",
"summary": "SUSE Bug 1186958",
"url": "https://bugzilla.suse.com/1186958"
},
{
"category": "self",
"summary": "SUSE Bug 1186959",
"url": "https://bugzilla.suse.com/1186959"
},
{
"category": "self",
"summary": "SUSE Bug 1186960",
"url": "https://bugzilla.suse.com/1186960"
},
{
"category": "self",
"summary": "SUSE Bug 1186961",
"url": "https://bugzilla.suse.com/1186961"
},
{
"category": "self",
"summary": "SUSE Bug 1186962",
"url": "https://bugzilla.suse.com/1186962"
},
{
"category": "self",
"summary": "SUSE Bug 1186963",
"url": "https://bugzilla.suse.com/1186963"
},
{
"category": "self",
"summary": "SUSE Bug 1186964",
"url": "https://bugzilla.suse.com/1186964"
},
{
"category": "self",
"summary": "SUSE Bug 1186965",
"url": "https://bugzilla.suse.com/1186965"
},
{
"category": "self",
"summary": "SUSE Bug 1186966",
"url": "https://bugzilla.suse.com/1186966"
},
{
"category": "self",
"summary": "SUSE Bug 1186967",
"url": "https://bugzilla.suse.com/1186967"
},
{
"category": "self",
"summary": "SUSE Bug 1186968",
"url": "https://bugzilla.suse.com/1186968"
},
{
"category": "self",
"summary": "SUSE Bug 1186969",
"url": "https://bugzilla.suse.com/1186969"
},
{
"category": "self",
"summary": "SUSE Bug 1186970",
"url": "https://bugzilla.suse.com/1186970"
},
{
"category": "self",
"summary": "SUSE Bug 1186971",
"url": "https://bugzilla.suse.com/1186971"
},
{
"category": "self",
"summary": "SUSE Bug 1186972",
"url": "https://bugzilla.suse.com/1186972"
},
{
"category": "self",
"summary": "SUSE Bug 1186973",
"url": "https://bugzilla.suse.com/1186973"
},
{
"category": "self",
"summary": "SUSE Bug 1186974",
"url": "https://bugzilla.suse.com/1186974"
},
{
"category": "self",
"summary": "SUSE Bug 1186976",
"url": "https://bugzilla.suse.com/1186976"
},
{
"category": "self",
"summary": "SUSE Bug 1186977",
"url": "https://bugzilla.suse.com/1186977"
},
{
"category": "self",
"summary": "SUSE Bug 1186978",
"url": "https://bugzilla.suse.com/1186978"
},
{
"category": "self",
"summary": "SUSE Bug 1186979",
"url": "https://bugzilla.suse.com/1186979"
},
{
"category": "self",
"summary": "SUSE Bug 1186980",
"url": "https://bugzilla.suse.com/1186980"
},
{
"category": "self",
"summary": "SUSE Bug 1186981",
"url": "https://bugzilla.suse.com/1186981"
},
{
"category": "self",
"summary": "SUSE Bug 1186982",
"url": "https://bugzilla.suse.com/1186982"
},
{
"category": "self",
"summary": "SUSE Bug 1186983",
"url": "https://bugzilla.suse.com/1186983"
},
{
"category": "self",
"summary": "SUSE Bug 1186984",
"url": "https://bugzilla.suse.com/1186984"
},
{
"category": "self",
"summary": "SUSE Bug 1186985",
"url": "https://bugzilla.suse.com/1186985"
},
{
"category": "self",
"summary": "SUSE Bug 1186986",
"url": "https://bugzilla.suse.com/1186986"
},
{
"category": "self",
"summary": "SUSE Bug 1186987",
"url": "https://bugzilla.suse.com/1186987"
},
{
"category": "self",
"summary": "SUSE Bug 1186988",
"url": "https://bugzilla.suse.com/1186988"
},
{
"category": "self",
"summary": "SUSE Bug 1186989",
"url": "https://bugzilla.suse.com/1186989"
},
{
"category": "self",
"summary": "SUSE Bug 1186990",
"url": "https://bugzilla.suse.com/1186990"
},
{
"category": "self",
"summary": "SUSE Bug 1186991",
"url": "https://bugzilla.suse.com/1186991"
},
{
"category": "self",
"summary": "SUSE Bug 1186992",
"url": "https://bugzilla.suse.com/1186992"
},
{
"category": "self",
"summary": "SUSE Bug 1186993",
"url": "https://bugzilla.suse.com/1186993"
},
{
"category": "self",
"summary": "SUSE Bug 1186994",
"url": "https://bugzilla.suse.com/1186994"
},
{
"category": "self",
"summary": "SUSE Bug 1186995",
"url": "https://bugzilla.suse.com/1186995"
},
{
"category": "self",
"summary": "SUSE Bug 1186996",
"url": "https://bugzilla.suse.com/1186996"
},
{
"category": "self",
"summary": "SUSE Bug 1186997",
"url": "https://bugzilla.suse.com/1186997"
},
{
"category": "self",
"summary": "SUSE Bug 1186998",
"url": "https://bugzilla.suse.com/1186998"
},
{
"category": "self",
"summary": "SUSE Bug 1186999",
"url": "https://bugzilla.suse.com/1186999"
},
{
"category": "self",
"summary": "SUSE Bug 1187000",
"url": "https://bugzilla.suse.com/1187000"
},
{
"category": "self",
"summary": "SUSE Bug 1187001",
"url": "https://bugzilla.suse.com/1187001"
},
{
"category": "self",
"summary": "SUSE Bug 1187002",
"url": "https://bugzilla.suse.com/1187002"
},
{
"category": "self",
"summary": "SUSE Bug 1187003",
"url": "https://bugzilla.suse.com/1187003"
},
{
"category": "self",
"summary": "SUSE Bug 1187038",
"url": "https://bugzilla.suse.com/1187038"
},
{
"category": "self",
"summary": "SUSE Bug 1187050",
"url": "https://bugzilla.suse.com/1187050"
},
{
"category": "self",
"summary": "SUSE Bug 1187067",
"url": "https://bugzilla.suse.com/1187067"
},
{
"category": "self",
"summary": "SUSE Bug 1187068",
"url": "https://bugzilla.suse.com/1187068"
},
{
"category": "self",
"summary": "SUSE Bug 1187069",
"url": "https://bugzilla.suse.com/1187069"
},
{
"category": "self",
"summary": "SUSE Bug 1187072",
"url": "https://bugzilla.suse.com/1187072"
},
{
"category": "self",
"summary": "SUSE Bug 1187143",
"url": "https://bugzilla.suse.com/1187143"
},
{
"category": "self",
"summary": "SUSE Bug 1187144",
"url": "https://bugzilla.suse.com/1187144"
},
{
"category": "self",
"summary": "SUSE Bug 1187171",
"url": "https://bugzilla.suse.com/1187171"
},
{
"category": "self",
"summary": "SUSE Bug 1187263",
"url": "https://bugzilla.suse.com/1187263"
},
{
"category": "self",
"summary": "SUSE Bug 1187356",
"url": "https://bugzilla.suse.com/1187356"
},
{
"category": "self",
"summary": "SUSE Bug 1187402",
"url": "https://bugzilla.suse.com/1187402"
},
{
"category": "self",
"summary": "SUSE Bug 1187403",
"url": "https://bugzilla.suse.com/1187403"
},
{
"category": "self",
"summary": "SUSE Bug 1187404",
"url": "https://bugzilla.suse.com/1187404"
},
{
"category": "self",
"summary": "SUSE Bug 1187407",
"url": "https://bugzilla.suse.com/1187407"
},
{
"category": "self",
"summary": "SUSE Bug 1187408",
"url": "https://bugzilla.suse.com/1187408"
},
{
"category": "self",
"summary": "SUSE Bug 1187409",
"url": "https://bugzilla.suse.com/1187409"
},
{
"category": "self",
"summary": "SUSE Bug 1187410",
"url": "https://bugzilla.suse.com/1187410"
},
{
"category": "self",
"summary": "SUSE Bug 1187411",
"url": "https://bugzilla.suse.com/1187411"
},
{
"category": "self",
"summary": "SUSE Bug 1187412",
"url": "https://bugzilla.suse.com/1187412"
},
{
"category": "self",
"summary": "SUSE Bug 1187413",
"url": "https://bugzilla.suse.com/1187413"
},
{
"category": "self",
"summary": "SUSE Bug 1187452",
"url": "https://bugzilla.suse.com/1187452"
},
{
"category": "self",
"summary": "SUSE Bug 1187554",
"url": "https://bugzilla.suse.com/1187554"
},
{
"category": "self",
"summary": "SUSE Bug 1187595",
"url": "https://bugzilla.suse.com/1187595"
},
{
"category": "self",
"summary": "SUSE Bug 1187601",
"url": "https://bugzilla.suse.com/1187601"
},
{
"category": "self",
"summary": "SUSE Bug 1187795",
"url": "https://bugzilla.suse.com/1187795"
},
{
"category": "self",
"summary": "SUSE Bug 1187834",
"url": "https://bugzilla.suse.com/1187834"
},
{
"category": "self",
"summary": "SUSE Bug 1187867",
"url": "https://bugzilla.suse.com/1187867"
},
{
"category": "self",
"summary": "SUSE Bug 1187883",
"url": "https://bugzilla.suse.com/1187883"
},
{
"category": "self",
"summary": "SUSE Bug 1187886",
"url": "https://bugzilla.suse.com/1187886"
},
{
"category": "self",
"summary": "SUSE Bug 1187927",
"url": "https://bugzilla.suse.com/1187927"
},
{
"category": "self",
"summary": "SUSE Bug 1187972",
"url": "https://bugzilla.suse.com/1187972"
},
{
"category": "self",
"summary": "SUSE Bug 1187980",
"url": "https://bugzilla.suse.com/1187980"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-26558 page",
"url": "https://www.suse.com/security/cve/CVE-2020-26558/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-36385 page",
"url": "https://www.suse.com/security/cve/CVE-2020-36385/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-36386 page",
"url": "https://www.suse.com/security/cve/CVE-2020-36386/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-0129 page",
"url": "https://www.suse.com/security/cve/CVE-2021-0129/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-0512 page",
"url": "https://www.suse.com/security/cve/CVE-2021-0512/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-0605 page",
"url": "https://www.suse.com/security/cve/CVE-2021-0605/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-33624 page",
"url": "https://www.suse.com/security/cve/CVE-2021-33624/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-34693 page",
"url": "https://www.suse.com/security/cve/CVE-2021-34693/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3573 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3573/"
}
],
"title": "Security update for the Linux Kernel",
"tracking": {
"current_release_date": "2021-07-21T09:26:47Z",
"generator": {
"date": "2021-07-21T09:26:47Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2021:2426-1",
"initial_release_date": "2021-07-21T09:26:47Z",
"revision_history": [
{
"date": "2021-07-21T09:26:47Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "kernel-devel-rt-5.3.18-42.1.noarch",
"product": {
"name": "kernel-devel-rt-5.3.18-42.1.noarch",
"product_id": "kernel-devel-rt-5.3.18-42.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-rt-5.3.18-42.1.noarch",
"product": {
"name": "kernel-source-rt-5.3.18-42.1.noarch",
"product_id": "kernel-source-rt-5.3.18-42.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-rt-5.3.18-42.2.x86_64",
"product": {
"name": "cluster-md-kmp-rt-5.3.18-42.2.x86_64",
"product_id": "cluster-md-kmp-rt-5.3.18-42.2.x86_64"
}
},
{
"category": "product_version",
"name": "cluster-md-kmp-rt_debug-5.3.18-42.2.x86_64",
"product": {
"name": "cluster-md-kmp-rt_debug-5.3.18-42.2.x86_64",
"product_id": "cluster-md-kmp-rt_debug-5.3.18-42.2.x86_64"
}
},
{
"category": "product_version",
"name": "crash-7.2.8-1.3.1.x86_64",
"product": {
"name": "crash-7.2.8-1.3.1.x86_64",
"product_id": "crash-7.2.8-1.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "crash-devel-7.2.8-1.3.1.x86_64",
"product": {
"name": "crash-devel-7.2.8-1.3.1.x86_64",
"product_id": "crash-devel-7.2.8-1.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "crash-doc-7.2.8-1.3.1.x86_64",
"product": {
"name": "crash-doc-7.2.8-1.3.1.x86_64",
"product_id": "crash-doc-7.2.8-1.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "crash-eppic-7.2.8-1.3.1.x86_64",
"product": {
"name": "crash-eppic-7.2.8-1.3.1.x86_64",
"product_id": "crash-eppic-7.2.8-1.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "crash-gcore-7.2.8-1.3.1.x86_64",
"product": {
"name": "crash-gcore-7.2.8-1.3.1.x86_64",
"product_id": "crash-gcore-7.2.8-1.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "crash-kmp-default-7.2.8_k5.3.18_24.70-1.3.1.x86_64",
"product": {
"name": "crash-kmp-default-7.2.8_k5.3.18_24.70-1.3.1.x86_64",
"product_id": "crash-kmp-default-7.2.8_k5.3.18_24.70-1.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "crash-kmp-preempt-7.2.8_k5.3.18_24.70-1.3.1.x86_64",
"product": {
"name": "crash-kmp-preempt-7.2.8_k5.3.18_24.70-1.3.1.x86_64",
"product_id": "crash-kmp-preempt-7.2.8_k5.3.18_24.70-1.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-rt-5.3.18-42.2.x86_64",
"product": {
"name": "dlm-kmp-rt-5.3.18-42.2.x86_64",
"product_id": "dlm-kmp-rt-5.3.18-42.2.x86_64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-rt_debug-5.3.18-42.2.x86_64",
"product": {
"name": "dlm-kmp-rt_debug-5.3.18-42.2.x86_64",
"product_id": "dlm-kmp-rt_debug-5.3.18-42.2.x86_64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-rt-5.3.18-42.2.x86_64",
"product": {
"name": "gfs2-kmp-rt-5.3.18-42.2.x86_64",
"product_id": "gfs2-kmp-rt-5.3.18-42.2.x86_64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-rt_debug-5.3.18-42.2.x86_64",
"product": {
"name": "gfs2-kmp-rt_debug-5.3.18-42.2.x86_64",
"product_id": "gfs2-kmp-rt_debug-5.3.18-42.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt-5.3.18-42.2.x86_64",
"product": {
"name": "kernel-rt-5.3.18-42.2.x86_64",
"product_id": "kernel-rt-5.3.18-42.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt-devel-5.3.18-42.2.x86_64",
"product": {
"name": "kernel-rt-devel-5.3.18-42.2.x86_64",
"product_id": "kernel-rt-devel-5.3.18-42.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt-extra-5.3.18-42.2.x86_64",
"product": {
"name": "kernel-rt-extra-5.3.18-42.2.x86_64",
"product_id": "kernel-rt-extra-5.3.18-42.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt-livepatch-devel-5.3.18-42.2.x86_64",
"product": {
"name": "kernel-rt-livepatch-devel-5.3.18-42.2.x86_64",
"product_id": "kernel-rt-livepatch-devel-5.3.18-42.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt_debug-5.3.18-42.2.x86_64",
"product": {
"name": "kernel-rt_debug-5.3.18-42.2.x86_64",
"product_id": "kernel-rt_debug-5.3.18-42.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt_debug-devel-5.3.18-42.2.x86_64",
"product": {
"name": "kernel-rt_debug-devel-5.3.18-42.2.x86_64",
"product_id": "kernel-rt_debug-devel-5.3.18-42.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt_debug-extra-5.3.18-42.2.x86_64",
"product": {
"name": "kernel-rt_debug-extra-5.3.18-42.2.x86_64",
"product_id": "kernel-rt_debug-extra-5.3.18-42.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt_debug-livepatch-devel-5.3.18-42.2.x86_64",
"product": {
"name": "kernel-rt_debug-livepatch-devel-5.3.18-42.2.x86_64",
"product_id": "kernel-rt_debug-livepatch-devel-5.3.18-42.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-syms-rt-5.3.18-42.1.x86_64",
"product": {
"name": "kernel-syms-rt-5.3.18-42.1.x86_64",
"product_id": "kernel-syms-rt-5.3.18-42.1.x86_64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-rt-5.3.18-42.2.x86_64",
"product": {
"name": "kselftests-kmp-rt-5.3.18-42.2.x86_64",
"product_id": "kselftests-kmp-rt-5.3.18-42.2.x86_64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-rt_debug-5.3.18-42.2.x86_64",
"product": {
"name": "kselftests-kmp-rt_debug-5.3.18-42.2.x86_64",
"product_id": "kselftests-kmp-rt_debug-5.3.18-42.2.x86_64"
}
},
{
"category": "product_version",
"name": "lttng-modules-2.10.10-1.5.1.x86_64",
"product": {
"name": "lttng-modules-2.10.10-1.5.1.x86_64",
"product_id": "lttng-modules-2.10.10-1.5.1.x86_64"
}
},
{
"category": "product_version",
"name": "lttng-modules-kmp-default-2.10.10_k5.3.18_24.70-1.5.1.x86_64",
"product": {
"name": "lttng-modules-kmp-default-2.10.10_k5.3.18_24.70-1.5.1.x86_64",
"product_id": "lttng-modules-kmp-default-2.10.10_k5.3.18_24.70-1.5.1.x86_64"
}
},
{
"category": "product_version",
"name": "lttng-modules-kmp-preempt-2.10.10_k5.3.18_24.70-1.5.1.x86_64",
"product": {
"name": "lttng-modules-kmp-preempt-2.10.10_k5.3.18_24.70-1.5.1.x86_64",
"product_id": "lttng-modules-kmp-preempt-2.10.10_k5.3.18_24.70-1.5.1.x86_64"
}
},
{
"category": "product_version",
"name": "lttng-modules-kmp-rt-2.10.10_k5.3.18_42-1.5.1.x86_64",
"product": {
"name": "lttng-modules-kmp-rt-2.10.10_k5.3.18_42-1.5.1.x86_64",
"product_id": "lttng-modules-kmp-rt-2.10.10_k5.3.18_42-1.5.1.x86_64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-rt-5.3.18-42.2.x86_64",
"product": {
"name": "ocfs2-kmp-rt-5.3.18-42.2.x86_64",
"product_id": "ocfs2-kmp-rt-5.3.18-42.2.x86_64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-rt_debug-5.3.18-42.2.x86_64",
"product": {
"name": "ocfs2-kmp-rt_debug-5.3.18-42.2.x86_64",
"product_id": "ocfs2-kmp-rt_debug-5.3.18-42.2.x86_64"
}
},
{
"category": "product_version",
"name": "oracleasm-kmp-default-2.0.8_k5.3.18_24.70-1.3.1.x86_64",
"product": {
"name": "oracleasm-kmp-default-2.0.8_k5.3.18_24.70-1.3.1.x86_64",
"product_id": "oracleasm-kmp-default-2.0.8_k5.3.18_24.70-1.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "oracleasm-kmp-preempt-2.0.8_k5.3.18_24.70-1.3.1.x86_64",
"product": {
"name": "oracleasm-kmp-preempt-2.0.8_k5.3.18_24.70-1.3.1.x86_64",
"product_id": "oracleasm-kmp-preempt-2.0.8_k5.3.18_24.70-1.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "oracleasm-kmp-rt-2.0.8_k5.3.18_42-1.3.1.x86_64",
"product": {
"name": "oracleasm-kmp-rt-2.0.8_k5.3.18_42-1.3.1.x86_64",
"product_id": "oracleasm-kmp-rt-2.0.8_k5.3.18_42-1.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-rt-5.3.18-42.2.x86_64",
"product": {
"name": "reiserfs-kmp-rt-5.3.18-42.2.x86_64",
"product_id": "reiserfs-kmp-rt-5.3.18-42.2.x86_64"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-rt_debug-5.3.18-42.2.x86_64",
"product": {
"name": "reiserfs-kmp-rt_debug-5.3.18-42.2.x86_64",
"product_id": "reiserfs-kmp-rt_debug-5.3.18-42.2.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Real Time Module 15 SP2",
"product": {
"name": "SUSE Real Time Module 15 SP2",
"product_id": "SUSE Real Time Module 15 SP2",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-rt:15:sp2"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-rt-5.3.18-42.2.x86_64 as component of SUSE Real Time Module 15 SP2",
"product_id": "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-42.2.x86_64"
},
"product_reference": "cluster-md-kmp-rt-5.3.18-42.2.x86_64",
"relates_to_product_reference": "SUSE Real Time Module 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-rt-5.3.18-42.2.x86_64 as component of SUSE Real Time Module 15 SP2",
"product_id": "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-42.2.x86_64"
},
"product_reference": "dlm-kmp-rt-5.3.18-42.2.x86_64",
"relates_to_product_reference": "SUSE Real Time Module 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-rt-5.3.18-42.2.x86_64 as component of SUSE Real Time Module 15 SP2",
"product_id": "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-42.2.x86_64"
},
"product_reference": "gfs2-kmp-rt-5.3.18-42.2.x86_64",
"relates_to_product_reference": "SUSE Real Time Module 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-rt-5.3.18-42.1.noarch as component of SUSE Real Time Module 15 SP2",
"product_id": "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-42.1.noarch"
},
"product_reference": "kernel-devel-rt-5.3.18-42.1.noarch",
"relates_to_product_reference": "SUSE Real Time Module 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-5.3.18-42.2.x86_64 as component of SUSE Real Time Module 15 SP2",
"product_id": "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-42.2.x86_64"
},
"product_reference": "kernel-rt-5.3.18-42.2.x86_64",
"relates_to_product_reference": "SUSE Real Time Module 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-devel-5.3.18-42.2.x86_64 as component of SUSE Real Time Module 15 SP2",
"product_id": "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-42.2.x86_64"
},
"product_reference": "kernel-rt-devel-5.3.18-42.2.x86_64",
"relates_to_product_reference": "SUSE Real Time Module 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt_debug-5.3.18-42.2.x86_64 as component of SUSE Real Time Module 15 SP2",
"product_id": "SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-42.2.x86_64"
},
"product_reference": "kernel-rt_debug-5.3.18-42.2.x86_64",
"relates_to_product_reference": "SUSE Real Time Module 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt_debug-devel-5.3.18-42.2.x86_64 as component of SUSE Real Time Module 15 SP2",
"product_id": "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-42.2.x86_64"
},
"product_reference": "kernel-rt_debug-devel-5.3.18-42.2.x86_64",
"relates_to_product_reference": "SUSE Real Time Module 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-rt-5.3.18-42.1.noarch as component of SUSE Real Time Module 15 SP2",
"product_id": "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-42.1.noarch"
},
"product_reference": "kernel-source-rt-5.3.18-42.1.noarch",
"relates_to_product_reference": "SUSE Real Time Module 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-rt-5.3.18-42.1.x86_64 as component of SUSE Real Time Module 15 SP2",
"product_id": "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-42.1.x86_64"
},
"product_reference": "kernel-syms-rt-5.3.18-42.1.x86_64",
"relates_to_product_reference": "SUSE Real Time Module 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lttng-modules-kmp-rt-2.10.10_k5.3.18_42-1.5.1.x86_64 as component of SUSE Real Time Module 15 SP2",
"product_id": "SUSE Real Time Module 15 SP2:lttng-modules-kmp-rt-2.10.10_k5.3.18_42-1.5.1.x86_64"
},
"product_reference": "lttng-modules-kmp-rt-2.10.10_k5.3.18_42-1.5.1.x86_64",
"relates_to_product_reference": "SUSE Real Time Module 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-rt-5.3.18-42.2.x86_64 as component of SUSE Real Time Module 15 SP2",
"product_id": "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-42.2.x86_64"
},
"product_reference": "ocfs2-kmp-rt-5.3.18-42.2.x86_64",
"relates_to_product_reference": "SUSE Real Time Module 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "oracleasm-kmp-rt-2.0.8_k5.3.18_42-1.3.1.x86_64 as component of SUSE Real Time Module 15 SP2",
"product_id": "SUSE Real Time Module 15 SP2:oracleasm-kmp-rt-2.0.8_k5.3.18_42-1.3.1.x86_64"
},
"product_reference": "oracleasm-kmp-rt-2.0.8_k5.3.18_42-1.3.1.x86_64",
"relates_to_product_reference": "SUSE Real Time Module 15 SP2"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2020-26558",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-26558"
}
],
"notes": [
{
"category": "general",
"text": "Bluetooth LE and BR/EDR secure pairing in Bluetooth Core Specification 2.1 through 5.2 may permit a nearby man-in-the-middle attacker to identify the Passkey used during pairing (in the Passkey authentication procedure) by reflection of the public key and the authentication evidence of the initiating device, potentially permitting this attacker to complete authenticated pairing with the responding device using the correct Passkey for the pairing session. The attack methodology determines the Passkey value one bit at a time.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-42.2.x86_64",
"SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-42.2.x86_64",
"SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-42.2.x86_64",
"SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-42.1.noarch",
"SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-42.2.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-42.2.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-42.2.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-42.2.x86_64",
"SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-42.1.noarch",
"SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-42.1.x86_64",
"SUSE Real Time Module 15 SP2:lttng-modules-kmp-rt-2.10.10_k5.3.18_42-1.5.1.x86_64",
"SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-42.2.x86_64",
"SUSE Real Time Module 15 SP2:oracleasm-kmp-rt-2.0.8_k5.3.18_42-1.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-26558",
"url": "https://www.suse.com/security/cve/CVE-2020-26558"
},
{
"category": "external",
"summary": "SUSE Bug 1179610 for CVE-2020-26558",
"url": "https://bugzilla.suse.com/1179610"
},
{
"category": "external",
"summary": "SUSE Bug 1186463 for CVE-2020-26558",
"url": "https://bugzilla.suse.com/1186463"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-42.2.x86_64",
"SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-42.2.x86_64",
"SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-42.2.x86_64",
"SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-42.1.noarch",
"SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-42.2.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-42.2.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-42.2.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-42.2.x86_64",
"SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-42.1.noarch",
"SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-42.1.x86_64",
"SUSE Real Time Module 15 SP2:lttng-modules-kmp-rt-2.10.10_k5.3.18_42-1.5.1.x86_64",
"SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-42.2.x86_64",
"SUSE Real Time Module 15 SP2:oracleasm-kmp-rt-2.0.8_k5.3.18_42-1.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-42.2.x86_64",
"SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-42.2.x86_64",
"SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-42.2.x86_64",
"SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-42.1.noarch",
"SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-42.2.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-42.2.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-42.2.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-42.2.x86_64",
"SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-42.1.noarch",
"SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-42.1.x86_64",
"SUSE Real Time Module 15 SP2:lttng-modules-kmp-rt-2.10.10_k5.3.18_42-1.5.1.x86_64",
"SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-42.2.x86_64",
"SUSE Real Time Module 15 SP2:oracleasm-kmp-rt-2.0.8_k5.3.18_42-1.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-21T09:26:47Z",
"details": "moderate"
}
],
"title": "CVE-2020-26558"
},
{
"cve": "CVE-2020-36385",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-36385"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel before 5.10. drivers/infiniband/core/ucma.c has a use-after-free because the ctx is reached via the ctx_list in some ucma_migrate_id situations where ucma_close is called, aka CID-f5449e74802c.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-42.2.x86_64",
"SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-42.2.x86_64",
"SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-42.2.x86_64",
"SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-42.1.noarch",
"SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-42.2.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-42.2.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-42.2.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-42.2.x86_64",
"SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-42.1.noarch",
"SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-42.1.x86_64",
"SUSE Real Time Module 15 SP2:lttng-modules-kmp-rt-2.10.10_k5.3.18_42-1.5.1.x86_64",
"SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-42.2.x86_64",
"SUSE Real Time Module 15 SP2:oracleasm-kmp-rt-2.0.8_k5.3.18_42-1.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-36385",
"url": "https://www.suse.com/security/cve/CVE-2020-36385"
},
{
"category": "external",
"summary": "SUSE Bug 1187050 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1187050"
},
{
"category": "external",
"summary": "SUSE Bug 1187052 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1187052"
},
{
"category": "external",
"summary": "SUSE Bug 1189302 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1189302"
},
{
"category": "external",
"summary": "SUSE Bug 1196174 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1196174"
},
{
"category": "external",
"summary": "SUSE Bug 1196810 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1196810"
},
{
"category": "external",
"summary": "SUSE Bug 1196914 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1196914"
},
{
"category": "external",
"summary": "SUSE Bug 1200084 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1200084"
},
{
"category": "external",
"summary": "SUSE Bug 1201734 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1201734"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-42.2.x86_64",
"SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-42.2.x86_64",
"SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-42.2.x86_64",
"SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-42.1.noarch",
"SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-42.2.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-42.2.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-42.2.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-42.2.x86_64",
"SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-42.1.noarch",
"SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-42.1.x86_64",
"SUSE Real Time Module 15 SP2:lttng-modules-kmp-rt-2.10.10_k5.3.18_42-1.5.1.x86_64",
"SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-42.2.x86_64",
"SUSE Real Time Module 15 SP2:oracleasm-kmp-rt-2.0.8_k5.3.18_42-1.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-42.2.x86_64",
"SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-42.2.x86_64",
"SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-42.2.x86_64",
"SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-42.1.noarch",
"SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-42.2.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-42.2.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-42.2.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-42.2.x86_64",
"SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-42.1.noarch",
"SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-42.1.x86_64",
"SUSE Real Time Module 15 SP2:lttng-modules-kmp-rt-2.10.10_k5.3.18_42-1.5.1.x86_64",
"SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-42.2.x86_64",
"SUSE Real Time Module 15 SP2:oracleasm-kmp-rt-2.0.8_k5.3.18_42-1.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-21T09:26:47Z",
"details": "important"
}
],
"title": "CVE-2020-36385"
},
{
"cve": "CVE-2020-36386",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-36386"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel before 5.8.1. net/bluetooth/hci_event.c has a slab out-of-bounds read in hci_extended_inquiry_result_evt, aka CID-51c19bf3d5cf.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-42.2.x86_64",
"SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-42.2.x86_64",
"SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-42.2.x86_64",
"SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-42.1.noarch",
"SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-42.2.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-42.2.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-42.2.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-42.2.x86_64",
"SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-42.1.noarch",
"SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-42.1.x86_64",
"SUSE Real Time Module 15 SP2:lttng-modules-kmp-rt-2.10.10_k5.3.18_42-1.5.1.x86_64",
"SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-42.2.x86_64",
"SUSE Real Time Module 15 SP2:oracleasm-kmp-rt-2.0.8_k5.3.18_42-1.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-36386",
"url": "https://www.suse.com/security/cve/CVE-2020-36386"
},
{
"category": "external",
"summary": "SUSE Bug 1187038 for CVE-2020-36386",
"url": "https://bugzilla.suse.com/1187038"
},
{
"category": "external",
"summary": "SUSE Bug 1192868 for CVE-2020-36386",
"url": "https://bugzilla.suse.com/1192868"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-42.2.x86_64",
"SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-42.2.x86_64",
"SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-42.2.x86_64",
"SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-42.1.noarch",
"SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-42.2.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-42.2.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-42.2.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-42.2.x86_64",
"SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-42.1.noarch",
"SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-42.1.x86_64",
"SUSE Real Time Module 15 SP2:lttng-modules-kmp-rt-2.10.10_k5.3.18_42-1.5.1.x86_64",
"SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-42.2.x86_64",
"SUSE Real Time Module 15 SP2:oracleasm-kmp-rt-2.0.8_k5.3.18_42-1.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-42.2.x86_64",
"SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-42.2.x86_64",
"SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-42.2.x86_64",
"SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-42.1.noarch",
"SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-42.2.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-42.2.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-42.2.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-42.2.x86_64",
"SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-42.1.noarch",
"SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-42.1.x86_64",
"SUSE Real Time Module 15 SP2:lttng-modules-kmp-rt-2.10.10_k5.3.18_42-1.5.1.x86_64",
"SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-42.2.x86_64",
"SUSE Real Time Module 15 SP2:oracleasm-kmp-rt-2.0.8_k5.3.18_42-1.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-21T09:26:47Z",
"details": "moderate"
}
],
"title": "CVE-2020-36386"
},
{
"cve": "CVE-2021-0129",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-0129"
}
],
"notes": [
{
"category": "general",
"text": "Improper access control in BlueZ may allow an authenticated user to potentially enable information disclosure via adjacent access.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-42.2.x86_64",
"SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-42.2.x86_64",
"SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-42.2.x86_64",
"SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-42.1.noarch",
"SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-42.2.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-42.2.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-42.2.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-42.2.x86_64",
"SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-42.1.noarch",
"SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-42.1.x86_64",
"SUSE Real Time Module 15 SP2:lttng-modules-kmp-rt-2.10.10_k5.3.18_42-1.5.1.x86_64",
"SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-42.2.x86_64",
"SUSE Real Time Module 15 SP2:oracleasm-kmp-rt-2.0.8_k5.3.18_42-1.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-0129",
"url": "https://www.suse.com/security/cve/CVE-2021-0129"
},
{
"category": "external",
"summary": "SUSE Bug 1186463 for CVE-2021-0129",
"url": "https://bugzilla.suse.com/1186463"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-42.2.x86_64",
"SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-42.2.x86_64",
"SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-42.2.x86_64",
"SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-42.1.noarch",
"SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-42.2.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-42.2.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-42.2.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-42.2.x86_64",
"SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-42.1.noarch",
"SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-42.1.x86_64",
"SUSE Real Time Module 15 SP2:lttng-modules-kmp-rt-2.10.10_k5.3.18_42-1.5.1.x86_64",
"SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-42.2.x86_64",
"SUSE Real Time Module 15 SP2:oracleasm-kmp-rt-2.0.8_k5.3.18_42-1.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-42.2.x86_64",
"SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-42.2.x86_64",
"SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-42.2.x86_64",
"SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-42.1.noarch",
"SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-42.2.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-42.2.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-42.2.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-42.2.x86_64",
"SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-42.1.noarch",
"SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-42.1.x86_64",
"SUSE Real Time Module 15 SP2:lttng-modules-kmp-rt-2.10.10_k5.3.18_42-1.5.1.x86_64",
"SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-42.2.x86_64",
"SUSE Real Time Module 15 SP2:oracleasm-kmp-rt-2.0.8_k5.3.18_42-1.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-21T09:26:47Z",
"details": "moderate"
}
],
"title": "CVE-2021-0129"
},
{
"cve": "CVE-2021-0512",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-0512"
}
],
"notes": [
{
"category": "general",
"text": "In __hidinput_change_resolution_multipliers of hid-input.c, there is a possible out of bounds write due to a heap buffer overflow. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-173843328References: Upstream kernel",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-42.2.x86_64",
"SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-42.2.x86_64",
"SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-42.2.x86_64",
"SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-42.1.noarch",
"SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-42.2.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-42.2.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-42.2.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-42.2.x86_64",
"SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-42.1.noarch",
"SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-42.1.x86_64",
"SUSE Real Time Module 15 SP2:lttng-modules-kmp-rt-2.10.10_k5.3.18_42-1.5.1.x86_64",
"SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-42.2.x86_64",
"SUSE Real Time Module 15 SP2:oracleasm-kmp-rt-2.0.8_k5.3.18_42-1.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-0512",
"url": "https://www.suse.com/security/cve/CVE-2021-0512"
},
{
"category": "external",
"summary": "SUSE Bug 1187595 for CVE-2021-0512",
"url": "https://bugzilla.suse.com/1187595"
},
{
"category": "external",
"summary": "SUSE Bug 1187597 for CVE-2021-0512",
"url": "https://bugzilla.suse.com/1187597"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-42.2.x86_64",
"SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-42.2.x86_64",
"SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-42.2.x86_64",
"SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-42.1.noarch",
"SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-42.2.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-42.2.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-42.2.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-42.2.x86_64",
"SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-42.1.noarch",
"SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-42.1.x86_64",
"SUSE Real Time Module 15 SP2:lttng-modules-kmp-rt-2.10.10_k5.3.18_42-1.5.1.x86_64",
"SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-42.2.x86_64",
"SUSE Real Time Module 15 SP2:oracleasm-kmp-rt-2.0.8_k5.3.18_42-1.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-42.2.x86_64",
"SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-42.2.x86_64",
"SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-42.2.x86_64",
"SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-42.1.noarch",
"SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-42.2.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-42.2.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-42.2.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-42.2.x86_64",
"SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-42.1.noarch",
"SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-42.1.x86_64",
"SUSE Real Time Module 15 SP2:lttng-modules-kmp-rt-2.10.10_k5.3.18_42-1.5.1.x86_64",
"SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-42.2.x86_64",
"SUSE Real Time Module 15 SP2:oracleasm-kmp-rt-2.0.8_k5.3.18_42-1.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-21T09:26:47Z",
"details": "important"
}
],
"title": "CVE-2021-0512"
},
{
"cve": "CVE-2021-0605",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-0605"
}
],
"notes": [
{
"category": "general",
"text": "In pfkey_dump of af_key.c, there is a possible out-of-bounds read due to a missing bounds check. This could lead to local information disclosure in the kernel with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-110373476",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-42.2.x86_64",
"SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-42.2.x86_64",
"SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-42.2.x86_64",
"SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-42.1.noarch",
"SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-42.2.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-42.2.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-42.2.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-42.2.x86_64",
"SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-42.1.noarch",
"SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-42.1.x86_64",
"SUSE Real Time Module 15 SP2:lttng-modules-kmp-rt-2.10.10_k5.3.18_42-1.5.1.x86_64",
"SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-42.2.x86_64",
"SUSE Real Time Module 15 SP2:oracleasm-kmp-rt-2.0.8_k5.3.18_42-1.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-0605",
"url": "https://www.suse.com/security/cve/CVE-2021-0605"
},
{
"category": "external",
"summary": "SUSE Bug 1187601 for CVE-2021-0605",
"url": "https://bugzilla.suse.com/1187601"
},
{
"category": "external",
"summary": "SUSE Bug 1187687 for CVE-2021-0605",
"url": "https://bugzilla.suse.com/1187687"
},
{
"category": "external",
"summary": "SUSE Bug 1188381 for CVE-2021-0605",
"url": "https://bugzilla.suse.com/1188381"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-42.2.x86_64",
"SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-42.2.x86_64",
"SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-42.2.x86_64",
"SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-42.1.noarch",
"SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-42.2.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-42.2.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-42.2.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-42.2.x86_64",
"SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-42.1.noarch",
"SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-42.1.x86_64",
"SUSE Real Time Module 15 SP2:lttng-modules-kmp-rt-2.10.10_k5.3.18_42-1.5.1.x86_64",
"SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-42.2.x86_64",
"SUSE Real Time Module 15 SP2:oracleasm-kmp-rt-2.0.8_k5.3.18_42-1.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-42.2.x86_64",
"SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-42.2.x86_64",
"SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-42.2.x86_64",
"SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-42.1.noarch",
"SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-42.2.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-42.2.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-42.2.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-42.2.x86_64",
"SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-42.1.noarch",
"SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-42.1.x86_64",
"SUSE Real Time Module 15 SP2:lttng-modules-kmp-rt-2.10.10_k5.3.18_42-1.5.1.x86_64",
"SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-42.2.x86_64",
"SUSE Real Time Module 15 SP2:oracleasm-kmp-rt-2.0.8_k5.3.18_42-1.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-21T09:26:47Z",
"details": "important"
}
],
"title": "CVE-2021-0605"
},
{
"cve": "CVE-2021-33624",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-33624"
}
],
"notes": [
{
"category": "general",
"text": "In kernel/bpf/verifier.c in the Linux kernel before 5.12.13, a branch can be mispredicted (e.g., because of type confusion) and consequently an unprivileged BPF program can read arbitrary memory locations via a side-channel attack, aka CID-9183671af6db.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-42.2.x86_64",
"SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-42.2.x86_64",
"SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-42.2.x86_64",
"SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-42.1.noarch",
"SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-42.2.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-42.2.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-42.2.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-42.2.x86_64",
"SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-42.1.noarch",
"SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-42.1.x86_64",
"SUSE Real Time Module 15 SP2:lttng-modules-kmp-rt-2.10.10_k5.3.18_42-1.5.1.x86_64",
"SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-42.2.x86_64",
"SUSE Real Time Module 15 SP2:oracleasm-kmp-rt-2.0.8_k5.3.18_42-1.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-33624",
"url": "https://www.suse.com/security/cve/CVE-2021-33624"
},
{
"category": "external",
"summary": "SUSE Bug 1187554 for CVE-2021-33624",
"url": "https://bugzilla.suse.com/1187554"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-42.2.x86_64",
"SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-42.2.x86_64",
"SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-42.2.x86_64",
"SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-42.1.noarch",
"SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-42.2.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-42.2.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-42.2.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-42.2.x86_64",
"SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-42.1.noarch",
"SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-42.1.x86_64",
"SUSE Real Time Module 15 SP2:lttng-modules-kmp-rt-2.10.10_k5.3.18_42-1.5.1.x86_64",
"SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-42.2.x86_64",
"SUSE Real Time Module 15 SP2:oracleasm-kmp-rt-2.0.8_k5.3.18_42-1.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-42.2.x86_64",
"SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-42.2.x86_64",
"SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-42.2.x86_64",
"SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-42.1.noarch",
"SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-42.2.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-42.2.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-42.2.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-42.2.x86_64",
"SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-42.1.noarch",
"SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-42.1.x86_64",
"SUSE Real Time Module 15 SP2:lttng-modules-kmp-rt-2.10.10_k5.3.18_42-1.5.1.x86_64",
"SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-42.2.x86_64",
"SUSE Real Time Module 15 SP2:oracleasm-kmp-rt-2.0.8_k5.3.18_42-1.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-21T09:26:47Z",
"details": "moderate"
}
],
"title": "CVE-2021-33624"
},
{
"cve": "CVE-2021-34693",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-34693"
}
],
"notes": [
{
"category": "general",
"text": "net/can/bcm.c in the Linux kernel through 5.12.10 allows local users to obtain sensitive information from kernel stack memory because parts of a data structure are uninitialized.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-42.2.x86_64",
"SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-42.2.x86_64",
"SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-42.2.x86_64",
"SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-42.1.noarch",
"SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-42.2.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-42.2.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-42.2.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-42.2.x86_64",
"SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-42.1.noarch",
"SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-42.1.x86_64",
"SUSE Real Time Module 15 SP2:lttng-modules-kmp-rt-2.10.10_k5.3.18_42-1.5.1.x86_64",
"SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-42.2.x86_64",
"SUSE Real Time Module 15 SP2:oracleasm-kmp-rt-2.0.8_k5.3.18_42-1.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-34693",
"url": "https://www.suse.com/security/cve/CVE-2021-34693"
},
{
"category": "external",
"summary": "SUSE Bug 1187452 for CVE-2021-34693",
"url": "https://bugzilla.suse.com/1187452"
},
{
"category": "external",
"summary": "SUSE Bug 1192868 for CVE-2021-34693",
"url": "https://bugzilla.suse.com/1192868"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-42.2.x86_64",
"SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-42.2.x86_64",
"SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-42.2.x86_64",
"SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-42.1.noarch",
"SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-42.2.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-42.2.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-42.2.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-42.2.x86_64",
"SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-42.1.noarch",
"SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-42.1.x86_64",
"SUSE Real Time Module 15 SP2:lttng-modules-kmp-rt-2.10.10_k5.3.18_42-1.5.1.x86_64",
"SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-42.2.x86_64",
"SUSE Real Time Module 15 SP2:oracleasm-kmp-rt-2.0.8_k5.3.18_42-1.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-42.2.x86_64",
"SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-42.2.x86_64",
"SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-42.2.x86_64",
"SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-42.1.noarch",
"SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-42.2.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-42.2.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-42.2.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-42.2.x86_64",
"SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-42.1.noarch",
"SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-42.1.x86_64",
"SUSE Real Time Module 15 SP2:lttng-modules-kmp-rt-2.10.10_k5.3.18_42-1.5.1.x86_64",
"SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-42.2.x86_64",
"SUSE Real Time Module 15 SP2:oracleasm-kmp-rt-2.0.8_k5.3.18_42-1.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-21T09:26:47Z",
"details": "moderate"
}
],
"title": "CVE-2021-34693"
},
{
"cve": "CVE-2021-3573",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3573"
}
],
"notes": [
{
"category": "general",
"text": "A use-after-free in function hci_sock_bound_ioctl() of the Linux kernel HCI subsystem was found in the way user calls ioct HCIUNBLOCKADDR or other way triggers race condition of the call hci_unregister_dev() together with one of the calls hci_sock_blacklist_add(), hci_sock_blacklist_del(), hci_get_conn_info(), hci_get_auth_info(). A privileged local user could use this flaw to crash the system or escalate their privileges on the system. This flaw affects the Linux kernel versions prior to 5.13-rc5.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-42.2.x86_64",
"SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-42.2.x86_64",
"SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-42.2.x86_64",
"SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-42.1.noarch",
"SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-42.2.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-42.2.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-42.2.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-42.2.x86_64",
"SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-42.1.noarch",
"SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-42.1.x86_64",
"SUSE Real Time Module 15 SP2:lttng-modules-kmp-rt-2.10.10_k5.3.18_42-1.5.1.x86_64",
"SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-42.2.x86_64",
"SUSE Real Time Module 15 SP2:oracleasm-kmp-rt-2.0.8_k5.3.18_42-1.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3573",
"url": "https://www.suse.com/security/cve/CVE-2021-3573"
},
{
"category": "external",
"summary": "SUSE Bug 1186666 for CVE-2021-3573",
"url": "https://bugzilla.suse.com/1186666"
},
{
"category": "external",
"summary": "SUSE Bug 1187054 for CVE-2021-3573",
"url": "https://bugzilla.suse.com/1187054"
},
{
"category": "external",
"summary": "SUSE Bug 1188172 for CVE-2021-3573",
"url": "https://bugzilla.suse.com/1188172"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-42.2.x86_64",
"SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-42.2.x86_64",
"SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-42.2.x86_64",
"SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-42.1.noarch",
"SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-42.2.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-42.2.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-42.2.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-42.2.x86_64",
"SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-42.1.noarch",
"SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-42.1.x86_64",
"SUSE Real Time Module 15 SP2:lttng-modules-kmp-rt-2.10.10_k5.3.18_42-1.5.1.x86_64",
"SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-42.2.x86_64",
"SUSE Real Time Module 15 SP2:oracleasm-kmp-rt-2.0.8_k5.3.18_42-1.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-42.2.x86_64",
"SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-42.2.x86_64",
"SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-42.2.x86_64",
"SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-42.1.noarch",
"SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-42.2.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-42.2.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-42.2.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-42.2.x86_64",
"SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-42.1.noarch",
"SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-42.1.x86_64",
"SUSE Real Time Module 15 SP2:lttng-modules-kmp-rt-2.10.10_k5.3.18_42-1.5.1.x86_64",
"SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-42.2.x86_64",
"SUSE Real Time Module 15 SP2:oracleasm-kmp-rt-2.0.8_k5.3.18_42-1.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-21T09:26:47Z",
"details": "important"
}
],
"title": "CVE-2021-3573"
}
]
}
suse-su-2021:2451-1
Vulnerability from csaf_suse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel",
"title": "Title of the patch"
},
{
"category": "description",
"text": "The SUSE Linux Enterprise 12 SP3 kernel was updated to receive various security and bugfixes.\n\nThe following security bugs were fixed:\n\n- CVE-2021-22555: Fixed an heap out-of-bounds write in net/netfilter/x_tables.c that could allow local provilege escalation. (bsc#1188116)\n- CVE-2021-33909: Fixed an out-of-bounds write in the filesystem layer that allows to obtain full root privileges. (bsc#1188062)\n- CVE-2021-3609: Fixed a race condition in the CAN BCM networking protocol which allows for local privilege escalation. (bsc#1187215)\n- CVE-2021-0605: Fixed an out-of-bounds read which could lead to local information disclosure in the kernel with System execution privileges needed. (bsc#1187601)\n- CVE-2021-0512: Fixed a possible out-of-bounds write which could lead to local escalation of privilege with no additional execution privileges needed. (bsc#1187595)\n- CVE-2021-34693: Fixed a bug in net/can/bcm.c which could allow local users to obtain sensitive information from kernel stack memory because parts of a data structure are uninitialized. (bsc#1187452)\n- CVE-2020-36385: Fixed a use-after-free flaw in ucma.c which allows for local privilege escalation. (bsc#1187050)\n- CVE-2021-0129: Fixed an improper access control in BlueZ that may have allowed an authenticated user to potentially enable information disclosure via adjacent access. (bsc#1186463)\n- CVE-2020-26558: Fixed a flaw in the Bluetooth LE and BR/EDR secure pairing that could permit a nearby man-in-the-middle attacker to identify the Passkey used during pairing. (bsc#1179610)\n- CVE-2020-36386: Fixed an out-of-bounds read in hci_extended_inquiry_result_evt. (bsc#1187038)\n- CVE-2020-24588: Fixed a bug that could allow an adversary to abuse devices that support receiving non-SSP A-MSDU frames to inject arbitrary network packets. (bsc#1185861)\n- CVE-2021-32399: Fixed a race condition in net/bluetooth/hci_request.c for removal of the HCI controller. (bsc#1184611)\n- CVE-2021-33034: Fixed an issue in net/bluetooth/hci_event.c where a use-after-free leads to writing an arbitrary value. (bsc#1186111)\n- CVE-2020-26139: Fixed a bug that allows an Access Point (AP) to forward EAPOL frames to other clients even though the sender has not yet successfully authenticated. This might be abused in projected Wi-Fi networks to launch denial-of-service attacks against connected clients and made it easier to exploit other vulnerabilities in connected clients. (bsc#1186062)\n- CVE-2021-23134: Fixed a use After Free vulnerability in nfc sockets which allows local attackers to elevate their privileges. (bsc#1186060)\n- CVE-2020-24586: Fixed a bug that, under the right circumstances, allows to inject arbitrary network packets and/or exfiltrate user data when another device sends fragmented frames encrypted using WEP, CCMP, or GCMP. (bsc#1185859)\n- CVE-2020-26141: Fixed a flaw that could allows an adversary to inject and possibly decrypt packets in WPA or WPA2 networks that support the TKIP data-confidentiality protocol. (bsc#1185987)\n- CVE-2020-26145: Fixed a bug in the WEP, WPA, WPA2, and WPA3 implementations that could allows an adversary to inject arbitrary network packets. (bsc#1185860)\n- CVE-2020-24587: Fixed a bug that allows an adversary to decrypt selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP encryption key is periodically renewed. (bsc#1185862)\n- CVE-2020-26147: Fixed a bug in the WEP, WPA, WPA2, and WPA3 implementations that could allows an adversary to inject packets and/or exfiltrate selected fragments when another device sends fragmented frames. (bsc#1185987)\n\nThe following non-security bugs were fixed:\n\n- Bluetooth: SMP: Fail if remote and local public keys are identical (git-fixes).\n- Drivers: hv: vmbus: Increase wait time for VMbus unload (bsc#1185724).\n- Drivers: hv: vmbus: Initialize unload_event statically (bsc#1185724).\n- hv_netvsc: Add handlers for ethtool get/set msg level (bsc#1175462).\n- hv_netvsc: avoid retry on send during shutdown (bsc#1175462).\n- hv_netvsc: avoid unnecessary wakeups on subchannel creation (bsc#1175462).\n- hv_netvsc: cancel subchannel setup before halting device (bsc#1175462).\n- hv_netvsc: change GPAD teardown order on older versions (bsc#1175462).\n- hv_netvsc: common detach logic (bsc#1175462).\n- hv_netvsc: delay setup of VF device (bsc#1175462).\n- hv_netvsc: disable NAPI before channel close (bsc#1175462).\n- hv_netvsc: Ensure correct teardown message sequence order (bsc#1175462).\n- hv_netvsc: Fix a deadlock by getting rtnl lock earlier in netvsc_probe() (bsc#1175462).\n- hv_netvsc: Fix a network regression after ifdown/ifup (bsc#1175462).\n- hv_netvsc: fix deadlock on hotplug (bsc#1175462).\n- hv_netvsc: Fix error handling in netvsc_attach() (bsc#1175462).\n- hv_netvsc: fix error unwind handling if vmbus_open fails (bsc#1175462).\n- hv_netvsc: Fix extra rcu_read_unlock in netvsc_recv_callback() (bsc#1175462).\n- hv_netvsc: fix handling of fallback to single queue mode (bsc#1175462).\n- hv_netvsc: Fix hash key value reset after other ops (bsc#1175462).\n- hv_netvsc: Fix IP header checksum for coalesced packets (bsc#1175462).\n- hv_netvsc: Fix net device attach on older Windows hosts (bsc#1175462).\n- hv_netvsc: fix network namespace issues with VF support (bsc#1175462).\n- hv_netvsc: Fix NULL dereference at single queue mode fallback (bsc#1175462).\n- hv_netvsc: fix race during initialization (bsc#1175462).\n- hv_netvsc: fix race on sub channel creation (bsc#1175462).\n- hv_netvsc: fix race that may miss tx queue wakeup (bsc#1175462).\n- hv_netvsc: fix schedule in RCU context (bsc#1175462).\n- hv_netvsc: Fix the variable sizes in ipsecv2 and rsc offload (bsc#1175462).\n- hv_netvsc: Fix tx_table init in rndis_set_subchannel() (bsc#1175462).\n- hv_netvsc: Fix unwanted wakeup after tx_disable (bsc#1175462).\n- hv_netvsc: Fix unwanted wakeup in netvsc_attach() (bsc#1175462).\n- hv_netvsc: flag software created hash value (bsc#1175462).\n- hv_netvsc: netvsc_teardown_gpadl() split (bsc#1175462).\n- hv_netvsc: only wake transmit queue if link is up (bsc#1175462).\n- hv_netvsc: pass netvsc_device to rndis halt (bsc#1175462).\n- hv_netvsc: preserve hw_features on mtu/channels/ringparam changes (bsc#1175462).\n- hv_netvsc: Refactor assignments of struct netvsc_device_info (bsc#1175462).\n- hv_netvsc: set master device (bsc#1175462).\n- hv_netvsc: Set tx_table to equal weight after subchannels open (bsc#1175462).\n- hv_netvsc: Simplify num_chn checking in rndis_filter_device_add() (bsc#1175462).\n- hv_netvsc: Split netvsc_revoke_buf() and netvsc_teardown_gpadl() (bsc#1175462).\n- hv_netvsc: split sub-channel setup into async and sync (bsc#1175462).\n- hv_netvsc: typo in NDIS RSS parameters structure (bsc#1175462).\n- hv_netvsc: use RCU to fix concurrent rx and queue changes (bsc#1175462).\n- hv_netvsc: use reciprocal divide to speed up percent calculation (bsc#1175462).\n- hv_netvsc: Use Windows version instead of NVSP version on GPAD teardown (bsc#1175462).\n- kgraft: truncate the output from state_show() sysfs attr (bsc#1186235).\n- mm, memory_hotplug: do not clear numa_node association after hot_remove (bsc#1115026).\n- mm: consider __HW_POISON pages when allocating from pcp lists (bsc#1187388).\n- scsi: storvsc: Enable scatterlist entry lengths \u003e 4Kbytes (bsc#1187193).\n- video: hyperv_fb: Add ratelimit on error message (bsc#1185724).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "HPE-Helion-OpenStack-8-2021-2451,SUSE-2021-2451,SUSE-OpenStack-Cloud-8-2021-2451,SUSE-OpenStack-Cloud-Crowbar-8-2021-2451,SUSE-SLE-HA-12-SP3-2021-2451,SUSE-SLE-SAP-12-SP3-2021-2451,SUSE-SLE-SERVER-12-SP3-2021-2451,SUSE-SLE-SERVER-12-SP3-BCL-2021-2451",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2021_2451-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2021:2451-1",
"url": "https://www.suse.com/support/update/announcement/2021/suse-su-20212451-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2021:2451-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2021-July/009203.html"
},
{
"category": "self",
"summary": "SUSE Bug 1115026",
"url": "https://bugzilla.suse.com/1115026"
},
{
"category": "self",
"summary": "SUSE Bug 1175462",
"url": "https://bugzilla.suse.com/1175462"
},
{
"category": "self",
"summary": "SUSE Bug 1179610",
"url": "https://bugzilla.suse.com/1179610"
},
{
"category": "self",
"summary": "SUSE Bug 1184611",
"url": "https://bugzilla.suse.com/1184611"
},
{
"category": "self",
"summary": "SUSE Bug 1185724",
"url": "https://bugzilla.suse.com/1185724"
},
{
"category": "self",
"summary": "SUSE Bug 1185859",
"url": "https://bugzilla.suse.com/1185859"
},
{
"category": "self",
"summary": "SUSE Bug 1185860",
"url": "https://bugzilla.suse.com/1185860"
},
{
"category": "self",
"summary": "SUSE Bug 1185861",
"url": "https://bugzilla.suse.com/1185861"
},
{
"category": "self",
"summary": "SUSE Bug 1185862",
"url": "https://bugzilla.suse.com/1185862"
},
{
"category": "self",
"summary": "SUSE Bug 1185863",
"url": "https://bugzilla.suse.com/1185863"
},
{
"category": "self",
"summary": "SUSE Bug 1185898",
"url": "https://bugzilla.suse.com/1185898"
},
{
"category": "self",
"summary": "SUSE Bug 1185987",
"url": "https://bugzilla.suse.com/1185987"
},
{
"category": "self",
"summary": "SUSE Bug 1186060",
"url": "https://bugzilla.suse.com/1186060"
},
{
"category": "self",
"summary": "SUSE Bug 1186062",
"url": "https://bugzilla.suse.com/1186062"
},
{
"category": "self",
"summary": "SUSE Bug 1186111",
"url": "https://bugzilla.suse.com/1186111"
},
{
"category": "self",
"summary": "SUSE Bug 1186235",
"url": "https://bugzilla.suse.com/1186235"
},
{
"category": "self",
"summary": "SUSE Bug 1186390",
"url": "https://bugzilla.suse.com/1186390"
},
{
"category": "self",
"summary": "SUSE Bug 1186463",
"url": "https://bugzilla.suse.com/1186463"
},
{
"category": "self",
"summary": "SUSE Bug 1187038",
"url": "https://bugzilla.suse.com/1187038"
},
{
"category": "self",
"summary": "SUSE Bug 1187050",
"url": "https://bugzilla.suse.com/1187050"
},
{
"category": "self",
"summary": "SUSE Bug 1187193",
"url": "https://bugzilla.suse.com/1187193"
},
{
"category": "self",
"summary": "SUSE Bug 1187215",
"url": "https://bugzilla.suse.com/1187215"
},
{
"category": "self",
"summary": "SUSE Bug 1187388",
"url": "https://bugzilla.suse.com/1187388"
},
{
"category": "self",
"summary": "SUSE Bug 1187452",
"url": "https://bugzilla.suse.com/1187452"
},
{
"category": "self",
"summary": "SUSE Bug 1187595",
"url": "https://bugzilla.suse.com/1187595"
},
{
"category": "self",
"summary": "SUSE Bug 1187601",
"url": "https://bugzilla.suse.com/1187601"
},
{
"category": "self",
"summary": "SUSE Bug 1187934",
"url": "https://bugzilla.suse.com/1187934"
},
{
"category": "self",
"summary": "SUSE Bug 1188062",
"url": "https://bugzilla.suse.com/1188062"
},
{
"category": "self",
"summary": "SUSE Bug 1188063",
"url": "https://bugzilla.suse.com/1188063"
},
{
"category": "self",
"summary": "SUSE Bug 1188116",
"url": "https://bugzilla.suse.com/1188116"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-24586 page",
"url": "https://www.suse.com/security/cve/CVE-2020-24586/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-24587 page",
"url": "https://www.suse.com/security/cve/CVE-2020-24587/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-24588 page",
"url": "https://www.suse.com/security/cve/CVE-2020-24588/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-26139 page",
"url": "https://www.suse.com/security/cve/CVE-2020-26139/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-26141 page",
"url": "https://www.suse.com/security/cve/CVE-2020-26141/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-26145 page",
"url": "https://www.suse.com/security/cve/CVE-2020-26145/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-26147 page",
"url": "https://www.suse.com/security/cve/CVE-2020-26147/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-26558 page",
"url": "https://www.suse.com/security/cve/CVE-2020-26558/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-36385 page",
"url": "https://www.suse.com/security/cve/CVE-2020-36385/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-36386 page",
"url": "https://www.suse.com/security/cve/CVE-2020-36386/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-0129 page",
"url": "https://www.suse.com/security/cve/CVE-2021-0129/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-0512 page",
"url": "https://www.suse.com/security/cve/CVE-2021-0512/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-0605 page",
"url": "https://www.suse.com/security/cve/CVE-2021-0605/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-22555 page",
"url": "https://www.suse.com/security/cve/CVE-2021-22555/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-23134 page",
"url": "https://www.suse.com/security/cve/CVE-2021-23134/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-32399 page",
"url": "https://www.suse.com/security/cve/CVE-2021-32399/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-33034 page",
"url": "https://www.suse.com/security/cve/CVE-2021-33034/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-33909 page",
"url": "https://www.suse.com/security/cve/CVE-2021-33909/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-34693 page",
"url": "https://www.suse.com/security/cve/CVE-2021-34693/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3609 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3609/"
}
],
"title": "Security update for the Linux Kernel",
"tracking": {
"current_release_date": "2021-07-22T11:16:06Z",
"generator": {
"date": "2021-07-22T11:16:06Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2021:2451-1",
"initial_release_date": "2021-07-22T11:16:06Z",
"revision_history": [
{
"date": "2021-07-22T11:16:06Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-4.4.180-94.147.1.aarch64",
"product": {
"name": "cluster-md-kmp-default-4.4.180-94.147.1.aarch64",
"product_id": "cluster-md-kmp-default-4.4.180-94.147.1.aarch64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-4.4.180-94.147.1.aarch64",
"product": {
"name": "dlm-kmp-default-4.4.180-94.147.1.aarch64",
"product_id": "dlm-kmp-default-4.4.180-94.147.1.aarch64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-4.4.180-94.147.1.aarch64",
"product": {
"name": "gfs2-kmp-default-4.4.180-94.147.1.aarch64",
"product_id": "gfs2-kmp-default-4.4.180-94.147.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-4.4.180-94.147.1.aarch64",
"product": {
"name": "kernel-default-4.4.180-94.147.1.aarch64",
"product_id": "kernel-default-4.4.180-94.147.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-4.4.180-94.147.1.aarch64",
"product": {
"name": "kernel-default-base-4.4.180-94.147.1.aarch64",
"product_id": "kernel-default-base-4.4.180-94.147.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-4.4.180-94.147.1.aarch64",
"product": {
"name": "kernel-default-devel-4.4.180-94.147.1.aarch64",
"product_id": "kernel-default-devel-4.4.180-94.147.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-4.4.180-94.147.1.aarch64",
"product": {
"name": "kernel-default-extra-4.4.180-94.147.1.aarch64",
"product_id": "kernel-default-extra-4.4.180-94.147.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-kgraft-4.4.180-94.147.1.aarch64",
"product": {
"name": "kernel-default-kgraft-4.4.180-94.147.1.aarch64",
"product_id": "kernel-default-kgraft-4.4.180-94.147.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-4.4.180-94.147.1.aarch64",
"product": {
"name": "kernel-obs-build-4.4.180-94.147.1.aarch64",
"product_id": "kernel-obs-build-4.4.180-94.147.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-4.4.180-94.147.1.aarch64",
"product": {
"name": "kernel-obs-qa-4.4.180-94.147.1.aarch64",
"product_id": "kernel-obs-qa-4.4.180-94.147.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-syms-4.4.180-94.147.1.aarch64",
"product": {
"name": "kernel-syms-4.4.180-94.147.1.aarch64",
"product_id": "kernel-syms-4.4.180-94.147.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-4.4.180-94.147.1.aarch64",
"product": {
"name": "kernel-vanilla-4.4.180-94.147.1.aarch64",
"product_id": "kernel-vanilla-4.4.180-94.147.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-base-4.4.180-94.147.1.aarch64",
"product": {
"name": "kernel-vanilla-base-4.4.180-94.147.1.aarch64",
"product_id": "kernel-vanilla-base-4.4.180-94.147.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-devel-4.4.180-94.147.1.aarch64",
"product": {
"name": "kernel-vanilla-devel-4.4.180-94.147.1.aarch64",
"product_id": "kernel-vanilla-devel-4.4.180-94.147.1.aarch64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-4.4.180-94.147.1.aarch64",
"product": {
"name": "kselftests-kmp-default-4.4.180-94.147.1.aarch64",
"product_id": "kselftests-kmp-default-4.4.180-94.147.1.aarch64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-4.4.180-94.147.1.aarch64",
"product": {
"name": "ocfs2-kmp-default-4.4.180-94.147.1.aarch64",
"product_id": "ocfs2-kmp-default-4.4.180-94.147.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-devel-4.4.180-94.147.1.noarch",
"product": {
"name": "kernel-devel-4.4.180-94.147.1.noarch",
"product_id": "kernel-devel-4.4.180-94.147.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-macros-4.4.180-94.147.1.noarch",
"product": {
"name": "kernel-macros-4.4.180-94.147.1.noarch",
"product_id": "kernel-macros-4.4.180-94.147.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-4.4.180-94.147.1.noarch",
"product": {
"name": "kernel-source-4.4.180-94.147.1.noarch",
"product_id": "kernel-source-4.4.180-94.147.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-docs-4.4.180-94.147.1.noarch",
"product": {
"name": "kernel-docs-4.4.180-94.147.1.noarch",
"product_id": "kernel-docs-4.4.180-94.147.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-docs-html-4.4.180-94.147.1.noarch",
"product": {
"name": "kernel-docs-html-4.4.180-94.147.1.noarch",
"product_id": "kernel-docs-html-4.4.180-94.147.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-docs-pdf-4.4.180-94.147.1.noarch",
"product": {
"name": "kernel-docs-pdf-4.4.180-94.147.1.noarch",
"product_id": "kernel-docs-pdf-4.4.180-94.147.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-vanilla-4.4.180-94.147.1.noarch",
"product": {
"name": "kernel-source-vanilla-4.4.180-94.147.1.noarch",
"product_id": "kernel-source-vanilla-4.4.180-94.147.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-debug-4.4.180-94.147.1.ppc64le",
"product": {
"name": "cluster-md-kmp-debug-4.4.180-94.147.1.ppc64le",
"product_id": "cluster-md-kmp-debug-4.4.180-94.147.1.ppc64le"
}
},
{
"category": "product_version",
"name": "cluster-md-kmp-default-4.4.180-94.147.1.ppc64le",
"product": {
"name": "cluster-md-kmp-default-4.4.180-94.147.1.ppc64le",
"product_id": "cluster-md-kmp-default-4.4.180-94.147.1.ppc64le"
}
},
{
"category": "product_version",
"name": "dlm-kmp-debug-4.4.180-94.147.1.ppc64le",
"product": {
"name": "dlm-kmp-debug-4.4.180-94.147.1.ppc64le",
"product_id": "dlm-kmp-debug-4.4.180-94.147.1.ppc64le"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-4.4.180-94.147.1.ppc64le",
"product": {
"name": "dlm-kmp-default-4.4.180-94.147.1.ppc64le",
"product_id": "dlm-kmp-default-4.4.180-94.147.1.ppc64le"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-debug-4.4.180-94.147.1.ppc64le",
"product": {
"name": "gfs2-kmp-debug-4.4.180-94.147.1.ppc64le",
"product_id": "gfs2-kmp-debug-4.4.180-94.147.1.ppc64le"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"product": {
"name": "gfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"product_id": "gfs2-kmp-default-4.4.180-94.147.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-4.4.180-94.147.1.ppc64le",
"product": {
"name": "kernel-debug-4.4.180-94.147.1.ppc64le",
"product_id": "kernel-debug-4.4.180-94.147.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-base-4.4.180-94.147.1.ppc64le",
"product": {
"name": "kernel-debug-base-4.4.180-94.147.1.ppc64le",
"product_id": "kernel-debug-base-4.4.180-94.147.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-4.4.180-94.147.1.ppc64le",
"product": {
"name": "kernel-debug-devel-4.4.180-94.147.1.ppc64le",
"product_id": "kernel-debug-devel-4.4.180-94.147.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-extra-4.4.180-94.147.1.ppc64le",
"product": {
"name": "kernel-debug-extra-4.4.180-94.147.1.ppc64le",
"product_id": "kernel-debug-extra-4.4.180-94.147.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-kgraft-4.4.180-94.147.1.ppc64le",
"product": {
"name": "kernel-debug-kgraft-4.4.180-94.147.1.ppc64le",
"product_id": "kernel-debug-kgraft-4.4.180-94.147.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-4.4.180-94.147.1.ppc64le",
"product": {
"name": "kernel-default-4.4.180-94.147.1.ppc64le",
"product_id": "kernel-default-4.4.180-94.147.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-base-4.4.180-94.147.1.ppc64le",
"product": {
"name": "kernel-default-base-4.4.180-94.147.1.ppc64le",
"product_id": "kernel-default-base-4.4.180-94.147.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-4.4.180-94.147.1.ppc64le",
"product": {
"name": "kernel-default-devel-4.4.180-94.147.1.ppc64le",
"product_id": "kernel-default-devel-4.4.180-94.147.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-4.4.180-94.147.1.ppc64le",
"product": {
"name": "kernel-default-extra-4.4.180-94.147.1.ppc64le",
"product_id": "kernel-default-extra-4.4.180-94.147.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"product": {
"name": "kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"product_id": "kernel-default-kgraft-4.4.180-94.147.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-4.4.180-94.147.1.ppc64le",
"product": {
"name": "kernel-obs-build-4.4.180-94.147.1.ppc64le",
"product_id": "kernel-obs-build-4.4.180-94.147.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-4.4.180-94.147.1.ppc64le",
"product": {
"name": "kernel-obs-qa-4.4.180-94.147.1.ppc64le",
"product_id": "kernel-obs-qa-4.4.180-94.147.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-syms-4.4.180-94.147.1.ppc64le",
"product": {
"name": "kernel-syms-4.4.180-94.147.1.ppc64le",
"product_id": "kernel-syms-4.4.180-94.147.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-4.4.180-94.147.1.ppc64le",
"product": {
"name": "kernel-vanilla-4.4.180-94.147.1.ppc64le",
"product_id": "kernel-vanilla-4.4.180-94.147.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-base-4.4.180-94.147.1.ppc64le",
"product": {
"name": "kernel-vanilla-base-4.4.180-94.147.1.ppc64le",
"product_id": "kernel-vanilla-base-4.4.180-94.147.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-devel-4.4.180-94.147.1.ppc64le",
"product": {
"name": "kernel-vanilla-devel-4.4.180-94.147.1.ppc64le",
"product_id": "kernel-vanilla-devel-4.4.180-94.147.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"product": {
"name": "kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"product_id": "kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-debug-4.4.180-94.147.1.ppc64le",
"product": {
"name": "kselftests-kmp-debug-4.4.180-94.147.1.ppc64le",
"product_id": "kselftests-kmp-debug-4.4.180-94.147.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-4.4.180-94.147.1.ppc64le",
"product": {
"name": "kselftests-kmp-default-4.4.180-94.147.1.ppc64le",
"product_id": "kselftests-kmp-default-4.4.180-94.147.1.ppc64le"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-debug-4.4.180-94.147.1.ppc64le",
"product": {
"name": "ocfs2-kmp-debug-4.4.180-94.147.1.ppc64le",
"product_id": "ocfs2-kmp-debug-4.4.180-94.147.1.ppc64le"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"product": {
"name": "ocfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"product_id": "ocfs2-kmp-default-4.4.180-94.147.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-4.4.180-94.147.1.s390x",
"product": {
"name": "cluster-md-kmp-default-4.4.180-94.147.1.s390x",
"product_id": "cluster-md-kmp-default-4.4.180-94.147.1.s390x"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-4.4.180-94.147.1.s390x",
"product": {
"name": "dlm-kmp-default-4.4.180-94.147.1.s390x",
"product_id": "dlm-kmp-default-4.4.180-94.147.1.s390x"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-4.4.180-94.147.1.s390x",
"product": {
"name": "gfs2-kmp-default-4.4.180-94.147.1.s390x",
"product_id": "gfs2-kmp-default-4.4.180-94.147.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-4.4.180-94.147.1.s390x",
"product": {
"name": "kernel-default-4.4.180-94.147.1.s390x",
"product_id": "kernel-default-4.4.180-94.147.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-base-4.4.180-94.147.1.s390x",
"product": {
"name": "kernel-default-base-4.4.180-94.147.1.s390x",
"product_id": "kernel-default-base-4.4.180-94.147.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-4.4.180-94.147.1.s390x",
"product": {
"name": "kernel-default-devel-4.4.180-94.147.1.s390x",
"product_id": "kernel-default-devel-4.4.180-94.147.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-4.4.180-94.147.1.s390x",
"product": {
"name": "kernel-default-extra-4.4.180-94.147.1.s390x",
"product_id": "kernel-default-extra-4.4.180-94.147.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-kgraft-4.4.180-94.147.1.s390x",
"product": {
"name": "kernel-default-kgraft-4.4.180-94.147.1.s390x",
"product_id": "kernel-default-kgraft-4.4.180-94.147.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-man-4.4.180-94.147.1.s390x",
"product": {
"name": "kernel-default-man-4.4.180-94.147.1.s390x",
"product_id": "kernel-default-man-4.4.180-94.147.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-4.4.180-94.147.1.s390x",
"product": {
"name": "kernel-obs-build-4.4.180-94.147.1.s390x",
"product_id": "kernel-obs-build-4.4.180-94.147.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-4.4.180-94.147.1.s390x",
"product": {
"name": "kernel-obs-qa-4.4.180-94.147.1.s390x",
"product_id": "kernel-obs-qa-4.4.180-94.147.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-syms-4.4.180-94.147.1.s390x",
"product": {
"name": "kernel-syms-4.4.180-94.147.1.s390x",
"product_id": "kernel-syms-4.4.180-94.147.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-4.4.180-94.147.1.s390x",
"product": {
"name": "kernel-vanilla-4.4.180-94.147.1.s390x",
"product_id": "kernel-vanilla-4.4.180-94.147.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-base-4.4.180-94.147.1.s390x",
"product": {
"name": "kernel-vanilla-base-4.4.180-94.147.1.s390x",
"product_id": "kernel-vanilla-base-4.4.180-94.147.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-devel-4.4.180-94.147.1.s390x",
"product": {
"name": "kernel-vanilla-devel-4.4.180-94.147.1.s390x",
"product_id": "kernel-vanilla-devel-4.4.180-94.147.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-4.4.180-94.147.1.s390x",
"product": {
"name": "kernel-zfcpdump-4.4.180-94.147.1.s390x",
"product_id": "kernel-zfcpdump-4.4.180-94.147.1.s390x"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-4.4.180-94.147.1.s390x",
"product": {
"name": "kselftests-kmp-default-4.4.180-94.147.1.s390x",
"product_id": "kselftests-kmp-default-4.4.180-94.147.1.s390x"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-4.4.180-94.147.1.s390x",
"product": {
"name": "ocfs2-kmp-default-4.4.180-94.147.1.s390x",
"product_id": "ocfs2-kmp-default-4.4.180-94.147.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-default-4.4.180-94.147.1.x86_64",
"product": {
"name": "kernel-default-4.4.180-94.147.1.x86_64",
"product_id": "kernel-default-4.4.180-94.147.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-4.4.180-94.147.1.x86_64",
"product": {
"name": "kernel-default-base-4.4.180-94.147.1.x86_64",
"product_id": "kernel-default-base-4.4.180-94.147.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-4.4.180-94.147.1.x86_64",
"product": {
"name": "kernel-default-devel-4.4.180-94.147.1.x86_64",
"product_id": "kernel-default-devel-4.4.180-94.147.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"product": {
"name": "kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"product_id": "kernel-default-kgraft-4.4.180-94.147.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-syms-4.4.180-94.147.1.x86_64",
"product": {
"name": "kernel-syms-4.4.180-94.147.1.x86_64",
"product_id": "kernel-syms-4.4.180-94.147.1.x86_64"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"product": {
"name": "kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"product_id": "kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "cluster-md-kmp-debug-4.4.180-94.147.1.x86_64",
"product": {
"name": "cluster-md-kmp-debug-4.4.180-94.147.1.x86_64",
"product_id": "cluster-md-kmp-debug-4.4.180-94.147.1.x86_64"
}
},
{
"category": "product_version",
"name": "cluster-md-kmp-default-4.4.180-94.147.1.x86_64",
"product": {
"name": "cluster-md-kmp-default-4.4.180-94.147.1.x86_64",
"product_id": "cluster-md-kmp-default-4.4.180-94.147.1.x86_64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-debug-4.4.180-94.147.1.x86_64",
"product": {
"name": "dlm-kmp-debug-4.4.180-94.147.1.x86_64",
"product_id": "dlm-kmp-debug-4.4.180-94.147.1.x86_64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-4.4.180-94.147.1.x86_64",
"product": {
"name": "dlm-kmp-default-4.4.180-94.147.1.x86_64",
"product_id": "dlm-kmp-default-4.4.180-94.147.1.x86_64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-debug-4.4.180-94.147.1.x86_64",
"product": {
"name": "gfs2-kmp-debug-4.4.180-94.147.1.x86_64",
"product_id": "gfs2-kmp-debug-4.4.180-94.147.1.x86_64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-4.4.180-94.147.1.x86_64",
"product": {
"name": "gfs2-kmp-default-4.4.180-94.147.1.x86_64",
"product_id": "gfs2-kmp-default-4.4.180-94.147.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-4.4.180-94.147.1.x86_64",
"product": {
"name": "kernel-debug-4.4.180-94.147.1.x86_64",
"product_id": "kernel-debug-4.4.180-94.147.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-base-4.4.180-94.147.1.x86_64",
"product": {
"name": "kernel-debug-base-4.4.180-94.147.1.x86_64",
"product_id": "kernel-debug-base-4.4.180-94.147.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-4.4.180-94.147.1.x86_64",
"product": {
"name": "kernel-debug-devel-4.4.180-94.147.1.x86_64",
"product_id": "kernel-debug-devel-4.4.180-94.147.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-extra-4.4.180-94.147.1.x86_64",
"product": {
"name": "kernel-debug-extra-4.4.180-94.147.1.x86_64",
"product_id": "kernel-debug-extra-4.4.180-94.147.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-kgraft-4.4.180-94.147.1.x86_64",
"product": {
"name": "kernel-debug-kgraft-4.4.180-94.147.1.x86_64",
"product_id": "kernel-debug-kgraft-4.4.180-94.147.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-4.4.180-94.147.1.x86_64",
"product": {
"name": "kernel-default-extra-4.4.180-94.147.1.x86_64",
"product_id": "kernel-default-extra-4.4.180-94.147.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-4.4.180-94.147.1.x86_64",
"product": {
"name": "kernel-obs-build-4.4.180-94.147.1.x86_64",
"product_id": "kernel-obs-build-4.4.180-94.147.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-4.4.180-94.147.1.x86_64",
"product": {
"name": "kernel-obs-qa-4.4.180-94.147.1.x86_64",
"product_id": "kernel-obs-qa-4.4.180-94.147.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-4.4.180-94.147.1.x86_64",
"product": {
"name": "kernel-vanilla-4.4.180-94.147.1.x86_64",
"product_id": "kernel-vanilla-4.4.180-94.147.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-base-4.4.180-94.147.1.x86_64",
"product": {
"name": "kernel-vanilla-base-4.4.180-94.147.1.x86_64",
"product_id": "kernel-vanilla-base-4.4.180-94.147.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-devel-4.4.180-94.147.1.x86_64",
"product": {
"name": "kernel-vanilla-devel-4.4.180-94.147.1.x86_64",
"product_id": "kernel-vanilla-devel-4.4.180-94.147.1.x86_64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-debug-4.4.180-94.147.1.x86_64",
"product": {
"name": "kselftests-kmp-debug-4.4.180-94.147.1.x86_64",
"product_id": "kselftests-kmp-debug-4.4.180-94.147.1.x86_64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-4.4.180-94.147.1.x86_64",
"product": {
"name": "kselftests-kmp-default-4.4.180-94.147.1.x86_64",
"product_id": "kselftests-kmp-default-4.4.180-94.147.1.x86_64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-debug-4.4.180-94.147.1.x86_64",
"product": {
"name": "ocfs2-kmp-debug-4.4.180-94.147.1.x86_64",
"product_id": "ocfs2-kmp-debug-4.4.180-94.147.1.x86_64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-4.4.180-94.147.1.x86_64",
"product": {
"name": "ocfs2-kmp-default-4.4.180-94.147.1.x86_64",
"product_id": "ocfs2-kmp-default-4.4.180-94.147.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "HPE Helion OpenStack 8",
"product": {
"name": "HPE Helion OpenStack 8",
"product_id": "HPE Helion OpenStack 8",
"product_identification_helper": {
"cpe": "cpe:/o:suse:hpe-helion-openstack:8"
}
}
},
{
"category": "product_name",
"name": "SUSE OpenStack Cloud 8",
"product": {
"name": "SUSE OpenStack Cloud 8",
"product_id": "SUSE OpenStack Cloud 8",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse-openstack-cloud:8"
}
}
},
{
"category": "product_name",
"name": "SUSE OpenStack Cloud Crowbar 8",
"product": {
"name": "SUSE OpenStack Cloud Crowbar 8",
"product_id": "SUSE OpenStack Cloud Crowbar 8",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse-openstack-cloud-crowbar:8"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Availability Extension 12 SP3",
"product": {
"name": "SUSE Linux Enterprise High Availability Extension 12 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-ha:12:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:12:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 12 SP3-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:12:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 12 SP3-BCL",
"product": {
"name": "SUSE Linux Enterprise Server 12 SP3-BCL",
"product_id": "SUSE Linux Enterprise Server 12 SP3-BCL",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-bcl:12:sp3"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.4.180-94.147.1.x86_64 as component of HPE Helion OpenStack 8",
"product_id": "HPE Helion OpenStack 8:kernel-default-4.4.180-94.147.1.x86_64"
},
"product_reference": "kernel-default-4.4.180-94.147.1.x86_64",
"relates_to_product_reference": "HPE Helion OpenStack 8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.4.180-94.147.1.x86_64 as component of HPE Helion OpenStack 8",
"product_id": "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.147.1.x86_64"
},
"product_reference": "kernel-default-base-4.4.180-94.147.1.x86_64",
"relates_to_product_reference": "HPE Helion OpenStack 8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.4.180-94.147.1.x86_64 as component of HPE Helion OpenStack 8",
"product_id": "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.147.1.x86_64"
},
"product_reference": "kernel-default-devel-4.4.180-94.147.1.x86_64",
"relates_to_product_reference": "HPE Helion OpenStack 8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-kgraft-4.4.180-94.147.1.x86_64 as component of HPE Helion OpenStack 8",
"product_id": "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64"
},
"product_reference": "kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"relates_to_product_reference": "HPE Helion OpenStack 8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-4.4.180-94.147.1.noarch as component of HPE Helion OpenStack 8",
"product_id": "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.147.1.noarch"
},
"product_reference": "kernel-devel-4.4.180-94.147.1.noarch",
"relates_to_product_reference": "HPE Helion OpenStack 8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-4.4.180-94.147.1.noarch as component of HPE Helion OpenStack 8",
"product_id": "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.147.1.noarch"
},
"product_reference": "kernel-macros-4.4.180-94.147.1.noarch",
"relates_to_product_reference": "HPE Helion OpenStack 8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-4.4.180-94.147.1.noarch as component of HPE Helion OpenStack 8",
"product_id": "HPE Helion OpenStack 8:kernel-source-4.4.180-94.147.1.noarch"
},
"product_reference": "kernel-source-4.4.180-94.147.1.noarch",
"relates_to_product_reference": "HPE Helion OpenStack 8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.4.180-94.147.1.x86_64 as component of HPE Helion OpenStack 8",
"product_id": "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.147.1.x86_64"
},
"product_reference": "kernel-syms-4.4.180-94.147.1.x86_64",
"relates_to_product_reference": "HPE Helion OpenStack 8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64 as component of HPE Helion OpenStack 8",
"product_id": "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"relates_to_product_reference": "HPE Helion OpenStack 8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.4.180-94.147.1.x86_64 as component of SUSE OpenStack Cloud 8",
"product_id": "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.147.1.x86_64"
},
"product_reference": "kernel-default-4.4.180-94.147.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud 8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.4.180-94.147.1.x86_64 as component of SUSE OpenStack Cloud 8",
"product_id": "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.147.1.x86_64"
},
"product_reference": "kernel-default-base-4.4.180-94.147.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud 8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.4.180-94.147.1.x86_64 as component of SUSE OpenStack Cloud 8",
"product_id": "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.147.1.x86_64"
},
"product_reference": "kernel-default-devel-4.4.180-94.147.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud 8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-kgraft-4.4.180-94.147.1.x86_64 as component of SUSE OpenStack Cloud 8",
"product_id": "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64"
},
"product_reference": "kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud 8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-4.4.180-94.147.1.noarch as component of SUSE OpenStack Cloud 8",
"product_id": "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.147.1.noarch"
},
"product_reference": "kernel-devel-4.4.180-94.147.1.noarch",
"relates_to_product_reference": "SUSE OpenStack Cloud 8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-4.4.180-94.147.1.noarch as component of SUSE OpenStack Cloud 8",
"product_id": "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.147.1.noarch"
},
"product_reference": "kernel-macros-4.4.180-94.147.1.noarch",
"relates_to_product_reference": "SUSE OpenStack Cloud 8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-4.4.180-94.147.1.noarch as component of SUSE OpenStack Cloud 8",
"product_id": "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.147.1.noarch"
},
"product_reference": "kernel-source-4.4.180-94.147.1.noarch",
"relates_to_product_reference": "SUSE OpenStack Cloud 8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.4.180-94.147.1.x86_64 as component of SUSE OpenStack Cloud 8",
"product_id": "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.147.1.x86_64"
},
"product_reference": "kernel-syms-4.4.180-94.147.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud 8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64 as component of SUSE OpenStack Cloud 8",
"product_id": "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud 8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.4.180-94.147.1.x86_64 as component of SUSE OpenStack Cloud Crowbar 8",
"product_id": "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.147.1.x86_64"
},
"product_reference": "kernel-default-4.4.180-94.147.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.4.180-94.147.1.x86_64 as component of SUSE OpenStack Cloud Crowbar 8",
"product_id": "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.147.1.x86_64"
},
"product_reference": "kernel-default-base-4.4.180-94.147.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.4.180-94.147.1.x86_64 as component of SUSE OpenStack Cloud Crowbar 8",
"product_id": "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.147.1.x86_64"
},
"product_reference": "kernel-default-devel-4.4.180-94.147.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-kgraft-4.4.180-94.147.1.x86_64 as component of SUSE OpenStack Cloud Crowbar 8",
"product_id": "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64"
},
"product_reference": "kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-4.4.180-94.147.1.noarch as component of SUSE OpenStack Cloud Crowbar 8",
"product_id": "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.147.1.noarch"
},
"product_reference": "kernel-devel-4.4.180-94.147.1.noarch",
"relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-4.4.180-94.147.1.noarch as component of SUSE OpenStack Cloud Crowbar 8",
"product_id": "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.147.1.noarch"
},
"product_reference": "kernel-macros-4.4.180-94.147.1.noarch",
"relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-4.4.180-94.147.1.noarch as component of SUSE OpenStack Cloud Crowbar 8",
"product_id": "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.147.1.noarch"
},
"product_reference": "kernel-source-4.4.180-94.147.1.noarch",
"relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.4.180-94.147.1.x86_64 as component of SUSE OpenStack Cloud Crowbar 8",
"product_id": "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.147.1.x86_64"
},
"product_reference": "kernel-syms-4.4.180-94.147.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64 as component of SUSE OpenStack Cloud Crowbar 8",
"product_id": "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-4.4.180-94.147.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.ppc64le"
},
"product_reference": "cluster-md-kmp-default-4.4.180-94.147.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-4.4.180-94.147.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.s390x"
},
"product_reference": "cluster-md-kmp-default-4.4.180-94.147.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-4.4.180-94.147.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.x86_64"
},
"product_reference": "cluster-md-kmp-default-4.4.180-94.147.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-4.4.180-94.147.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.ppc64le"
},
"product_reference": "dlm-kmp-default-4.4.180-94.147.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-4.4.180-94.147.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.s390x"
},
"product_reference": "dlm-kmp-default-4.4.180-94.147.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-4.4.180-94.147.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.x86_64"
},
"product_reference": "dlm-kmp-default-4.4.180-94.147.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-4.4.180-94.147.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.ppc64le"
},
"product_reference": "gfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-4.4.180-94.147.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.s390x"
},
"product_reference": "gfs2-kmp-default-4.4.180-94.147.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-4.4.180-94.147.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.x86_64"
},
"product_reference": "gfs2-kmp-default-4.4.180-94.147.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-4.4.180-94.147.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.ppc64le"
},
"product_reference": "ocfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-4.4.180-94.147.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.s390x"
},
"product_reference": "ocfs2-kmp-default-4.4.180-94.147.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-4.4.180-94.147.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.x86_64"
},
"product_reference": "ocfs2-kmp-default-4.4.180-94.147.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.4.180-94.147.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.ppc64le"
},
"product_reference": "kernel-default-4.4.180-94.147.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.4.180-94.147.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.x86_64"
},
"product_reference": "kernel-default-4.4.180-94.147.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.4.180-94.147.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.ppc64le"
},
"product_reference": "kernel-default-base-4.4.180-94.147.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.4.180-94.147.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.x86_64"
},
"product_reference": "kernel-default-base-4.4.180-94.147.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.4.180-94.147.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.ppc64le"
},
"product_reference": "kernel-default-devel-4.4.180-94.147.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.4.180-94.147.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.x86_64"
},
"product_reference": "kernel-default-devel-4.4.180-94.147.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-kgraft-4.4.180-94.147.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.ppc64le"
},
"product_reference": "kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-kgraft-4.4.180-94.147.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.x86_64"
},
"product_reference": "kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-4.4.180-94.147.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.147.1.noarch"
},
"product_reference": "kernel-devel-4.4.180-94.147.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-4.4.180-94.147.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.147.1.noarch"
},
"product_reference": "kernel-macros-4.4.180-94.147.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-4.4.180-94.147.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.147.1.noarch"
},
"product_reference": "kernel-source-4.4.180-94.147.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.4.180-94.147.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.ppc64le"
},
"product_reference": "kernel-syms-4.4.180-94.147.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.4.180-94.147.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.x86_64"
},
"product_reference": "kernel-syms-4.4.180-94.147.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.4.180-94.147.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.aarch64"
},
"product_reference": "kernel-default-4.4.180-94.147.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.4.180-94.147.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.ppc64le"
},
"product_reference": "kernel-default-4.4.180-94.147.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.4.180-94.147.1.s390x as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.s390x"
},
"product_reference": "kernel-default-4.4.180-94.147.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.4.180-94.147.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.x86_64"
},
"product_reference": "kernel-default-4.4.180-94.147.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.4.180-94.147.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.aarch64"
},
"product_reference": "kernel-default-base-4.4.180-94.147.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.4.180-94.147.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.ppc64le"
},
"product_reference": "kernel-default-base-4.4.180-94.147.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.4.180-94.147.1.s390x as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.s390x"
},
"product_reference": "kernel-default-base-4.4.180-94.147.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.4.180-94.147.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.x86_64"
},
"product_reference": "kernel-default-base-4.4.180-94.147.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.4.180-94.147.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.aarch64"
},
"product_reference": "kernel-default-devel-4.4.180-94.147.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.4.180-94.147.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.ppc64le"
},
"product_reference": "kernel-default-devel-4.4.180-94.147.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.4.180-94.147.1.s390x as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.s390x"
},
"product_reference": "kernel-default-devel-4.4.180-94.147.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.4.180-94.147.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.x86_64"
},
"product_reference": "kernel-default-devel-4.4.180-94.147.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-kgraft-4.4.180-94.147.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.ppc64le"
},
"product_reference": "kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-kgraft-4.4.180-94.147.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.x86_64"
},
"product_reference": "kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-man-4.4.180-94.147.1.s390x as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.147.1.s390x"
},
"product_reference": "kernel-default-man-4.4.180-94.147.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-4.4.180-94.147.1.noarch as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.147.1.noarch"
},
"product_reference": "kernel-devel-4.4.180-94.147.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-4.4.180-94.147.1.noarch as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.147.1.noarch"
},
"product_reference": "kernel-macros-4.4.180-94.147.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-4.4.180-94.147.1.noarch as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.147.1.noarch"
},
"product_reference": "kernel-source-4.4.180-94.147.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.4.180-94.147.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.aarch64"
},
"product_reference": "kernel-syms-4.4.180-94.147.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.4.180-94.147.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.ppc64le"
},
"product_reference": "kernel-syms-4.4.180-94.147.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.4.180-94.147.1.s390x as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.s390x"
},
"product_reference": "kernel-syms-4.4.180-94.147.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.4.180-94.147.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.x86_64"
},
"product_reference": "kernel-syms-4.4.180-94.147.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.4.180-94.147.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-BCL",
"product_id": "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.147.1.x86_64"
},
"product_reference": "kernel-default-4.4.180-94.147.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.4.180-94.147.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-BCL",
"product_id": "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.147.1.x86_64"
},
"product_reference": "kernel-default-base-4.4.180-94.147.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.4.180-94.147.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-BCL",
"product_id": "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.147.1.x86_64"
},
"product_reference": "kernel-default-devel-4.4.180-94.147.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-4.4.180-94.147.1.noarch as component of SUSE Linux Enterprise Server 12 SP3-BCL",
"product_id": "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.147.1.noarch"
},
"product_reference": "kernel-devel-4.4.180-94.147.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-4.4.180-94.147.1.noarch as component of SUSE Linux Enterprise Server 12 SP3-BCL",
"product_id": "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.147.1.noarch"
},
"product_reference": "kernel-macros-4.4.180-94.147.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-4.4.180-94.147.1.noarch as component of SUSE Linux Enterprise Server 12 SP3-BCL",
"product_id": "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.147.1.noarch"
},
"product_reference": "kernel-source-4.4.180-94.147.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.4.180-94.147.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-BCL",
"product_id": "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.147.1.x86_64"
},
"product_reference": "kernel-syms-4.4.180-94.147.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-BCL"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2020-24586",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-24586"
}
],
"notes": [
{
"category": "general",
"text": "The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn\u0027t require that received fragments be cleared from memory after (re)connecting to a network. Under the right circumstances, when another device sends fragmented frames encrypted using WEP, CCMP, or GCMP, this can be abused to inject arbitrary network packets and/or exfiltrate user data.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-24586",
"url": "https://www.suse.com/security/cve/CVE-2020-24586"
},
{
"category": "external",
"summary": "SUSE Bug 1185859 for CVE-2020-24586",
"url": "https://bugzilla.suse.com/1185859"
},
{
"category": "external",
"summary": "SUSE Bug 1192868 for CVE-2020-24586",
"url": "https://bugzilla.suse.com/1192868"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-22T11:16:06Z",
"details": "moderate"
}
],
"title": "CVE-2020-24586"
},
{
"cve": "CVE-2020-24587",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-24587"
}
],
"notes": [
{
"category": "general",
"text": "The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn\u0027t require that all fragments of a frame are encrypted under the same key. An adversary can abuse this to decrypt selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP encryption key is periodically renewed.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-24587",
"url": "https://www.suse.com/security/cve/CVE-2020-24587"
},
{
"category": "external",
"summary": "SUSE Bug 1185859 for CVE-2020-24587",
"url": "https://bugzilla.suse.com/1185859"
},
{
"category": "external",
"summary": "SUSE Bug 1185862 for CVE-2020-24587",
"url": "https://bugzilla.suse.com/1185862"
},
{
"category": "external",
"summary": "SUSE Bug 1192868 for CVE-2020-24587",
"url": "https://bugzilla.suse.com/1192868"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-22T11:16:06Z",
"details": "moderate"
}
],
"title": "CVE-2020-24587"
},
{
"cve": "CVE-2020-24588",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-24588"
}
],
"notes": [
{
"category": "general",
"text": "The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn\u0027t require that the A-MSDU flag in the plaintext QoS header field is authenticated. Against devices that support receiving non-SSP A-MSDU frames (which is mandatory as part of 802.11n), an adversary can abuse this to inject arbitrary network packets.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-24588",
"url": "https://www.suse.com/security/cve/CVE-2020-24588"
},
{
"category": "external",
"summary": "SUSE Bug 1185861 for CVE-2020-24588",
"url": "https://bugzilla.suse.com/1185861"
},
{
"category": "external",
"summary": "SUSE Bug 1192868 for CVE-2020-24588",
"url": "https://bugzilla.suse.com/1192868"
},
{
"category": "external",
"summary": "SUSE Bug 1199701 for CVE-2020-24588",
"url": "https://bugzilla.suse.com/1199701"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-22T11:16:06Z",
"details": "moderate"
}
],
"title": "CVE-2020-24588"
},
{
"cve": "CVE-2020-26139",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-26139"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the kernel in NetBSD 7.1. An Access Point (AP) forwards EAPOL frames to other clients even though the sender has not yet successfully authenticated to the AP. This might be abused in projected Wi-Fi networks to launch denial-of-service attacks against connected clients and makes it easier to exploit other vulnerabilities in connected clients.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-26139",
"url": "https://www.suse.com/security/cve/CVE-2020-26139"
},
{
"category": "external",
"summary": "SUSE Bug 1186062 for CVE-2020-26139",
"url": "https://bugzilla.suse.com/1186062"
},
{
"category": "external",
"summary": "SUSE Bug 1192868 for CVE-2020-26139",
"url": "https://bugzilla.suse.com/1192868"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-22T11:16:06Z",
"details": "moderate"
}
],
"title": "CVE-2020-26139"
},
{
"cve": "CVE-2020-26141",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-26141"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the ALFA Windows 10 driver 6.1316.1209 for AWUS036H. The Wi-Fi implementation does not verify the Message Integrity Check (authenticity) of fragmented TKIP frames. An adversary can abuse this to inject and possibly decrypt packets in WPA or WPA2 networks that support the TKIP data-confidentiality protocol.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-26141",
"url": "https://www.suse.com/security/cve/CVE-2020-26141"
},
{
"category": "external",
"summary": "SUSE Bug 1185987 for CVE-2020-26141",
"url": "https://bugzilla.suse.com/1185987"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-22T11:16:06Z",
"details": "moderate"
}
],
"title": "CVE-2020-26141"
},
{
"cve": "CVE-2020-26145",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-26145"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered on Samsung Galaxy S3 i9305 4.4.4 devices. The WEP, WPA, WPA2, and WPA3 implementations accept second (or subsequent) broadcast fragments even when sent in plaintext and process them as full unfragmented frames. An adversary can abuse this to inject arbitrary network packets independent of the network configuration.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-26145",
"url": "https://www.suse.com/security/cve/CVE-2020-26145"
},
{
"category": "external",
"summary": "SUSE Bug 1185860 for CVE-2020-26145",
"url": "https://bugzilla.suse.com/1185860"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-22T11:16:06Z",
"details": "moderate"
}
],
"title": "CVE-2020-26145"
},
{
"cve": "CVE-2020-26147",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-26147"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel 5.8.9. The WEP, WPA, WPA2, and WPA3 implementations reassemble fragments even though some of them were sent in plaintext. This vulnerability can be abused to inject packets and/or exfiltrate selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP data-confidentiality protocol is used.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-26147",
"url": "https://www.suse.com/security/cve/CVE-2020-26147"
},
{
"category": "external",
"summary": "SUSE Bug 1233723 for CVE-2020-26147",
"url": "https://bugzilla.suse.com/1233723"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:L/I:H/A:N",
"version": "3.1"
},
"products": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-22T11:16:06Z",
"details": "moderate"
}
],
"title": "CVE-2020-26147"
},
{
"cve": "CVE-2020-26558",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-26558"
}
],
"notes": [
{
"category": "general",
"text": "Bluetooth LE and BR/EDR secure pairing in Bluetooth Core Specification 2.1 through 5.2 may permit a nearby man-in-the-middle attacker to identify the Passkey used during pairing (in the Passkey authentication procedure) by reflection of the public key and the authentication evidence of the initiating device, potentially permitting this attacker to complete authenticated pairing with the responding device using the correct Passkey for the pairing session. The attack methodology determines the Passkey value one bit at a time.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-26558",
"url": "https://www.suse.com/security/cve/CVE-2020-26558"
},
{
"category": "external",
"summary": "SUSE Bug 1179610 for CVE-2020-26558",
"url": "https://bugzilla.suse.com/1179610"
},
{
"category": "external",
"summary": "SUSE Bug 1186463 for CVE-2020-26558",
"url": "https://bugzilla.suse.com/1186463"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-22T11:16:06Z",
"details": "moderate"
}
],
"title": "CVE-2020-26558"
},
{
"cve": "CVE-2020-36385",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-36385"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel before 5.10. drivers/infiniband/core/ucma.c has a use-after-free because the ctx is reached via the ctx_list in some ucma_migrate_id situations where ucma_close is called, aka CID-f5449e74802c.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-36385",
"url": "https://www.suse.com/security/cve/CVE-2020-36385"
},
{
"category": "external",
"summary": "SUSE Bug 1187050 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1187050"
},
{
"category": "external",
"summary": "SUSE Bug 1187052 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1187052"
},
{
"category": "external",
"summary": "SUSE Bug 1189302 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1189302"
},
{
"category": "external",
"summary": "SUSE Bug 1196174 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1196174"
},
{
"category": "external",
"summary": "SUSE Bug 1196810 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1196810"
},
{
"category": "external",
"summary": "SUSE Bug 1196914 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1196914"
},
{
"category": "external",
"summary": "SUSE Bug 1200084 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1200084"
},
{
"category": "external",
"summary": "SUSE Bug 1201734 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1201734"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-22T11:16:06Z",
"details": "important"
}
],
"title": "CVE-2020-36385"
},
{
"cve": "CVE-2020-36386",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-36386"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel before 5.8.1. net/bluetooth/hci_event.c has a slab out-of-bounds read in hci_extended_inquiry_result_evt, aka CID-51c19bf3d5cf.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-36386",
"url": "https://www.suse.com/security/cve/CVE-2020-36386"
},
{
"category": "external",
"summary": "SUSE Bug 1187038 for CVE-2020-36386",
"url": "https://bugzilla.suse.com/1187038"
},
{
"category": "external",
"summary": "SUSE Bug 1192868 for CVE-2020-36386",
"url": "https://bugzilla.suse.com/1192868"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L",
"version": "3.1"
},
"products": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-22T11:16:06Z",
"details": "moderate"
}
],
"title": "CVE-2020-36386"
},
{
"cve": "CVE-2021-0129",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-0129"
}
],
"notes": [
{
"category": "general",
"text": "Improper access control in BlueZ may allow an authenticated user to potentially enable information disclosure via adjacent access.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-0129",
"url": "https://www.suse.com/security/cve/CVE-2021-0129"
},
{
"category": "external",
"summary": "SUSE Bug 1186463 for CVE-2021-0129",
"url": "https://bugzilla.suse.com/1186463"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-22T11:16:06Z",
"details": "moderate"
}
],
"title": "CVE-2021-0129"
},
{
"cve": "CVE-2021-0512",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-0512"
}
],
"notes": [
{
"category": "general",
"text": "In __hidinput_change_resolution_multipliers of hid-input.c, there is a possible out of bounds write due to a heap buffer overflow. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-173843328References: Upstream kernel",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-0512",
"url": "https://www.suse.com/security/cve/CVE-2021-0512"
},
{
"category": "external",
"summary": "SUSE Bug 1187595 for CVE-2021-0512",
"url": "https://bugzilla.suse.com/1187595"
},
{
"category": "external",
"summary": "SUSE Bug 1187597 for CVE-2021-0512",
"url": "https://bugzilla.suse.com/1187597"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-22T11:16:06Z",
"details": "important"
}
],
"title": "CVE-2021-0512"
},
{
"cve": "CVE-2021-0605",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-0605"
}
],
"notes": [
{
"category": "general",
"text": "In pfkey_dump of af_key.c, there is a possible out-of-bounds read due to a missing bounds check. This could lead to local information disclosure in the kernel with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-110373476",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-0605",
"url": "https://www.suse.com/security/cve/CVE-2021-0605"
},
{
"category": "external",
"summary": "SUSE Bug 1187601 for CVE-2021-0605",
"url": "https://bugzilla.suse.com/1187601"
},
{
"category": "external",
"summary": "SUSE Bug 1187687 for CVE-2021-0605",
"url": "https://bugzilla.suse.com/1187687"
},
{
"category": "external",
"summary": "SUSE Bug 1188381 for CVE-2021-0605",
"url": "https://bugzilla.suse.com/1188381"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-22T11:16:06Z",
"details": "important"
}
],
"title": "CVE-2021-0605"
},
{
"cve": "CVE-2021-22555",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-22555"
}
],
"notes": [
{
"category": "general",
"text": "A heap out-of-bounds write affecting Linux since v2.6.19-rc1 was discovered in net/netfilter/x_tables.c. This allows an attacker to gain privileges or cause a DoS (via heap memory corruption) through user name space",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-22555",
"url": "https://www.suse.com/security/cve/CVE-2021-22555"
},
{
"category": "external",
"summary": "SUSE Bug 1188116 for CVE-2021-22555",
"url": "https://bugzilla.suse.com/1188116"
},
{
"category": "external",
"summary": "SUSE Bug 1188117 for CVE-2021-22555",
"url": "https://bugzilla.suse.com/1188117"
},
{
"category": "external",
"summary": "SUSE Bug 1188411 for CVE-2021-22555",
"url": "https://bugzilla.suse.com/1188411"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-22T11:16:06Z",
"details": "important"
}
],
"title": "CVE-2021-22555"
},
{
"cve": "CVE-2021-23134",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-23134"
}
],
"notes": [
{
"category": "general",
"text": "Use After Free vulnerability in nfc sockets in the Linux Kernel before 5.12.4 allows local attackers to elevate their privileges. In typical configurations, the issue can only be triggered by a privileged local user with the CAP_NET_RAW capability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-23134",
"url": "https://www.suse.com/security/cve/CVE-2021-23134"
},
{
"category": "external",
"summary": "SUSE Bug 1186060 for CVE-2021-23134",
"url": "https://bugzilla.suse.com/1186060"
},
{
"category": "external",
"summary": "SUSE Bug 1186061 for CVE-2021-23134",
"url": "https://bugzilla.suse.com/1186061"
},
{
"category": "external",
"summary": "SUSE Bug 1220739 for CVE-2021-23134",
"url": "https://bugzilla.suse.com/1220739"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-22T11:16:06Z",
"details": "important"
}
],
"title": "CVE-2021-23134"
},
{
"cve": "CVE-2021-32399",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-32399"
}
],
"notes": [
{
"category": "general",
"text": "net/bluetooth/hci_request.c in the Linux kernel through 5.12.2 has a race condition for removal of the HCI controller.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-32399",
"url": "https://www.suse.com/security/cve/CVE-2021-32399"
},
{
"category": "external",
"summary": "SUSE Bug 1184611 for CVE-2021-32399",
"url": "https://bugzilla.suse.com/1184611"
},
{
"category": "external",
"summary": "SUSE Bug 1185898 for CVE-2021-32399",
"url": "https://bugzilla.suse.com/1185898"
},
{
"category": "external",
"summary": "SUSE Bug 1185899 for CVE-2021-32399",
"url": "https://bugzilla.suse.com/1185899"
},
{
"category": "external",
"summary": "SUSE Bug 1196174 for CVE-2021-32399",
"url": "https://bugzilla.suse.com/1196174"
},
{
"category": "external",
"summary": "SUSE Bug 1200084 for CVE-2021-32399",
"url": "https://bugzilla.suse.com/1200084"
},
{
"category": "external",
"summary": "SUSE Bug 1201734 for CVE-2021-32399",
"url": "https://bugzilla.suse.com/1201734"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-22T11:16:06Z",
"details": "important"
}
],
"title": "CVE-2021-32399"
},
{
"cve": "CVE-2021-33034",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-33034"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel before 5.12.4, net/bluetooth/hci_event.c has a use-after-free when destroying an hci_chan, aka CID-5c4c8c954409. This leads to writing an arbitrary value.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-33034",
"url": "https://www.suse.com/security/cve/CVE-2021-33034"
},
{
"category": "external",
"summary": "SUSE Bug 1186111 for CVE-2021-33034",
"url": "https://bugzilla.suse.com/1186111"
},
{
"category": "external",
"summary": "SUSE Bug 1186285 for CVE-2021-33034",
"url": "https://bugzilla.suse.com/1186285"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-22T11:16:06Z",
"details": "important"
}
],
"title": "CVE-2021-33034"
},
{
"cve": "CVE-2021-33909",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-33909"
}
],
"notes": [
{
"category": "general",
"text": "fs/seq_file.c in the Linux kernel 3.16 through 5.13.x before 5.13.4 does not properly restrict seq buffer allocations, leading to an integer overflow, an Out-of-bounds Write, and escalation to root by an unprivileged user, aka CID-8cae8cd89f05.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-33909",
"url": "https://www.suse.com/security/cve/CVE-2021-33909"
},
{
"category": "external",
"summary": "SUSE Bug 1188062 for CVE-2021-33909",
"url": "https://bugzilla.suse.com/1188062"
},
{
"category": "external",
"summary": "SUSE Bug 1188063 for CVE-2021-33909",
"url": "https://bugzilla.suse.com/1188063"
},
{
"category": "external",
"summary": "SUSE Bug 1188257 for CVE-2021-33909",
"url": "https://bugzilla.suse.com/1188257"
},
{
"category": "external",
"summary": "SUSE Bug 1189302 for CVE-2021-33909",
"url": "https://bugzilla.suse.com/1189302"
},
{
"category": "external",
"summary": "SUSE Bug 1190859 for CVE-2021-33909",
"url": "https://bugzilla.suse.com/1190859"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-22T11:16:06Z",
"details": "important"
}
],
"title": "CVE-2021-33909"
},
{
"cve": "CVE-2021-34693",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-34693"
}
],
"notes": [
{
"category": "general",
"text": "net/can/bcm.c in the Linux kernel through 5.12.10 allows local users to obtain sensitive information from kernel stack memory because parts of a data structure are uninitialized.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-34693",
"url": "https://www.suse.com/security/cve/CVE-2021-34693"
},
{
"category": "external",
"summary": "SUSE Bug 1187452 for CVE-2021-34693",
"url": "https://bugzilla.suse.com/1187452"
},
{
"category": "external",
"summary": "SUSE Bug 1192868 for CVE-2021-34693",
"url": "https://bugzilla.suse.com/1192868"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-22T11:16:06Z",
"details": "moderate"
}
],
"title": "CVE-2021-34693"
},
{
"cve": "CVE-2021-3609",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3609"
}
],
"notes": [
{
"category": "general",
"text": ".A flaw was found in the CAN BCM networking protocol in the Linux kernel, where a local attacker can abuse a flaw in the CAN subsystem to corrupt memory, crash the system or escalate privileges. This race condition in net/can/bcm.c in the Linux kernel allows for local privilege escalation to root.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3609",
"url": "https://www.suse.com/security/cve/CVE-2021-3609"
},
{
"category": "external",
"summary": "SUSE Bug 1187215 for CVE-2021-3609",
"url": "https://bugzilla.suse.com/1187215"
},
{
"category": "external",
"summary": "SUSE Bug 1188323 for CVE-2021-3609",
"url": "https://bugzilla.suse.com/1188323"
},
{
"category": "external",
"summary": "SUSE Bug 1188720 for CVE-2021-3609",
"url": "https://bugzilla.suse.com/1188720"
},
{
"category": "external",
"summary": "SUSE Bug 1190276 for CVE-2021-3609",
"url": "https://bugzilla.suse.com/1190276"
},
{
"category": "external",
"summary": "SUSE Bug 1196810 for CVE-2021-3609",
"url": "https://bugzilla.suse.com/1196810"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-22T11:16:06Z",
"details": "moderate"
}
],
"title": "CVE-2021-3609"
}
]
}
suse-su-2021:2321-1
Vulnerability from csaf_suse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel",
"title": "Title of the patch"
},
{
"category": "description",
"text": "The SUSE Linux Enterprise 12 SP5 kernel was updated to receive various security and bugfixes.\n\nThe following security bugs were fixed:\n\n- CVE-2021-33624: Fixed a bug which allows unprivileged BPF program to leak the contents of arbitrary kernel memory (and therefore, of all physical memory) via a side-channel. (bsc#1187554)\n- CVE-2019-25045: Fixed an use-after-free issue in the Linux kernel The XFRM subsystem, related to an xfrm_state_fini panic. (bsc#1187049)\n- CVE-2021-0605: Fixed an out-of-bounds read which could lead to local information disclosure in the kernel with System execution privileges needed. (bsc#1187601)\n- CVE-2021-0512: Fixed a possible out-of-bounds write which could lead to local escalation of privilege with no additional execution privileges needed. (bsc#1187595)\n- CVE-2020-26558: Fixed a flaw in the Bluetooth LE and BR/EDR secure pairing that could permit a nearby man-in-the-middle attacker to identify the Passkey used during pairing. (bsc#1179610)\n- CVE-2021-34693: Fixed a bug in net/can/bcm.c which could allow local users to obtain sensitive information from kernel stack memory because parts of a data structure are uninitialized. (bsc#1187452)\n- CVE-2021-0129: Fixed an improper access control in BlueZ that may have allowed an authenticated user to potentially enable information disclosure via adjacent access. (bsc#1186463)\n- CVE-2020-36386: Fixed an out-of-bounds read in hci_extended_inquiry_result_evt. (bsc#1187038)\n- CVE-2020-24588: Fixed a bug that could allow an adversary to abuse devices that support receiving non-SSP A-MSDU frames to inject arbitrary network packets. (bsc#1185861)\n\nThe following non-security bugs were fixed:\n\n- ALSA: timer: Fix master timer notification (git-fixes).\n- alx: Fix an error handling path in \u0027alx_probe()\u0027 (git-fixes).\n- ASoC: sti-sas: add missing MODULE_DEVICE_TABLE (git-fixes).\n- batman-adv: Avoid WARN_ON timing related checks (git-fixes).\n- blk-mq: Swap two calls in blk_mq_exit_queue() (bsc#1187453).\n- blk-wbt: Fix missed wakeup (bsc#1186627).\n- block: Discard page cache of zone reset target range (bsc#1187402).\n- Bluetooth: fix the erroneous flush_work() order (git-fixes).\n- Bluetooth: use correct lock to prevent UAF of hdev object (git-fixes).\n- btrfs: account for new extents being deleted in total_bytes_pinned (bsc#1135481).\n- btrfs: add a comment explaining the data flush steps (bsc#1135481).\n- btrfs: add btrfs_reserve_data_bytes and use it (bsc#1135481).\n- btrfs: add flushing states for handling data reservations (bsc#1135481).\n- btrfs: add missing error handling after doing leaf/node binary search (bsc#1187833).\n- btrfs: add the data transaction commit logic into may_commit_transaction (bsc#1135481).\n- btrfs: call btrfs_try_granting_tickets when freeing reserved bytes (bsc#1135481).\n- btrfs: call btrfs_try_granting_tickets when reserving space (bsc#1135481).\n- btrfs: call btrfs_try_granting_tickets when unpinning anything (bsc#1135481).\n- btrfs: change insert_dirty_subvol to return errors (bsc#1187833).\n- btrfs: change nr to u64 in btrfs_start_delalloc_roots (bsc#1135481).\n- btrfs: check record_root_in_trans related failures in select_reloc_root (bsc#1187833).\n- btrfs: check return value of btrfs_commit_transaction in relocation (bsc#1187833).\n- btrfs: check tickets after waiting on ordered extents (bsc#1135481).\n- btrfs: cleanup error handling in prepare_to_merge (bsc#1187833).\n- btrfs: convert BUG_ON()\u0027s in relocate_tree_block (bsc#1187833).\n- btrfs: convert BUG_ON()\u0027s in select_reloc_root() to proper errors (bsc#1187833).\n- btrfs: convert logic BUG_ON()\u0027s in replace_path to ASSERT()\u0027s (bsc#1187833).\n- btrfs: convert some BUG_ON()\u0027s to ASSERT()\u0027s in do_relocation (bsc#1187833).\n- btrfs: do async reclaim for data reservations (bsc#1135481).\n- btrfs: do not force commit if we are data (bsc#1135481).\n- btrfs: do not leak reloc root if we fail to read the fs root (bsc#1187833).\n- btrfs: do not make defrag wait on async_delalloc_pages (bsc#1135481).\n- btrfs: do not panic in __add_reloc_root (bsc#1187833).\n- btrfs: do proper error handling in btrfs_update_reloc_root (bsc#1187833).\n- btrfs: do proper error handling in create_reloc_inode (bsc#1187833).\n- btrfs: do proper error handling in create_reloc_root (bsc#1187833).\n- btrfs: do proper error handling in merge_reloc_roots (bsc#1187833).\n- btrfs: do proper error handling in record_reloc_root_in_trans (bsc#1187833).\n- btrfs: drop the commit_cycles stuff for data reservations (bsc#1135481).\n- btrfs: fix possible infinite loop in data async reclaim (bsc#1135481).\n- btrfs: flush delayed refs when trying to reserve data space (bsc#1135481).\n- btrfs: handle __add_reloc_root failures in btrfs_recover_relocation (bsc#1187833).\n- btrfs: handle btrfs_cow_block errors in replace_path (bsc#1187833).\n- btrfs: handle btrfs_record_root_in_trans failure in btrfs_recover_log_trees (bsc#1187833).\n- btrfs: handle btrfs_record_root_in_trans failure in btrfs_rename (bsc#1187833).\n- btrfs: handle btrfs_record_root_in_trans failure in btrfs_rename_exchange (bsc#1187833).\n- btrfs: handle btrfs_record_root_in_trans failure in create_subvol (bsc#1187833).\n- btrfs: handle btrfs_record_root_in_trans failure in relocate_tree_block (bsc#1187833).\n- btrfs: handle btrfs_record_root_in_trans failure in start_transaction (bsc#1187833).\n- btrfs: handle btrfs_search_slot failure in replace_path (bsc#1187833).\n- btrfs: handle btrfs_update_reloc_root failure in commit_fs_roots (bsc#1187833).\n- btrfs: handle btrfs_update_reloc_root failure in insert_dirty_subvol (bsc#1187833).\n- btrfs: handle btrfs_update_reloc_root failure in prepare_to_merge (bsc#1187833).\n- btrfs: handle errors from select_reloc_root() (bsc#1187833).\n- btrfs: handle errors in reference count manipulation in replace_path (bsc#1187833).\n- btrfs: handle extent corruption with select_one_root properly (bsc#1187833).\n- btrfs: handle extent reference errors in do_relocation (bsc#1187833).\n- btrfs: handle record_root_in_trans failure in btrfs_record_root_in_trans (bsc#1187833).\n- btrfs: handle record_root_in_trans failure in create_pending_snapshot (bsc#1187833).\n- btrfs: handle record_root_in_trans failure in qgroup_account_snapshot (bsc#1187833).\n- btrfs: handle space_info::total_bytes_pinned inside the delayed ref itself (bsc#1135481).\n- btrfs: handle U64_MAX for shrink_delalloc (bsc#1135481).\n- btrfs: have proper error handling in btrfs_init_reloc_root (bsc#1187833).\n- btrfs: make ALLOC_CHUNK use the space info flags (bsc#1135481).\n- btrfs: make shrink_delalloc take space_info as an arg (bsc#1135481).\n- btrfs: reloc: clean dirty subvols if we fail to start a transaction (bsc#1187833).\n- btrfs: remove err variable from do_relocation (bsc#1187833).\n- btrfs: remove nr_async_bios (bsc#1135481).\n- btrfs: remove nr_async_submits and async_submit_draining (bsc#1135481). Preparation for ticketed data space flushing in btrfs.\n- btrfs: remove orig from shrink_delalloc (bsc#1135481).\n- btrfs: remove the extent item sanity checks in relocate_block_group (bsc#1187833).\n- btrfs: return an error from btrfs_record_root_in_trans (bsc#1187833).\n- btrfs: run delayed iputs before committing the transaction for data (bsc#1135481).\n- btrfs: serialize data reservations if we are flushing (bsc#1135481).\n- btrfs: shrink delalloc pages instead of full inodes (bsc#1135481).\n- btrfs: track ordered bytes instead of just dio ordered bytes (bsc#1135481).\n- btrfs: tree-checker: check for BTRFS_BLOCK_FLAG_FULL_BACKREF being set improperly (bsc#1187833).\n- btrfs: unset reloc control if we fail to recover (bsc#1187833).\n- btrfs: use btrfs_start_delalloc_roots in shrink_delalloc (bsc#1135481).\n- btrfs: use customized batch size for total_bytes_pinned (bsc#1135481). Turns out using the batched percpu api had an effect on timing w.r.t metadata/data reclaim. So backport this patch as well, side effect is it\u0027s also bringing the code closer to upstream so future backports shall be made easier.\n- btrfs: use tagged writepage to mitigate livelock of snapshot (bsc#1135481). Preparation for introducing ticketed space handling for data space. Due to the sequence of patches, the main patch has embedded in it changes from other patches which remove some unused arguments. This is done to ease backporting itself and shouldn\u0027t have any repercussions on functionality.\n- btrfs: use the btrfs_space_info_free_bytes_may_use helper for delalloc (bsc#1135481).\n- btrfs: use the same helper for data and metadata reservations (bsc#1135481).\n- btrfs: use ticketing for data space reservations (bsc#1135481).\n- btrfs: validate root::reloc_root after recording root in trans (bsc#1187833).\n- can: mcba_usb: fix memory leak in mcba_usb (git-fixes).\n- cgroup1: do not allow \u0027\\n\u0027 in renaming (bsc#1187972).\n- char: hpet: add checks after calling ioremap (git-fixes).\n- cxgb4: avoid accessing registers when clearing filters (bsc#1136345 jsc#SLE-4681).\n- dax: Add a wakeup mode parameter to put_unlocked_entry() (bsc#1187411).\n- dax: Add an enum for specifying dax wakup mode (bsc#1187411).\n- dax: Wake up all waiters after invalidating dax entry (bsc#1187411).\n- dmaengine: pl330: fix wrong usage of spinlock flags in dma_cyclc (git-fixes).\n- dmaengine: QCOM_HIDMA_MGMT depends on HAS_IOMEM (git-fixes).\n- dmaengine: qcom_hidma: comment platform_driver_register call (git-fixes).\n- dmaengine: stedma40: add missing iounmap() on error in d40_probe() (git-fixes).\n- drbd: Remove uninitialized_var() usage (bsc#1186515).\n- drivers: video: fbcon: fix NULL dereference in fbcon_cursor() (bsc#1129770) Backporting changes: * move from driver/video/fbdev/core to driver/video/console * context changes\n- drm: Fix use-after-free read in drm_getunique() (git-fixes).\n- drm: Lock pointer access in drm_master_release() (git-fixes).\n- drm/amdgpu: Fix a use-after-free (git-fixes).\n- efi: Allow EFI_MEMORY_XP and EFI_MEMORY_RO both to be cleared (git-fixes).\n- efi: cper: fix snprintf() use in cper_dimm_err_location() (git-fixes).\n- ext4: fix bug on in ext4_es_cache_extent as ext4_split_extent_at failed (bsc#1187408).\n- ext4: fix check to prevent false positive report of incorrect used inodes (bsc#1187404).\n- ext4: fix error code in ext4_commit_super (bsc#1187407).\n- ext4: fix memory leak in ext4_fill_super (bsc#1187409).\n- FCOE: fcoe_wwn_from_mac kABI fix (bsc#1186528).\n- ftrace: Do not blindly read the ip address in ftrace_bug() (git-fixes).\n- ftrace: Free the trampoline when ftrace_startup() fails (git-fixes).\n- HID: pidff: fix error return code in hid_pidff_init() (git-fixes).\n- i2c: mpc: Make use of i2c_recover_bus() (git-fixes).\n- ima: Free IMA measurement buffer after kexec syscall (git-fixes).\n- isdn: mISDN: netjet: Fix crash in nj_probe: (git-fixes).\n- isdn: mISDNinfineon: check/cleanup ioremap failure correctly in setup_io (git-fixes).\n- ixgbe: fix large MTU request from VF (git-fixes).\n- ixgbevf: add correct exception tracing for XDP (bsc#1113994 ).\n- kabi fix for NFSv4.1: Do not rebind to the same source port when reconnecting to the server (bnc#1186264).\n- kernel: kexec_file: fix error return code of kexec_calculate_store_digests() (git-fixes).\n- kthread_worker: split code for canceling the delayed work timer (bsc#1187867).\n- kthread: prevent deadlock when kthread_mod_delayed_work() races with kthread_cancel_delayed_work_sync() (bsc#1187867).\n- libertas: register sysfs groups properly (git-fixes).\n- md: Fix missing unused status line of /proc/mdstat (git-fixes).\n- media: dvb: Add check on sp8870_readreg return (git-fixes).\n- media: gspca: properly check for errors in po1030_probe() (git-fixes).\n- mei: request autosuspend after sending rx flow control (git-fixes).\n- Move nfs backports into sorted section\n- net: bnx2: Fix error return code in bnx2_init_board() (git-fixes).\n- net: dsa: mv88e6xxx: Fix writing to a PHY page (git-fixes).\n- net: fix iteration for sctp transport seq_files (git-fixes).\n- net: hns3: Limiting the scope of vector_ring_chain variable (bsc#1104353).\n- net: netcp: Fix an error message (git-fixes).\n- net: stmmac: ensure that the device has released ownership before reading data (git-fixes).\n- net/nfc/rawsock.c: fix a permission check bug (git-fixes).\n- net/smc: remove device from smcd_dev_list after failed device_add() (git-fixes).\n- nfc: fix NULL ptr dereference in llcp_sock_getname() after failed connect (git-fixes).\n- NFS: Deal correctly with attribute generation counter overflow (git-fixes).\n- NFS: Do not corrupt the value of pg_bytes_written in nfs_do_recoalesce() (git-fixes).\n- NFS: Do not gratuitously clear the inode cache when lookup failed (git-fixes).\n- NFS: Do not revalidate the directory permissions on a lookup failure (git-fixes).\n- NFS: Fix a potential NULL dereference in nfs_get_client() (git-fixes).\n- NFS: fix an incorrect limit in filelayout_decode_layout() (git-fixes).\n- NFS: Fix an Oopsable condition in __nfs_pageio_add_request() (git-fixes).\n- NFS: Repair misuse of sv_lock in 5.10.16-rt30 (git-fixes).\n- NFS: Do not discard segments marked for return in _pnfs_return_layout() (git-fixes).\n- NFS: Fix a NULL pointer dereference in pnfs_mark_matching_lsegs_return() (git-fixes).\n- NFS: Fix v4.0/v4.1 SEEK_DATA return -ENOTSUPP when set NFS_V4_2 config (git-fixes).\n- NFS: nfs4_proc_set_acl needs to restore NFS_CAP_UIDGID_NOMAP on error (git-fixes).\n- NFS: Do not rebind to the same source port when reconnecting to the server (bnc#1186264).\n- NFS: fix handling of sr_eof in SEEK\u0027s reply (git-fixes).\n- NFS: Always flush out writes in nfs42_proc_fallocate() (git-fixes).\n- NFS: fix return value of _nfs4_get_security_label() (git-fixes).\n- ocfs2: fix data corruption by fallocate (bsc#1187412).\n- parisc: parisc-agp requires SBA IOMMU driver (bsc#1129770)\n- pid: take a reference when initializing `cad_pid` (bsc#1114648).\n- platform/x86: hp-wireless: add AMD\u0027s hardware id to the supported list (git-fixes).\n- platform/x86: intel_punit_ipc: Append MODULE_DEVICE_TABLE for ACPI (git-fixes).\n- pNFS/flexfiles: fix incorrect size check in decode_nfs_fh() (git-fixes).\n- pNFS/NFSv4: Fix a layout segment leak in pnfs_layout_process() (git-fixes).\n- qla2xxx: synchronize rport dev_loss_tmo setting (bsc#1182470 bsc#1185486).\n- qlcnic: Add null check after calling netdev_alloc_skb (git-fixes).\n- ravb: fix invalid context bug while calling auto-negotiation by ethtool (git-fixes).\n- ravb: fix invalid context bug while changing link options by ethtool (git-fixes).\n- RDMA/mlx5: Recover from fatal event in dual port mode (bsc#1103991).\n- Revert \u0027ibmvnic: simplify reset_long_term_buff function\u0027 (bsc#1186206 ltc#191041).\n- Revert 337f13046ff0 (\u0027futex: Allow FUTEX_CLOCK_REALTIME with FUTEX_WAIT op\u0027) (git-fixes).\n- s390/stack: fix possible register corruption with stack switch helper (bsc#1185677).\n- scsi: aacraid: Fix an oops in error handling (bsc#1186698).\n- scsi: aacraid: Remove erroneous fallthrough annotation (bsc#1186516).\n- scsi: aacraid: Use memdup_user() as a cleanup (bsc#1186517).\n- scsi: acornscsi: Fix an error handling path in acornscsi_probe() (bsc#1186518).\n- scsi: be2iscsi: Fix a theoretical leak in beiscsi_create_eqs() (bsc#1186519).\n- scsi: be2iscsi: Revert \u0027Fix a theoretical leak in beiscsi_create_eqs()\u0027 (bsc#1186699).\n- scsi: bfa: Fix error return in bfad_pci_init() (bsc#1186520).\n- scsi: bnx2fc: Fix Kconfig warning and CNIC build errors (bsc#1186521).\n- scsi: bnx2i: Requires MMU (bsc#1186522).\n- scsi: csiostor: Fix wrong return value in csio_hw_prep_fw() (bsc#1186523).\n- scsi: cumana_2: Fix different dev_id between request_irq() and free_irq() (bsc#1186524).\n- scsi: cxgb3i: Fix some leaks in init_act_open() (bsc#1186525).\n- scsi: cxgb4i: Fix TLS dependency (bsc#1186526).\n- scsi: eesox: Fix different dev_id between request_irq() and free_irq() (bsc#1186527).\n- scsi: fcoe: Fix mismatched fcoe_wwn_from_mac declaration (bsc#1186528).\n- scsi: fnic: Fix error return code in fnic_probe() (bsc#1186529).\n- scsi: hisi_sas: Fix IRQ checks (bsc#1186530).\n- scsi: hisi_sas: Remove preemptible() (bsc#1186638).\n- scsi: jazz_esp: Add IRQ check (bsc#1186531).\n- scsi: libfc: Fix enum-conversion warning (bsc#1186532).\n- scsi: libsas: Fix error path in sas_notify_lldd_dev_found() (bsc#1186533).\n- scsi: libsas: Reset num_scatter if libata marks qc as NODATA (bsc#1186700).\n- scsi: libsas: Set data_dir as DMA_NONE if libata marks qc as NODATA (bsc#1186534).\n- scsi: lpfc: Fix failure to transmit ABTS on FC link (git-fixes).\n- scsi: megaraid_sas: Check user-provided offsets (bsc#1186535).\n- scsi: megaraid_sas: Fix MEGASAS_IOC_FIRMWARE regression (bsc#1186701).\n- scsi: mesh: Fix panic after host or bus reset (bsc#1186537).\n- scsi: mpt3sas: Fix error return code of mpt3sas_base_attach() (bsc#1186538).\n- scsi: pm80xx: Fix error return in pm8001_pci_probe() (bsc#1186539).\n- scsi: powertec: Fix different dev_id between request_irq() and free_irq() (bsc#1186540).\n- scsi: qedi: Check for buffer overflow in qedi_set_path() (bsc#1186541).\n- scsi: qedi: Fix error return code of qedi_alloc_global_queues() (bsc#1186542).\n- scsi: qedi: Fix missing destroy_workqueue() on error in __qedi_probe (bsc#1186543).\n- scsi: qla4xxx: Fix an error handling path in \u0027qla4xxx_get_host_stats()\u0027 (bsc#1186545).\n- scsi: qla4xxx: Remove in_interrupt() (bsc#1186546).\n- scsi: scsi_debug: Add check for sdebug_max_queue during module init (bsc#1186547).\n- scsi: scsi_dh_alua: Retry RTPG on a different path after failure (bsc#1174978 bsc#1185701).\n- scsi: sd: Fix optimal I/O size for devices that change reported values (bsc#1186548).\n- scsi: sg: add sg_remove_request in sg_write (bsc#1186635).\n- scsi: sni_53c710: Add IRQ check (bsc#1186549).\n- scsi: sun3x_esp: Add IRQ check (bsc#1186550).\n- scsi: ufs-qcom: Fix scheduling while atomic issue (bsc#1186556).\n- scsi: ufs: core: Narrow down fast path in system suspend path (bsc#1186551).\n- scsi: ufs: Do not update urgent bkops level when toggling auto bkops (bsc#1186552).\n- scsi: ufs: Fix imprecise load calculation in devfreq window (bsc#1187630).\n- scsi: ufs: fix ktime_t kabi change (bsc#1187630).\n- scsi: ufs: Fix race between shutdown and runtime resume flow (bsc#1186554).\n- scsi: ufs: Properly release resources if a task is aborted successfully (bsc#1186555).\n- scsi: ufs: ufshcd-pltfrm: Fix deferred probing (bsc#1187631).\n- serial: max310x: unregister uart driver in case of failure and abort (git-fixes).\n- serial: rp2: use \u0027request_firmware\u0027 instead of \u0027request_firmware_nowait\u0027 (git-fixes).\n- staging: rtl8723bs: Fix uninitialized variables (git-fixes).\n- SUNRPC: correct error code comment in xs_tcp_setup_socket() (git-fixes).\n- sunrpc: fix refcount leak for rpc auth modules (git-fixes).\n- SUNRPC: Move fault injection call sites (git-fixes).\n- SUNRPC: prevent port reuse on transports which do not request it (bnc#1186264).\n- svcrdma: disable timeouts on rdma backchannel (git-fixes).\n- swiotlb: fix \u0027x86: Do not panic if can not alloc buffer for swiotlb\u0027 (git-fixes).\n- tls splice: check SPLICE_F_NONBLOCK instead of MSG_DONTWAIT (bsc#1103990).\n- tracing: Correct the length check which causes memory corruption (git-fixes).\n- tracing: Do no increment trace_clock_global() by one (git-fixes).\n- tracing: Restructure trace_clock_global() to never block (git-fixes).\n- ttyprintk: Add TTY hangup callback (git-fixes).\n- ubifs: Only check replay with inode type to judge if inode linked (bsc#1187455).\n- USB: cdc-acm: always claim data interface (git-fixes).\n- USB: cdc-acm: do not log successful probe on later errors (git-fixes).\n- USB: dwc3: ep0: fix NULL pointer exception (git-fixes).\n- USB: pd: Set PD_T_SINK_WAIT_CAP to 310ms (git-fixes).\n- USB: serial: ftdi_sio: add IDs for IDS GmbH Products (git-fixes).\n- USB: serial: ftdi_sio: add NovaTech OrionMX product ID (git-fixes).\n- USB: serial: omninet: add device id for Zyxel Omni 56K Plus (git-fixes).\n- USB: serial: option: add Telit LE910-S1 compositions 0x7010, 0x7011 (git-fixes).\n- USB: serial: pl2303: add device id for ADLINK ND-6530 GC (git-fixes).\n- USB: serial: quatech2: fix control-request directions (git-fixes).\n- USB: serial: ti_usb_3410_5052: add startech.com device id (git-fixes).\n- USB: serial: usb_wwan: fix TIOCSSERIAL jiffies conversions (git-fixes).\n- USB: typec: tcpm: Use LE to CPU conversion when accessing msg-\u003eheader (git-fixes).\n- USB: typec: ucsi: Clear PPM capability data in ucsi_init() error path (git-fixes).\n- USB: typec: ucsi: Put fwnode in any case during -\u003eprobe() (git-fixes).\n- vfio/pci: Fix error return code in vfio_ecap_init() (git-fixes).\n- vfio/pci: zap_vma_ptes() needs MMU (git-fixes).\n- vfio/platform: fix module_put call in error flow (git-fixes).\n- video: hgafb: correctly handle card detect failure during probe (bsc#1129770)\n- video: hgafb: fix potential NULL pointer dereference (bsc#1129770) Backporting changes: * context changes\n- x86: fix seq_file iteration for pat/memtype.c (git-fixes).\n- x86/cpu: Initialize MSR_TSC_AUX if RDTSCP *or* RDPID is supported (bsc#1114648).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2021-2321,SUSE-SLE-SERVER-12-SP5-2021-2321",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2021_2321-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2021:2321-1",
"url": "https://www.suse.com/support/update/announcement/2021/suse-su-20212321-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2021:2321-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2021-July/009132.html"
},
{
"category": "self",
"summary": "SUSE Bug 1103990",
"url": "https://bugzilla.suse.com/1103990"
},
{
"category": "self",
"summary": "SUSE Bug 1103991",
"url": "https://bugzilla.suse.com/1103991"
},
{
"category": "self",
"summary": "SUSE Bug 1104353",
"url": "https://bugzilla.suse.com/1104353"
},
{
"category": "self",
"summary": "SUSE Bug 1113994",
"url": "https://bugzilla.suse.com/1113994"
},
{
"category": "self",
"summary": "SUSE Bug 1114648",
"url": "https://bugzilla.suse.com/1114648"
},
{
"category": "self",
"summary": "SUSE Bug 1129770",
"url": "https://bugzilla.suse.com/1129770"
},
{
"category": "self",
"summary": "SUSE Bug 1135481",
"url": "https://bugzilla.suse.com/1135481"
},
{
"category": "self",
"summary": "SUSE Bug 1136345",
"url": "https://bugzilla.suse.com/1136345"
},
{
"category": "self",
"summary": "SUSE Bug 1174978",
"url": "https://bugzilla.suse.com/1174978"
},
{
"category": "self",
"summary": "SUSE Bug 1179610",
"url": "https://bugzilla.suse.com/1179610"
},
{
"category": "self",
"summary": "SUSE Bug 1182470",
"url": "https://bugzilla.suse.com/1182470"
},
{
"category": "self",
"summary": "SUSE Bug 1185486",
"url": "https://bugzilla.suse.com/1185486"
},
{
"category": "self",
"summary": "SUSE Bug 1185677",
"url": "https://bugzilla.suse.com/1185677"
},
{
"category": "self",
"summary": "SUSE Bug 1185701",
"url": "https://bugzilla.suse.com/1185701"
},
{
"category": "self",
"summary": "SUSE Bug 1185861",
"url": "https://bugzilla.suse.com/1185861"
},
{
"category": "self",
"summary": "SUSE Bug 1185863",
"url": "https://bugzilla.suse.com/1185863"
},
{
"category": "self",
"summary": "SUSE Bug 1186206",
"url": "https://bugzilla.suse.com/1186206"
},
{
"category": "self",
"summary": "SUSE Bug 1186264",
"url": "https://bugzilla.suse.com/1186264"
},
{
"category": "self",
"summary": "SUSE Bug 1186463",
"url": "https://bugzilla.suse.com/1186463"
},
{
"category": "self",
"summary": "SUSE Bug 1186515",
"url": "https://bugzilla.suse.com/1186515"
},
{
"category": "self",
"summary": "SUSE Bug 1186516",
"url": "https://bugzilla.suse.com/1186516"
},
{
"category": "self",
"summary": "SUSE Bug 1186517",
"url": "https://bugzilla.suse.com/1186517"
},
{
"category": "self",
"summary": "SUSE Bug 1186518",
"url": "https://bugzilla.suse.com/1186518"
},
{
"category": "self",
"summary": "SUSE Bug 1186519",
"url": "https://bugzilla.suse.com/1186519"
},
{
"category": "self",
"summary": "SUSE Bug 1186520",
"url": "https://bugzilla.suse.com/1186520"
},
{
"category": "self",
"summary": "SUSE Bug 1186521",
"url": "https://bugzilla.suse.com/1186521"
},
{
"category": "self",
"summary": "SUSE Bug 1186522",
"url": "https://bugzilla.suse.com/1186522"
},
{
"category": "self",
"summary": "SUSE Bug 1186523",
"url": "https://bugzilla.suse.com/1186523"
},
{
"category": "self",
"summary": "SUSE Bug 1186524",
"url": "https://bugzilla.suse.com/1186524"
},
{
"category": "self",
"summary": "SUSE Bug 1186525",
"url": "https://bugzilla.suse.com/1186525"
},
{
"category": "self",
"summary": "SUSE Bug 1186526",
"url": "https://bugzilla.suse.com/1186526"
},
{
"category": "self",
"summary": "SUSE Bug 1186527",
"url": "https://bugzilla.suse.com/1186527"
},
{
"category": "self",
"summary": "SUSE Bug 1186528",
"url": "https://bugzilla.suse.com/1186528"
},
{
"category": "self",
"summary": "SUSE Bug 1186529",
"url": "https://bugzilla.suse.com/1186529"
},
{
"category": "self",
"summary": "SUSE Bug 1186530",
"url": "https://bugzilla.suse.com/1186530"
},
{
"category": "self",
"summary": "SUSE Bug 1186531",
"url": "https://bugzilla.suse.com/1186531"
},
{
"category": "self",
"summary": "SUSE Bug 1186532",
"url": "https://bugzilla.suse.com/1186532"
},
{
"category": "self",
"summary": "SUSE Bug 1186533",
"url": "https://bugzilla.suse.com/1186533"
},
{
"category": "self",
"summary": "SUSE Bug 1186534",
"url": "https://bugzilla.suse.com/1186534"
},
{
"category": "self",
"summary": "SUSE Bug 1186535",
"url": "https://bugzilla.suse.com/1186535"
},
{
"category": "self",
"summary": "SUSE Bug 1186537",
"url": "https://bugzilla.suse.com/1186537"
},
{
"category": "self",
"summary": "SUSE Bug 1186538",
"url": "https://bugzilla.suse.com/1186538"
},
{
"category": "self",
"summary": "SUSE Bug 1186539",
"url": "https://bugzilla.suse.com/1186539"
},
{
"category": "self",
"summary": "SUSE Bug 1186540",
"url": "https://bugzilla.suse.com/1186540"
},
{
"category": "self",
"summary": "SUSE Bug 1186541",
"url": "https://bugzilla.suse.com/1186541"
},
{
"category": "self",
"summary": "SUSE Bug 1186542",
"url": "https://bugzilla.suse.com/1186542"
},
{
"category": "self",
"summary": "SUSE Bug 1186543",
"url": "https://bugzilla.suse.com/1186543"
},
{
"category": "self",
"summary": "SUSE Bug 1186545",
"url": "https://bugzilla.suse.com/1186545"
},
{
"category": "self",
"summary": "SUSE Bug 1186546",
"url": "https://bugzilla.suse.com/1186546"
},
{
"category": "self",
"summary": "SUSE Bug 1186547",
"url": "https://bugzilla.suse.com/1186547"
},
{
"category": "self",
"summary": "SUSE Bug 1186548",
"url": "https://bugzilla.suse.com/1186548"
},
{
"category": "self",
"summary": "SUSE Bug 1186549",
"url": "https://bugzilla.suse.com/1186549"
},
{
"category": "self",
"summary": "SUSE Bug 1186550",
"url": "https://bugzilla.suse.com/1186550"
},
{
"category": "self",
"summary": "SUSE Bug 1186551",
"url": "https://bugzilla.suse.com/1186551"
},
{
"category": "self",
"summary": "SUSE Bug 1186552",
"url": "https://bugzilla.suse.com/1186552"
},
{
"category": "self",
"summary": "SUSE Bug 1186554",
"url": "https://bugzilla.suse.com/1186554"
},
{
"category": "self",
"summary": "SUSE Bug 1186555",
"url": "https://bugzilla.suse.com/1186555"
},
{
"category": "self",
"summary": "SUSE Bug 1186556",
"url": "https://bugzilla.suse.com/1186556"
},
{
"category": "self",
"summary": "SUSE Bug 1186627",
"url": "https://bugzilla.suse.com/1186627"
},
{
"category": "self",
"summary": "SUSE Bug 1186635",
"url": "https://bugzilla.suse.com/1186635"
},
{
"category": "self",
"summary": "SUSE Bug 1186638",
"url": "https://bugzilla.suse.com/1186638"
},
{
"category": "self",
"summary": "SUSE Bug 1186698",
"url": "https://bugzilla.suse.com/1186698"
},
{
"category": "self",
"summary": "SUSE Bug 1186699",
"url": "https://bugzilla.suse.com/1186699"
},
{
"category": "self",
"summary": "SUSE Bug 1186700",
"url": "https://bugzilla.suse.com/1186700"
},
{
"category": "self",
"summary": "SUSE Bug 1186701",
"url": "https://bugzilla.suse.com/1186701"
},
{
"category": "self",
"summary": "SUSE Bug 1187038",
"url": "https://bugzilla.suse.com/1187038"
},
{
"category": "self",
"summary": "SUSE Bug 1187049",
"url": "https://bugzilla.suse.com/1187049"
},
{
"category": "self",
"summary": "SUSE Bug 1187402",
"url": "https://bugzilla.suse.com/1187402"
},
{
"category": "self",
"summary": "SUSE Bug 1187404",
"url": "https://bugzilla.suse.com/1187404"
},
{
"category": "self",
"summary": "SUSE Bug 1187407",
"url": "https://bugzilla.suse.com/1187407"
},
{
"category": "self",
"summary": "SUSE Bug 1187408",
"url": "https://bugzilla.suse.com/1187408"
},
{
"category": "self",
"summary": "SUSE Bug 1187409",
"url": "https://bugzilla.suse.com/1187409"
},
{
"category": "self",
"summary": "SUSE Bug 1187411",
"url": "https://bugzilla.suse.com/1187411"
},
{
"category": "self",
"summary": "SUSE Bug 1187412",
"url": "https://bugzilla.suse.com/1187412"
},
{
"category": "self",
"summary": "SUSE Bug 1187452",
"url": "https://bugzilla.suse.com/1187452"
},
{
"category": "self",
"summary": "SUSE Bug 1187453",
"url": "https://bugzilla.suse.com/1187453"
},
{
"category": "self",
"summary": "SUSE Bug 1187455",
"url": "https://bugzilla.suse.com/1187455"
},
{
"category": "self",
"summary": "SUSE Bug 1187554",
"url": "https://bugzilla.suse.com/1187554"
},
{
"category": "self",
"summary": "SUSE Bug 1187595",
"url": "https://bugzilla.suse.com/1187595"
},
{
"category": "self",
"summary": "SUSE Bug 1187601",
"url": "https://bugzilla.suse.com/1187601"
},
{
"category": "self",
"summary": "SUSE Bug 1187630",
"url": "https://bugzilla.suse.com/1187630"
},
{
"category": "self",
"summary": "SUSE Bug 1187631",
"url": "https://bugzilla.suse.com/1187631"
},
{
"category": "self",
"summary": "SUSE Bug 1187833",
"url": "https://bugzilla.suse.com/1187833"
},
{
"category": "self",
"summary": "SUSE Bug 1187867",
"url": "https://bugzilla.suse.com/1187867"
},
{
"category": "self",
"summary": "SUSE Bug 1187972",
"url": "https://bugzilla.suse.com/1187972"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-25045 page",
"url": "https://www.suse.com/security/cve/CVE-2019-25045/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-24588 page",
"url": "https://www.suse.com/security/cve/CVE-2020-24588/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-26558 page",
"url": "https://www.suse.com/security/cve/CVE-2020-26558/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-36386 page",
"url": "https://www.suse.com/security/cve/CVE-2020-36386/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-0129 page",
"url": "https://www.suse.com/security/cve/CVE-2021-0129/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-0512 page",
"url": "https://www.suse.com/security/cve/CVE-2021-0512/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-0605 page",
"url": "https://www.suse.com/security/cve/CVE-2021-0605/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-33624 page",
"url": "https://www.suse.com/security/cve/CVE-2021-33624/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-34693 page",
"url": "https://www.suse.com/security/cve/CVE-2021-34693/"
}
],
"title": "Security update for the Linux Kernel",
"tracking": {
"current_release_date": "2021-07-14T15:02:17Z",
"generator": {
"date": "2021-07-14T15:02:17Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2021:2321-1",
"initial_release_date": "2021-07-14T15:02:17Z",
"revision_history": [
{
"date": "2021-07-14T15:02:17Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "kernel-devel-azure-4.12.14-16.62.1.noarch",
"product": {
"name": "kernel-devel-azure-4.12.14-16.62.1.noarch",
"product_id": "kernel-devel-azure-4.12.14-16.62.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-azure-4.12.14-16.62.1.noarch",
"product": {
"name": "kernel-source-azure-4.12.14-16.62.1.noarch",
"product_id": "kernel-source-azure-4.12.14-16.62.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-azure-4.12.14-16.62.1.x86_64",
"product": {
"name": "cluster-md-kmp-azure-4.12.14-16.62.1.x86_64",
"product_id": "cluster-md-kmp-azure-4.12.14-16.62.1.x86_64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-azure-4.12.14-16.62.1.x86_64",
"product": {
"name": "dlm-kmp-azure-4.12.14-16.62.1.x86_64",
"product_id": "dlm-kmp-azure-4.12.14-16.62.1.x86_64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-azure-4.12.14-16.62.1.x86_64",
"product": {
"name": "gfs2-kmp-azure-4.12.14-16.62.1.x86_64",
"product_id": "gfs2-kmp-azure-4.12.14-16.62.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-azure-4.12.14-16.62.1.x86_64",
"product": {
"name": "kernel-azure-4.12.14-16.62.1.x86_64",
"product_id": "kernel-azure-4.12.14-16.62.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-azure-base-4.12.14-16.62.1.x86_64",
"product": {
"name": "kernel-azure-base-4.12.14-16.62.1.x86_64",
"product_id": "kernel-azure-base-4.12.14-16.62.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-azure-devel-4.12.14-16.62.1.x86_64",
"product": {
"name": "kernel-azure-devel-4.12.14-16.62.1.x86_64",
"product_id": "kernel-azure-devel-4.12.14-16.62.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-azure-extra-4.12.14-16.62.1.x86_64",
"product": {
"name": "kernel-azure-extra-4.12.14-16.62.1.x86_64",
"product_id": "kernel-azure-extra-4.12.14-16.62.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-azure-kgraft-devel-4.12.14-16.62.1.x86_64",
"product": {
"name": "kernel-azure-kgraft-devel-4.12.14-16.62.1.x86_64",
"product_id": "kernel-azure-kgraft-devel-4.12.14-16.62.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-syms-azure-4.12.14-16.62.1.x86_64",
"product": {
"name": "kernel-syms-azure-4.12.14-16.62.1.x86_64",
"product_id": "kernel-syms-azure-4.12.14-16.62.1.x86_64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-azure-4.12.14-16.62.1.x86_64",
"product": {
"name": "kselftests-kmp-azure-4.12.14-16.62.1.x86_64",
"product_id": "kselftests-kmp-azure-4.12.14-16.62.1.x86_64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-azure-4.12.14-16.62.1.x86_64",
"product": {
"name": "ocfs2-kmp-azure-4.12.14-16.62.1.x86_64",
"product_id": "ocfs2-kmp-azure-4.12.14-16.62.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 12 SP5",
"product": {
"name": "SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles:12:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:12:sp5"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-azure-4.12.14-16.62.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.62.1.x86_64"
},
"product_reference": "kernel-azure-4.12.14-16.62.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-azure-base-4.12.14-16.62.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.62.1.x86_64"
},
"product_reference": "kernel-azure-base-4.12.14-16.62.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-azure-devel-4.12.14-16.62.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.62.1.x86_64"
},
"product_reference": "kernel-azure-devel-4.12.14-16.62.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-azure-4.12.14-16.62.1.noarch as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.62.1.noarch"
},
"product_reference": "kernel-devel-azure-4.12.14-16.62.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-azure-4.12.14-16.62.1.noarch as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.62.1.noarch"
},
"product_reference": "kernel-source-azure-4.12.14-16.62.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-azure-4.12.14-16.62.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.62.1.x86_64"
},
"product_reference": "kernel-syms-azure-4.12.14-16.62.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-azure-4.12.14-16.62.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.62.1.x86_64"
},
"product_reference": "kernel-azure-4.12.14-16.62.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-azure-base-4.12.14-16.62.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.62.1.x86_64"
},
"product_reference": "kernel-azure-base-4.12.14-16.62.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-azure-devel-4.12.14-16.62.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.62.1.x86_64"
},
"product_reference": "kernel-azure-devel-4.12.14-16.62.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-azure-4.12.14-16.62.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.62.1.noarch"
},
"product_reference": "kernel-devel-azure-4.12.14-16.62.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-azure-4.12.14-16.62.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.62.1.noarch"
},
"product_reference": "kernel-source-azure-4.12.14-16.62.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-azure-4.12.14-16.62.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.62.1.x86_64"
},
"product_reference": "kernel-syms-azure-4.12.14-16.62.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2019-25045",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-25045"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel before 5.0.19. The XFRM subsystem has a use-after-free, related to an xfrm_state_fini panic, aka CID-dbb2483b2a46.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.62.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.62.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.62.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.62.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.62.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.62.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.62.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.62.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.62.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.62.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.62.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.62.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-25045",
"url": "https://www.suse.com/security/cve/CVE-2019-25045"
},
{
"category": "external",
"summary": "SUSE Bug 1187049 for CVE-2019-25045",
"url": "https://bugzilla.suse.com/1187049"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.62.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.62.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.62.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.62.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.62.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.62.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.62.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.62.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.62.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.62.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.62.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.62.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.62.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.62.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.62.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.62.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.62.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.62.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.62.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.62.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.62.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.62.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.62.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.62.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-14T15:02:17Z",
"details": "important"
}
],
"title": "CVE-2019-25045"
},
{
"cve": "CVE-2020-24588",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-24588"
}
],
"notes": [
{
"category": "general",
"text": "The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn\u0027t require that the A-MSDU flag in the plaintext QoS header field is authenticated. Against devices that support receiving non-SSP A-MSDU frames (which is mandatory as part of 802.11n), an adversary can abuse this to inject arbitrary network packets.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.62.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.62.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.62.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.62.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.62.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.62.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.62.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.62.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.62.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.62.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.62.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.62.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-24588",
"url": "https://www.suse.com/security/cve/CVE-2020-24588"
},
{
"category": "external",
"summary": "SUSE Bug 1185861 for CVE-2020-24588",
"url": "https://bugzilla.suse.com/1185861"
},
{
"category": "external",
"summary": "SUSE Bug 1192868 for CVE-2020-24588",
"url": "https://bugzilla.suse.com/1192868"
},
{
"category": "external",
"summary": "SUSE Bug 1199701 for CVE-2020-24588",
"url": "https://bugzilla.suse.com/1199701"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.62.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.62.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.62.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.62.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.62.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.62.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.62.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.62.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.62.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.62.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.62.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.62.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.62.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.62.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.62.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.62.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.62.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.62.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.62.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.62.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.62.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.62.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.62.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.62.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-14T15:02:17Z",
"details": "moderate"
}
],
"title": "CVE-2020-24588"
},
{
"cve": "CVE-2020-26558",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-26558"
}
],
"notes": [
{
"category": "general",
"text": "Bluetooth LE and BR/EDR secure pairing in Bluetooth Core Specification 2.1 through 5.2 may permit a nearby man-in-the-middle attacker to identify the Passkey used during pairing (in the Passkey authentication procedure) by reflection of the public key and the authentication evidence of the initiating device, potentially permitting this attacker to complete authenticated pairing with the responding device using the correct Passkey for the pairing session. The attack methodology determines the Passkey value one bit at a time.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.62.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.62.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.62.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.62.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.62.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.62.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.62.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.62.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.62.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.62.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.62.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.62.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-26558",
"url": "https://www.suse.com/security/cve/CVE-2020-26558"
},
{
"category": "external",
"summary": "SUSE Bug 1179610 for CVE-2020-26558",
"url": "https://bugzilla.suse.com/1179610"
},
{
"category": "external",
"summary": "SUSE Bug 1186463 for CVE-2020-26558",
"url": "https://bugzilla.suse.com/1186463"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.62.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.62.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.62.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.62.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.62.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.62.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.62.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.62.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.62.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.62.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.62.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.62.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.62.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.62.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.62.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.62.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.62.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.62.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.62.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.62.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.62.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.62.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.62.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.62.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-14T15:02:17Z",
"details": "moderate"
}
],
"title": "CVE-2020-26558"
},
{
"cve": "CVE-2020-36386",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-36386"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel before 5.8.1. net/bluetooth/hci_event.c has a slab out-of-bounds read in hci_extended_inquiry_result_evt, aka CID-51c19bf3d5cf.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.62.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.62.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.62.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.62.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.62.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.62.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.62.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.62.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.62.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.62.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.62.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.62.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-36386",
"url": "https://www.suse.com/security/cve/CVE-2020-36386"
},
{
"category": "external",
"summary": "SUSE Bug 1187038 for CVE-2020-36386",
"url": "https://bugzilla.suse.com/1187038"
},
{
"category": "external",
"summary": "SUSE Bug 1192868 for CVE-2020-36386",
"url": "https://bugzilla.suse.com/1192868"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.62.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.62.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.62.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.62.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.62.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.62.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.62.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.62.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.62.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.62.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.62.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.62.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.62.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.62.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.62.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.62.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.62.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.62.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.62.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.62.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.62.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.62.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.62.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.62.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-14T15:02:17Z",
"details": "moderate"
}
],
"title": "CVE-2020-36386"
},
{
"cve": "CVE-2021-0129",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-0129"
}
],
"notes": [
{
"category": "general",
"text": "Improper access control in BlueZ may allow an authenticated user to potentially enable information disclosure via adjacent access.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.62.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.62.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.62.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.62.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.62.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.62.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.62.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.62.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.62.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.62.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.62.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.62.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-0129",
"url": "https://www.suse.com/security/cve/CVE-2021-0129"
},
{
"category": "external",
"summary": "SUSE Bug 1186463 for CVE-2021-0129",
"url": "https://bugzilla.suse.com/1186463"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.62.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.62.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.62.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.62.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.62.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.62.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.62.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.62.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.62.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.62.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.62.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.62.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.62.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.62.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.62.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.62.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.62.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.62.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.62.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.62.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.62.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.62.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.62.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.62.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-14T15:02:17Z",
"details": "moderate"
}
],
"title": "CVE-2021-0129"
},
{
"cve": "CVE-2021-0512",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-0512"
}
],
"notes": [
{
"category": "general",
"text": "In __hidinput_change_resolution_multipliers of hid-input.c, there is a possible out of bounds write due to a heap buffer overflow. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-173843328References: Upstream kernel",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.62.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.62.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.62.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.62.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.62.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.62.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.62.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.62.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.62.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.62.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.62.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.62.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-0512",
"url": "https://www.suse.com/security/cve/CVE-2021-0512"
},
{
"category": "external",
"summary": "SUSE Bug 1187595 for CVE-2021-0512",
"url": "https://bugzilla.suse.com/1187595"
},
{
"category": "external",
"summary": "SUSE Bug 1187597 for CVE-2021-0512",
"url": "https://bugzilla.suse.com/1187597"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.62.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.62.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.62.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.62.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.62.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.62.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.62.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.62.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.62.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.62.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.62.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.62.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.62.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.62.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.62.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.62.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.62.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.62.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.62.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.62.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.62.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.62.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.62.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.62.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-14T15:02:17Z",
"details": "important"
}
],
"title": "CVE-2021-0512"
},
{
"cve": "CVE-2021-0605",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-0605"
}
],
"notes": [
{
"category": "general",
"text": "In pfkey_dump of af_key.c, there is a possible out-of-bounds read due to a missing bounds check. This could lead to local information disclosure in the kernel with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-110373476",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.62.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.62.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.62.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.62.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.62.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.62.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.62.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.62.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.62.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.62.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.62.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.62.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-0605",
"url": "https://www.suse.com/security/cve/CVE-2021-0605"
},
{
"category": "external",
"summary": "SUSE Bug 1187601 for CVE-2021-0605",
"url": "https://bugzilla.suse.com/1187601"
},
{
"category": "external",
"summary": "SUSE Bug 1187687 for CVE-2021-0605",
"url": "https://bugzilla.suse.com/1187687"
},
{
"category": "external",
"summary": "SUSE Bug 1188381 for CVE-2021-0605",
"url": "https://bugzilla.suse.com/1188381"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.62.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.62.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.62.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.62.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.62.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.62.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.62.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.62.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.62.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.62.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.62.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.62.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.62.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.62.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.62.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.62.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.62.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.62.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.62.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.62.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.62.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.62.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.62.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.62.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-14T15:02:17Z",
"details": "important"
}
],
"title": "CVE-2021-0605"
},
{
"cve": "CVE-2021-33624",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-33624"
}
],
"notes": [
{
"category": "general",
"text": "In kernel/bpf/verifier.c in the Linux kernel before 5.12.13, a branch can be mispredicted (e.g., because of type confusion) and consequently an unprivileged BPF program can read arbitrary memory locations via a side-channel attack, aka CID-9183671af6db.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.62.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.62.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.62.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.62.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.62.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.62.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.62.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.62.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.62.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.62.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.62.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.62.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-33624",
"url": "https://www.suse.com/security/cve/CVE-2021-33624"
},
{
"category": "external",
"summary": "SUSE Bug 1187554 for CVE-2021-33624",
"url": "https://bugzilla.suse.com/1187554"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.62.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.62.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.62.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.62.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.62.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.62.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.62.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.62.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.62.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.62.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.62.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.62.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.62.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.62.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.62.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.62.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.62.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.62.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.62.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.62.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.62.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.62.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.62.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.62.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-14T15:02:17Z",
"details": "moderate"
}
],
"title": "CVE-2021-33624"
},
{
"cve": "CVE-2021-34693",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-34693"
}
],
"notes": [
{
"category": "general",
"text": "net/can/bcm.c in the Linux kernel through 5.12.10 allows local users to obtain sensitive information from kernel stack memory because parts of a data structure are uninitialized.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.62.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.62.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.62.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.62.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.62.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.62.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.62.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.62.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.62.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.62.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.62.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.62.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-34693",
"url": "https://www.suse.com/security/cve/CVE-2021-34693"
},
{
"category": "external",
"summary": "SUSE Bug 1187452 for CVE-2021-34693",
"url": "https://bugzilla.suse.com/1187452"
},
{
"category": "external",
"summary": "SUSE Bug 1192868 for CVE-2021-34693",
"url": "https://bugzilla.suse.com/1192868"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.62.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.62.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.62.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.62.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.62.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.62.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.62.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.62.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.62.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.62.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.62.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.62.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.62.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.62.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.62.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.62.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.62.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.62.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.62.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.62.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.62.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.62.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.62.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.62.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-14T15:02:17Z",
"details": "moderate"
}
],
"title": "CVE-2021-34693"
}
]
}
suse-su-2022:3687-1
Vulnerability from csaf_suse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for bluez",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for bluez fixes the following issues:\n\n- CVE-2021-0129: Fixed improper access control (bsc#1186463).\n- CVE-2020-26558: Fixed vulnerability that may permit a nearby man-in-the-middle attacker to identify the Passkey (bsc#1186463).\n- CVE-2019-8921: Fixed heap-based buffer overflow via crafted request (bsc#1193237).\n- CVE-2019-8922: Fixed heap-based buffer overflow via crafted request (bsc#1193227).\n- CVE-2021-3658: Fixed adapter incorrectly restoring discoverable state after powered down (bsc#1188859).\n- CVE-2021-43400: Fixed use-after-free in gatt-database.c (bsc#1192394).\n\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2022-3687,SUSE-SLE-Product-HPC-15-2022-3687,SUSE-SLE-Product-HPC-15-SP1-ESPOS-2022-3687,SUSE-SLE-Product-HPC-15-SP1-LTSS-2022-3687,SUSE-SLE-Product-SLES-15-2022-3687,SUSE-SLE-Product-SLES-15-SP1-BCL-2022-3687,SUSE-SLE-Product-SLES-15-SP1-LTSS-2022-3687,SUSE-SLE-Product-SLES_SAP-15-2022-3687,SUSE-SLE-Product-SLES_SAP-15-SP1-2022-3687,SUSE-Storage-6-2022-3687",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2022_3687-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2022:3687-1",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20223687-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2022:3687-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-October/012600.html"
},
{
"category": "self",
"summary": "SUSE Bug 1186463",
"url": "https://bugzilla.suse.com/1186463"
},
{
"category": "self",
"summary": "SUSE Bug 1188859",
"url": "https://bugzilla.suse.com/1188859"
},
{
"category": "self",
"summary": "SUSE Bug 1192394",
"url": "https://bugzilla.suse.com/1192394"
},
{
"category": "self",
"summary": "SUSE Bug 1193227",
"url": "https://bugzilla.suse.com/1193227"
},
{
"category": "self",
"summary": "SUSE Bug 1193237",
"url": "https://bugzilla.suse.com/1193237"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-8921 page",
"url": "https://www.suse.com/security/cve/CVE-2019-8921/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-8922 page",
"url": "https://www.suse.com/security/cve/CVE-2019-8922/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-26558 page",
"url": "https://www.suse.com/security/cve/CVE-2020-26558/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-0129 page",
"url": "https://www.suse.com/security/cve/CVE-2021-0129/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3658 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3658/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-43400 page",
"url": "https://www.suse.com/security/cve/CVE-2021-43400/"
}
],
"title": "Security update for bluez",
"tracking": {
"current_release_date": "2022-10-21T12:05:54Z",
"generator": {
"date": "2022-10-21T12:05:54Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2022:3687-1",
"initial_release_date": "2022-10-21T12:05:54Z",
"revision_history": [
{
"date": "2022-10-21T12:05:54Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "bluez-5.48-150000.5.41.1.aarch64",
"product": {
"name": "bluez-5.48-150000.5.41.1.aarch64",
"product_id": "bluez-5.48-150000.5.41.1.aarch64"
}
},
{
"category": "product_version",
"name": "bluez-cups-5.48-150000.5.41.1.aarch64",
"product": {
"name": "bluez-cups-5.48-150000.5.41.1.aarch64",
"product_id": "bluez-cups-5.48-150000.5.41.1.aarch64"
}
},
{
"category": "product_version",
"name": "bluez-devel-5.48-150000.5.41.1.aarch64",
"product": {
"name": "bluez-devel-5.48-150000.5.41.1.aarch64",
"product_id": "bluez-devel-5.48-150000.5.41.1.aarch64"
}
},
{
"category": "product_version",
"name": "bluez-test-5.48-150000.5.41.1.aarch64",
"product": {
"name": "bluez-test-5.48-150000.5.41.1.aarch64",
"product_id": "bluez-test-5.48-150000.5.41.1.aarch64"
}
},
{
"category": "product_version",
"name": "libbluetooth3-5.48-150000.5.41.1.aarch64",
"product": {
"name": "libbluetooth3-5.48-150000.5.41.1.aarch64",
"product_id": "libbluetooth3-5.48-150000.5.41.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "bluez-devel-64bit-5.48-150000.5.41.1.aarch64_ilp32",
"product": {
"name": "bluez-devel-64bit-5.48-150000.5.41.1.aarch64_ilp32",
"product_id": "bluez-devel-64bit-5.48-150000.5.41.1.aarch64_ilp32"
}
},
{
"category": "product_version",
"name": "libbluetooth3-64bit-5.48-150000.5.41.1.aarch64_ilp32",
"product": {
"name": "libbluetooth3-64bit-5.48-150000.5.41.1.aarch64_ilp32",
"product_id": "libbluetooth3-64bit-5.48-150000.5.41.1.aarch64_ilp32"
}
}
],
"category": "architecture",
"name": "aarch64_ilp32"
},
{
"branches": [
{
"category": "product_version",
"name": "bluez-5.48-150000.5.41.1.i586",
"product": {
"name": "bluez-5.48-150000.5.41.1.i586",
"product_id": "bluez-5.48-150000.5.41.1.i586"
}
},
{
"category": "product_version",
"name": "bluez-cups-5.48-150000.5.41.1.i586",
"product": {
"name": "bluez-cups-5.48-150000.5.41.1.i586",
"product_id": "bluez-cups-5.48-150000.5.41.1.i586"
}
},
{
"category": "product_version",
"name": "bluez-devel-5.48-150000.5.41.1.i586",
"product": {
"name": "bluez-devel-5.48-150000.5.41.1.i586",
"product_id": "bluez-devel-5.48-150000.5.41.1.i586"
}
},
{
"category": "product_version",
"name": "bluez-test-5.48-150000.5.41.1.i586",
"product": {
"name": "bluez-test-5.48-150000.5.41.1.i586",
"product_id": "bluez-test-5.48-150000.5.41.1.i586"
}
},
{
"category": "product_version",
"name": "libbluetooth3-5.48-150000.5.41.1.i586",
"product": {
"name": "libbluetooth3-5.48-150000.5.41.1.i586",
"product_id": "libbluetooth3-5.48-150000.5.41.1.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "bluez-auto-enable-devices-5.48-150000.5.41.1.noarch",
"product": {
"name": "bluez-auto-enable-devices-5.48-150000.5.41.1.noarch",
"product_id": "bluez-auto-enable-devices-5.48-150000.5.41.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "bluez-5.48-150000.5.41.1.ppc64le",
"product": {
"name": "bluez-5.48-150000.5.41.1.ppc64le",
"product_id": "bluez-5.48-150000.5.41.1.ppc64le"
}
},
{
"category": "product_version",
"name": "bluez-cups-5.48-150000.5.41.1.ppc64le",
"product": {
"name": "bluez-cups-5.48-150000.5.41.1.ppc64le",
"product_id": "bluez-cups-5.48-150000.5.41.1.ppc64le"
}
},
{
"category": "product_version",
"name": "bluez-devel-5.48-150000.5.41.1.ppc64le",
"product": {
"name": "bluez-devel-5.48-150000.5.41.1.ppc64le",
"product_id": "bluez-devel-5.48-150000.5.41.1.ppc64le"
}
},
{
"category": "product_version",
"name": "bluez-test-5.48-150000.5.41.1.ppc64le",
"product": {
"name": "bluez-test-5.48-150000.5.41.1.ppc64le",
"product_id": "bluez-test-5.48-150000.5.41.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libbluetooth3-5.48-150000.5.41.1.ppc64le",
"product": {
"name": "libbluetooth3-5.48-150000.5.41.1.ppc64le",
"product_id": "libbluetooth3-5.48-150000.5.41.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "bluez-5.48-150000.5.41.1.s390x",
"product": {
"name": "bluez-5.48-150000.5.41.1.s390x",
"product_id": "bluez-5.48-150000.5.41.1.s390x"
}
},
{
"category": "product_version",
"name": "bluez-cups-5.48-150000.5.41.1.s390x",
"product": {
"name": "bluez-cups-5.48-150000.5.41.1.s390x",
"product_id": "bluez-cups-5.48-150000.5.41.1.s390x"
}
},
{
"category": "product_version",
"name": "bluez-devel-5.48-150000.5.41.1.s390x",
"product": {
"name": "bluez-devel-5.48-150000.5.41.1.s390x",
"product_id": "bluez-devel-5.48-150000.5.41.1.s390x"
}
},
{
"category": "product_version",
"name": "bluez-test-5.48-150000.5.41.1.s390x",
"product": {
"name": "bluez-test-5.48-150000.5.41.1.s390x",
"product_id": "bluez-test-5.48-150000.5.41.1.s390x"
}
},
{
"category": "product_version",
"name": "libbluetooth3-5.48-150000.5.41.1.s390x",
"product": {
"name": "libbluetooth3-5.48-150000.5.41.1.s390x",
"product_id": "libbluetooth3-5.48-150000.5.41.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "bluez-5.48-150000.5.41.1.x86_64",
"product": {
"name": "bluez-5.48-150000.5.41.1.x86_64",
"product_id": "bluez-5.48-150000.5.41.1.x86_64"
}
},
{
"category": "product_version",
"name": "bluez-cups-5.48-150000.5.41.1.x86_64",
"product": {
"name": "bluez-cups-5.48-150000.5.41.1.x86_64",
"product_id": "bluez-cups-5.48-150000.5.41.1.x86_64"
}
},
{
"category": "product_version",
"name": "bluez-devel-5.48-150000.5.41.1.x86_64",
"product": {
"name": "bluez-devel-5.48-150000.5.41.1.x86_64",
"product_id": "bluez-devel-5.48-150000.5.41.1.x86_64"
}
},
{
"category": "product_version",
"name": "bluez-devel-32bit-5.48-150000.5.41.1.x86_64",
"product": {
"name": "bluez-devel-32bit-5.48-150000.5.41.1.x86_64",
"product_id": "bluez-devel-32bit-5.48-150000.5.41.1.x86_64"
}
},
{
"category": "product_version",
"name": "bluez-test-5.48-150000.5.41.1.x86_64",
"product": {
"name": "bluez-test-5.48-150000.5.41.1.x86_64",
"product_id": "bluez-test-5.48-150000.5.41.1.x86_64"
}
},
{
"category": "product_version",
"name": "libbluetooth3-5.48-150000.5.41.1.x86_64",
"product": {
"name": "libbluetooth3-5.48-150000.5.41.1.x86_64",
"product_id": "libbluetooth3-5.48-150000.5.41.1.x86_64"
}
},
{
"category": "product_version",
"name": "libbluetooth3-32bit-5.48-150000.5.41.1.x86_64",
"product": {
"name": "libbluetooth3-32bit-5.48-150000.5.41.1.x86_64",
"product_id": "libbluetooth3-32bit-5.48-150000.5.41.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Performance Computing 15-ESPOS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing 15-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle_hpc-espos:15"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Performance Computing 15-LTSS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing 15-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle_hpc-ltss:15"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle_hpc-espos:15:sp1"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle_hpc-ltss:15:sp1"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 15-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 15-LTSS",
"product_id": "SUSE Linux Enterprise Server 15-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:15"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 15 SP1-BCL",
"product": {
"name": "SUSE Linux Enterprise Server 15 SP1-BCL",
"product_id": "SUSE Linux Enterprise Server 15 SP1-BCL",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_bcl:15:sp1"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 15 SP1-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:15:sp1"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 15",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 15",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:15"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP1",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:15:sp1"
}
}
},
{
"category": "product_name",
"name": "SUSE Enterprise Storage 6",
"product": {
"name": "SUSE Enterprise Storage 6",
"product_id": "SUSE Enterprise Storage 6",
"product_identification_helper": {
"cpe": "cpe:/o:suse:ses:6"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "bluez-5.48-150000.5.41.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:bluez-5.48-150000.5.41.1.aarch64"
},
"product_reference": "bluez-5.48-150000.5.41.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bluez-5.48-150000.5.41.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:bluez-5.48-150000.5.41.1.x86_64"
},
"product_reference": "bluez-5.48-150000.5.41.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bluez-devel-5.48-150000.5.41.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:bluez-devel-5.48-150000.5.41.1.aarch64"
},
"product_reference": "bluez-devel-5.48-150000.5.41.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bluez-devel-5.48-150000.5.41.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:bluez-devel-5.48-150000.5.41.1.x86_64"
},
"product_reference": "bluez-devel-5.48-150000.5.41.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libbluetooth3-5.48-150000.5.41.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:libbluetooth3-5.48-150000.5.41.1.aarch64"
},
"product_reference": "libbluetooth3-5.48-150000.5.41.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libbluetooth3-5.48-150000.5.41.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:libbluetooth3-5.48-150000.5.41.1.x86_64"
},
"product_reference": "libbluetooth3-5.48-150000.5.41.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bluez-5.48-150000.5.41.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:bluez-5.48-150000.5.41.1.aarch64"
},
"product_reference": "bluez-5.48-150000.5.41.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bluez-5.48-150000.5.41.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:bluez-5.48-150000.5.41.1.x86_64"
},
"product_reference": "bluez-5.48-150000.5.41.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bluez-devel-5.48-150000.5.41.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:bluez-devel-5.48-150000.5.41.1.aarch64"
},
"product_reference": "bluez-devel-5.48-150000.5.41.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bluez-devel-5.48-150000.5.41.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:bluez-devel-5.48-150000.5.41.1.x86_64"
},
"product_reference": "bluez-devel-5.48-150000.5.41.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libbluetooth3-5.48-150000.5.41.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:libbluetooth3-5.48-150000.5.41.1.aarch64"
},
"product_reference": "libbluetooth3-5.48-150000.5.41.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libbluetooth3-5.48-150000.5.41.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:libbluetooth3-5.48-150000.5.41.1.x86_64"
},
"product_reference": "libbluetooth3-5.48-150000.5.41.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bluez-5.48-150000.5.41.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:bluez-5.48-150000.5.41.1.aarch64"
},
"product_reference": "bluez-5.48-150000.5.41.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bluez-5.48-150000.5.41.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:bluez-5.48-150000.5.41.1.x86_64"
},
"product_reference": "bluez-5.48-150000.5.41.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bluez-devel-5.48-150000.5.41.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:bluez-devel-5.48-150000.5.41.1.aarch64"
},
"product_reference": "bluez-devel-5.48-150000.5.41.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bluez-devel-5.48-150000.5.41.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:bluez-devel-5.48-150000.5.41.1.x86_64"
},
"product_reference": "bluez-devel-5.48-150000.5.41.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libbluetooth3-5.48-150000.5.41.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:libbluetooth3-5.48-150000.5.41.1.aarch64"
},
"product_reference": "libbluetooth3-5.48-150000.5.41.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libbluetooth3-5.48-150000.5.41.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:libbluetooth3-5.48-150000.5.41.1.x86_64"
},
"product_reference": "libbluetooth3-5.48-150000.5.41.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bluez-5.48-150000.5.41.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bluez-5.48-150000.5.41.1.aarch64"
},
"product_reference": "bluez-5.48-150000.5.41.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bluez-5.48-150000.5.41.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bluez-5.48-150000.5.41.1.x86_64"
},
"product_reference": "bluez-5.48-150000.5.41.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bluez-devel-5.48-150000.5.41.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bluez-devel-5.48-150000.5.41.1.aarch64"
},
"product_reference": "bluez-devel-5.48-150000.5.41.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bluez-devel-5.48-150000.5.41.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bluez-devel-5.48-150000.5.41.1.x86_64"
},
"product_reference": "bluez-devel-5.48-150000.5.41.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libbluetooth3-5.48-150000.5.41.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libbluetooth3-5.48-150000.5.41.1.aarch64"
},
"product_reference": "libbluetooth3-5.48-150000.5.41.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libbluetooth3-5.48-150000.5.41.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libbluetooth3-5.48-150000.5.41.1.x86_64"
},
"product_reference": "libbluetooth3-5.48-150000.5.41.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bluez-5.48-150000.5.41.1.aarch64 as component of SUSE Linux Enterprise Server 15-LTSS",
"product_id": "SUSE Linux Enterprise Server 15-LTSS:bluez-5.48-150000.5.41.1.aarch64"
},
"product_reference": "bluez-5.48-150000.5.41.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bluez-5.48-150000.5.41.1.ppc64le as component of SUSE Linux Enterprise Server 15-LTSS",
"product_id": "SUSE Linux Enterprise Server 15-LTSS:bluez-5.48-150000.5.41.1.ppc64le"
},
"product_reference": "bluez-5.48-150000.5.41.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bluez-5.48-150000.5.41.1.s390x as component of SUSE Linux Enterprise Server 15-LTSS",
"product_id": "SUSE Linux Enterprise Server 15-LTSS:bluez-5.48-150000.5.41.1.s390x"
},
"product_reference": "bluez-5.48-150000.5.41.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bluez-5.48-150000.5.41.1.x86_64 as component of SUSE Linux Enterprise Server 15-LTSS",
"product_id": "SUSE Linux Enterprise Server 15-LTSS:bluez-5.48-150000.5.41.1.x86_64"
},
"product_reference": "bluez-5.48-150000.5.41.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bluez-devel-5.48-150000.5.41.1.aarch64 as component of SUSE Linux Enterprise Server 15-LTSS",
"product_id": "SUSE Linux Enterprise Server 15-LTSS:bluez-devel-5.48-150000.5.41.1.aarch64"
},
"product_reference": "bluez-devel-5.48-150000.5.41.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bluez-devel-5.48-150000.5.41.1.ppc64le as component of SUSE Linux Enterprise Server 15-LTSS",
"product_id": "SUSE Linux Enterprise Server 15-LTSS:bluez-devel-5.48-150000.5.41.1.ppc64le"
},
"product_reference": "bluez-devel-5.48-150000.5.41.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bluez-devel-5.48-150000.5.41.1.s390x as component of SUSE Linux Enterprise Server 15-LTSS",
"product_id": "SUSE Linux Enterprise Server 15-LTSS:bluez-devel-5.48-150000.5.41.1.s390x"
},
"product_reference": "bluez-devel-5.48-150000.5.41.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bluez-devel-5.48-150000.5.41.1.x86_64 as component of SUSE Linux Enterprise Server 15-LTSS",
"product_id": "SUSE Linux Enterprise Server 15-LTSS:bluez-devel-5.48-150000.5.41.1.x86_64"
},
"product_reference": "bluez-devel-5.48-150000.5.41.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libbluetooth3-5.48-150000.5.41.1.aarch64 as component of SUSE Linux Enterprise Server 15-LTSS",
"product_id": "SUSE Linux Enterprise Server 15-LTSS:libbluetooth3-5.48-150000.5.41.1.aarch64"
},
"product_reference": "libbluetooth3-5.48-150000.5.41.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libbluetooth3-5.48-150000.5.41.1.ppc64le as component of SUSE Linux Enterprise Server 15-LTSS",
"product_id": "SUSE Linux Enterprise Server 15-LTSS:libbluetooth3-5.48-150000.5.41.1.ppc64le"
},
"product_reference": "libbluetooth3-5.48-150000.5.41.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libbluetooth3-5.48-150000.5.41.1.s390x as component of SUSE Linux Enterprise Server 15-LTSS",
"product_id": "SUSE Linux Enterprise Server 15-LTSS:libbluetooth3-5.48-150000.5.41.1.s390x"
},
"product_reference": "libbluetooth3-5.48-150000.5.41.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libbluetooth3-5.48-150000.5.41.1.x86_64 as component of SUSE Linux Enterprise Server 15-LTSS",
"product_id": "SUSE Linux Enterprise Server 15-LTSS:libbluetooth3-5.48-150000.5.41.1.x86_64"
},
"product_reference": "libbluetooth3-5.48-150000.5.41.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bluez-5.48-150000.5.41.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-BCL",
"product_id": "SUSE Linux Enterprise Server 15 SP1-BCL:bluez-5.48-150000.5.41.1.x86_64"
},
"product_reference": "bluez-5.48-150000.5.41.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bluez-devel-5.48-150000.5.41.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-BCL",
"product_id": "SUSE Linux Enterprise Server 15 SP1-BCL:bluez-devel-5.48-150000.5.41.1.x86_64"
},
"product_reference": "bluez-devel-5.48-150000.5.41.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libbluetooth3-5.48-150000.5.41.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-BCL",
"product_id": "SUSE Linux Enterprise Server 15 SP1-BCL:libbluetooth3-5.48-150000.5.41.1.x86_64"
},
"product_reference": "libbluetooth3-5.48-150000.5.41.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bluez-5.48-150000.5.41.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:bluez-5.48-150000.5.41.1.aarch64"
},
"product_reference": "bluez-5.48-150000.5.41.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bluez-5.48-150000.5.41.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:bluez-5.48-150000.5.41.1.ppc64le"
},
"product_reference": "bluez-5.48-150000.5.41.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bluez-5.48-150000.5.41.1.s390x as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:bluez-5.48-150000.5.41.1.s390x"
},
"product_reference": "bluez-5.48-150000.5.41.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bluez-5.48-150000.5.41.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:bluez-5.48-150000.5.41.1.x86_64"
},
"product_reference": "bluez-5.48-150000.5.41.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bluez-devel-5.48-150000.5.41.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:bluez-devel-5.48-150000.5.41.1.aarch64"
},
"product_reference": "bluez-devel-5.48-150000.5.41.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bluez-devel-5.48-150000.5.41.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:bluez-devel-5.48-150000.5.41.1.ppc64le"
},
"product_reference": "bluez-devel-5.48-150000.5.41.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bluez-devel-5.48-150000.5.41.1.s390x as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:bluez-devel-5.48-150000.5.41.1.s390x"
},
"product_reference": "bluez-devel-5.48-150000.5.41.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bluez-devel-5.48-150000.5.41.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:bluez-devel-5.48-150000.5.41.1.x86_64"
},
"product_reference": "bluez-devel-5.48-150000.5.41.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libbluetooth3-5.48-150000.5.41.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:libbluetooth3-5.48-150000.5.41.1.aarch64"
},
"product_reference": "libbluetooth3-5.48-150000.5.41.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libbluetooth3-5.48-150000.5.41.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:libbluetooth3-5.48-150000.5.41.1.ppc64le"
},
"product_reference": "libbluetooth3-5.48-150000.5.41.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libbluetooth3-5.48-150000.5.41.1.s390x as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:libbluetooth3-5.48-150000.5.41.1.s390x"
},
"product_reference": "libbluetooth3-5.48-150000.5.41.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libbluetooth3-5.48-150000.5.41.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:libbluetooth3-5.48-150000.5.41.1.x86_64"
},
"product_reference": "libbluetooth3-5.48-150000.5.41.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bluez-5.48-150000.5.41.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15:bluez-5.48-150000.5.41.1.ppc64le"
},
"product_reference": "bluez-5.48-150000.5.41.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bluez-5.48-150000.5.41.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15:bluez-5.48-150000.5.41.1.x86_64"
},
"product_reference": "bluez-5.48-150000.5.41.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bluez-devel-5.48-150000.5.41.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15:bluez-devel-5.48-150000.5.41.1.ppc64le"
},
"product_reference": "bluez-devel-5.48-150000.5.41.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bluez-devel-5.48-150000.5.41.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15:bluez-devel-5.48-150000.5.41.1.x86_64"
},
"product_reference": "bluez-devel-5.48-150000.5.41.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libbluetooth3-5.48-150000.5.41.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15:libbluetooth3-5.48-150000.5.41.1.ppc64le"
},
"product_reference": "libbluetooth3-5.48-150000.5.41.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libbluetooth3-5.48-150000.5.41.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15:libbluetooth3-5.48-150000.5.41.1.x86_64"
},
"product_reference": "libbluetooth3-5.48-150000.5.41.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bluez-5.48-150000.5.41.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:bluez-5.48-150000.5.41.1.ppc64le"
},
"product_reference": "bluez-5.48-150000.5.41.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bluez-5.48-150000.5.41.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:bluez-5.48-150000.5.41.1.x86_64"
},
"product_reference": "bluez-5.48-150000.5.41.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bluez-devel-5.48-150000.5.41.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:bluez-devel-5.48-150000.5.41.1.ppc64le"
},
"product_reference": "bluez-devel-5.48-150000.5.41.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bluez-devel-5.48-150000.5.41.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:bluez-devel-5.48-150000.5.41.1.x86_64"
},
"product_reference": "bluez-devel-5.48-150000.5.41.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libbluetooth3-5.48-150000.5.41.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:libbluetooth3-5.48-150000.5.41.1.ppc64le"
},
"product_reference": "libbluetooth3-5.48-150000.5.41.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libbluetooth3-5.48-150000.5.41.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:libbluetooth3-5.48-150000.5.41.1.x86_64"
},
"product_reference": "libbluetooth3-5.48-150000.5.41.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bluez-5.48-150000.5.41.1.aarch64 as component of SUSE Enterprise Storage 6",
"product_id": "SUSE Enterprise Storage 6:bluez-5.48-150000.5.41.1.aarch64"
},
"product_reference": "bluez-5.48-150000.5.41.1.aarch64",
"relates_to_product_reference": "SUSE Enterprise Storage 6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bluez-5.48-150000.5.41.1.x86_64 as component of SUSE Enterprise Storage 6",
"product_id": "SUSE Enterprise Storage 6:bluez-5.48-150000.5.41.1.x86_64"
},
"product_reference": "bluez-5.48-150000.5.41.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bluez-devel-5.48-150000.5.41.1.aarch64 as component of SUSE Enterprise Storage 6",
"product_id": "SUSE Enterprise Storage 6:bluez-devel-5.48-150000.5.41.1.aarch64"
},
"product_reference": "bluez-devel-5.48-150000.5.41.1.aarch64",
"relates_to_product_reference": "SUSE Enterprise Storage 6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bluez-devel-5.48-150000.5.41.1.x86_64 as component of SUSE Enterprise Storage 6",
"product_id": "SUSE Enterprise Storage 6:bluez-devel-5.48-150000.5.41.1.x86_64"
},
"product_reference": "bluez-devel-5.48-150000.5.41.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libbluetooth3-5.48-150000.5.41.1.aarch64 as component of SUSE Enterprise Storage 6",
"product_id": "SUSE Enterprise Storage 6:libbluetooth3-5.48-150000.5.41.1.aarch64"
},
"product_reference": "libbluetooth3-5.48-150000.5.41.1.aarch64",
"relates_to_product_reference": "SUSE Enterprise Storage 6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libbluetooth3-5.48-150000.5.41.1.x86_64 as component of SUSE Enterprise Storage 6",
"product_id": "SUSE Enterprise Storage 6:libbluetooth3-5.48-150000.5.41.1.x86_64"
},
"product_reference": "libbluetooth3-5.48-150000.5.41.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 6"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2019-8921",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-8921"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in bluetoothd in BlueZ through 5.48. The vulnerability lies in the handling of a SVC_ATTR_REQ by the SDP implementation. By crafting a malicious CSTATE, it is possible to trick the server into returning more bytes than the buffer actually holds, resulting in leaking arbitrary heap data. The root cause can be found in the function service_attr_req of sdpd-request.c. The server does not check whether the CSTATE data is the same in consecutive requests, and instead simply trusts that it is the same.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 6:bluez-5.48-150000.5.41.1.aarch64",
"SUSE Enterprise Storage 6:bluez-5.48-150000.5.41.1.x86_64",
"SUSE Enterprise Storage 6:bluez-devel-5.48-150000.5.41.1.aarch64",
"SUSE Enterprise Storage 6:bluez-devel-5.48-150000.5.41.1.x86_64",
"SUSE Enterprise Storage 6:libbluetooth3-5.48-150000.5.41.1.aarch64",
"SUSE Enterprise Storage 6:libbluetooth3-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:bluez-5.48-150000.5.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:bluez-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:bluez-devel-5.48-150000.5.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:bluez-devel-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:libbluetooth3-5.48-150000.5.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:libbluetooth3-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bluez-5.48-150000.5.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bluez-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bluez-devel-5.48-150000.5.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bluez-devel-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libbluetooth3-5.48-150000.5.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libbluetooth3-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:bluez-5.48-150000.5.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:bluez-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:bluez-devel-5.48-150000.5.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:bluez-devel-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:libbluetooth3-5.48-150000.5.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:libbluetooth3-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:bluez-5.48-150000.5.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:bluez-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:bluez-devel-5.48-150000.5.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:bluez-devel-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:libbluetooth3-5.48-150000.5.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:libbluetooth3-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:bluez-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:bluez-devel-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:libbluetooth3-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bluez-5.48-150000.5.41.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bluez-5.48-150000.5.41.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bluez-5.48-150000.5.41.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bluez-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bluez-devel-5.48-150000.5.41.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bluez-devel-5.48-150000.5.41.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bluez-devel-5.48-150000.5.41.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bluez-devel-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libbluetooth3-5.48-150000.5.41.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libbluetooth3-5.48-150000.5.41.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libbluetooth3-5.48-150000.5.41.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libbluetooth3-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:bluez-5.48-150000.5.41.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:bluez-5.48-150000.5.41.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:bluez-5.48-150000.5.41.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:bluez-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:bluez-devel-5.48-150000.5.41.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:bluez-devel-5.48-150000.5.41.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:bluez-devel-5.48-150000.5.41.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:bluez-devel-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:libbluetooth3-5.48-150000.5.41.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:libbluetooth3-5.48-150000.5.41.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:libbluetooth3-5.48-150000.5.41.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:libbluetooth3-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bluez-5.48-150000.5.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bluez-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bluez-devel-5.48-150000.5.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bluez-devel-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libbluetooth3-5.48-150000.5.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libbluetooth3-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:bluez-5.48-150000.5.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:bluez-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:bluez-devel-5.48-150000.5.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:bluez-devel-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:libbluetooth3-5.48-150000.5.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:libbluetooth3-5.48-150000.5.41.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-8921",
"url": "https://www.suse.com/security/cve/CVE-2019-8921"
},
{
"category": "external",
"summary": "SUSE Bug 1193237 for CVE-2019-8921",
"url": "https://bugzilla.suse.com/1193237"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 6:bluez-5.48-150000.5.41.1.aarch64",
"SUSE Enterprise Storage 6:bluez-5.48-150000.5.41.1.x86_64",
"SUSE Enterprise Storage 6:bluez-devel-5.48-150000.5.41.1.aarch64",
"SUSE Enterprise Storage 6:bluez-devel-5.48-150000.5.41.1.x86_64",
"SUSE Enterprise Storage 6:libbluetooth3-5.48-150000.5.41.1.aarch64",
"SUSE Enterprise Storage 6:libbluetooth3-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:bluez-5.48-150000.5.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:bluez-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:bluez-devel-5.48-150000.5.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:bluez-devel-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:libbluetooth3-5.48-150000.5.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:libbluetooth3-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bluez-5.48-150000.5.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bluez-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bluez-devel-5.48-150000.5.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bluez-devel-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libbluetooth3-5.48-150000.5.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libbluetooth3-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:bluez-5.48-150000.5.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:bluez-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:bluez-devel-5.48-150000.5.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:bluez-devel-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:libbluetooth3-5.48-150000.5.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:libbluetooth3-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:bluez-5.48-150000.5.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:bluez-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:bluez-devel-5.48-150000.5.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:bluez-devel-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:libbluetooth3-5.48-150000.5.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:libbluetooth3-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:bluez-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:bluez-devel-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:libbluetooth3-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bluez-5.48-150000.5.41.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bluez-5.48-150000.5.41.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bluez-5.48-150000.5.41.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bluez-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bluez-devel-5.48-150000.5.41.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bluez-devel-5.48-150000.5.41.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bluez-devel-5.48-150000.5.41.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bluez-devel-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libbluetooth3-5.48-150000.5.41.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libbluetooth3-5.48-150000.5.41.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libbluetooth3-5.48-150000.5.41.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libbluetooth3-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:bluez-5.48-150000.5.41.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:bluez-5.48-150000.5.41.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:bluez-5.48-150000.5.41.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:bluez-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:bluez-devel-5.48-150000.5.41.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:bluez-devel-5.48-150000.5.41.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:bluez-devel-5.48-150000.5.41.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:bluez-devel-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:libbluetooth3-5.48-150000.5.41.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:libbluetooth3-5.48-150000.5.41.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:libbluetooth3-5.48-150000.5.41.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:libbluetooth3-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bluez-5.48-150000.5.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bluez-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bluez-devel-5.48-150000.5.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bluez-devel-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libbluetooth3-5.48-150000.5.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libbluetooth3-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:bluez-5.48-150000.5.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:bluez-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:bluez-devel-5.48-150000.5.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:bluez-devel-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:libbluetooth3-5.48-150000.5.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:libbluetooth3-5.48-150000.5.41.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 6:bluez-5.48-150000.5.41.1.aarch64",
"SUSE Enterprise Storage 6:bluez-5.48-150000.5.41.1.x86_64",
"SUSE Enterprise Storage 6:bluez-devel-5.48-150000.5.41.1.aarch64",
"SUSE Enterprise Storage 6:bluez-devel-5.48-150000.5.41.1.x86_64",
"SUSE Enterprise Storage 6:libbluetooth3-5.48-150000.5.41.1.aarch64",
"SUSE Enterprise Storage 6:libbluetooth3-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:bluez-5.48-150000.5.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:bluez-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:bluez-devel-5.48-150000.5.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:bluez-devel-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:libbluetooth3-5.48-150000.5.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:libbluetooth3-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bluez-5.48-150000.5.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bluez-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bluez-devel-5.48-150000.5.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bluez-devel-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libbluetooth3-5.48-150000.5.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libbluetooth3-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:bluez-5.48-150000.5.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:bluez-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:bluez-devel-5.48-150000.5.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:bluez-devel-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:libbluetooth3-5.48-150000.5.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:libbluetooth3-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:bluez-5.48-150000.5.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:bluez-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:bluez-devel-5.48-150000.5.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:bluez-devel-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:libbluetooth3-5.48-150000.5.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:libbluetooth3-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:bluez-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:bluez-devel-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:libbluetooth3-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bluez-5.48-150000.5.41.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bluez-5.48-150000.5.41.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bluez-5.48-150000.5.41.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bluez-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bluez-devel-5.48-150000.5.41.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bluez-devel-5.48-150000.5.41.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bluez-devel-5.48-150000.5.41.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bluez-devel-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libbluetooth3-5.48-150000.5.41.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libbluetooth3-5.48-150000.5.41.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libbluetooth3-5.48-150000.5.41.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libbluetooth3-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:bluez-5.48-150000.5.41.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:bluez-5.48-150000.5.41.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:bluez-5.48-150000.5.41.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:bluez-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:bluez-devel-5.48-150000.5.41.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:bluez-devel-5.48-150000.5.41.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:bluez-devel-5.48-150000.5.41.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:bluez-devel-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:libbluetooth3-5.48-150000.5.41.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:libbluetooth3-5.48-150000.5.41.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:libbluetooth3-5.48-150000.5.41.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:libbluetooth3-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bluez-5.48-150000.5.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bluez-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bluez-devel-5.48-150000.5.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bluez-devel-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libbluetooth3-5.48-150000.5.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libbluetooth3-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:bluez-5.48-150000.5.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:bluez-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:bluez-devel-5.48-150000.5.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:bluez-devel-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:libbluetooth3-5.48-150000.5.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:libbluetooth3-5.48-150000.5.41.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-10-21T12:05:54Z",
"details": "important"
}
],
"title": "CVE-2019-8921"
},
{
"cve": "CVE-2019-8922",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-8922"
}
],
"notes": [
{
"category": "general",
"text": "A heap-based buffer overflow was discovered in bluetoothd in BlueZ through 5.48. There isn\u0027t any check on whether there is enough space in the destination buffer. The function simply appends all data passed to it. The values of all attributes that are requested are appended to the output buffer. There are no size checks whatsoever, resulting in a simple heap overflow if one can craft a request where the response is large enough to overflow the preallocated buffer. This issue exists in service_attr_req gets called by process_request (in sdpd-request.c), which also allocates the response buffer.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 6:bluez-5.48-150000.5.41.1.aarch64",
"SUSE Enterprise Storage 6:bluez-5.48-150000.5.41.1.x86_64",
"SUSE Enterprise Storage 6:bluez-devel-5.48-150000.5.41.1.aarch64",
"SUSE Enterprise Storage 6:bluez-devel-5.48-150000.5.41.1.x86_64",
"SUSE Enterprise Storage 6:libbluetooth3-5.48-150000.5.41.1.aarch64",
"SUSE Enterprise Storage 6:libbluetooth3-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:bluez-5.48-150000.5.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:bluez-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:bluez-devel-5.48-150000.5.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:bluez-devel-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:libbluetooth3-5.48-150000.5.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:libbluetooth3-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bluez-5.48-150000.5.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bluez-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bluez-devel-5.48-150000.5.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bluez-devel-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libbluetooth3-5.48-150000.5.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libbluetooth3-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:bluez-5.48-150000.5.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:bluez-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:bluez-devel-5.48-150000.5.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:bluez-devel-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:libbluetooth3-5.48-150000.5.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:libbluetooth3-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:bluez-5.48-150000.5.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:bluez-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:bluez-devel-5.48-150000.5.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:bluez-devel-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:libbluetooth3-5.48-150000.5.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:libbluetooth3-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:bluez-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:bluez-devel-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:libbluetooth3-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bluez-5.48-150000.5.41.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bluez-5.48-150000.5.41.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bluez-5.48-150000.5.41.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bluez-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bluez-devel-5.48-150000.5.41.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bluez-devel-5.48-150000.5.41.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bluez-devel-5.48-150000.5.41.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bluez-devel-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libbluetooth3-5.48-150000.5.41.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libbluetooth3-5.48-150000.5.41.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libbluetooth3-5.48-150000.5.41.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libbluetooth3-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:bluez-5.48-150000.5.41.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:bluez-5.48-150000.5.41.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:bluez-5.48-150000.5.41.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:bluez-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:bluez-devel-5.48-150000.5.41.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:bluez-devel-5.48-150000.5.41.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:bluez-devel-5.48-150000.5.41.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:bluez-devel-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:libbluetooth3-5.48-150000.5.41.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:libbluetooth3-5.48-150000.5.41.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:libbluetooth3-5.48-150000.5.41.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:libbluetooth3-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bluez-5.48-150000.5.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bluez-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bluez-devel-5.48-150000.5.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bluez-devel-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libbluetooth3-5.48-150000.5.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libbluetooth3-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:bluez-5.48-150000.5.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:bluez-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:bluez-devel-5.48-150000.5.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:bluez-devel-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:libbluetooth3-5.48-150000.5.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:libbluetooth3-5.48-150000.5.41.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-8922",
"url": "https://www.suse.com/security/cve/CVE-2019-8922"
},
{
"category": "external",
"summary": "SUSE Bug 1193227 for CVE-2019-8922",
"url": "https://bugzilla.suse.com/1193227"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 6:bluez-5.48-150000.5.41.1.aarch64",
"SUSE Enterprise Storage 6:bluez-5.48-150000.5.41.1.x86_64",
"SUSE Enterprise Storage 6:bluez-devel-5.48-150000.5.41.1.aarch64",
"SUSE Enterprise Storage 6:bluez-devel-5.48-150000.5.41.1.x86_64",
"SUSE Enterprise Storage 6:libbluetooth3-5.48-150000.5.41.1.aarch64",
"SUSE Enterprise Storage 6:libbluetooth3-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:bluez-5.48-150000.5.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:bluez-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:bluez-devel-5.48-150000.5.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:bluez-devel-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:libbluetooth3-5.48-150000.5.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:libbluetooth3-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bluez-5.48-150000.5.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bluez-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bluez-devel-5.48-150000.5.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bluez-devel-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libbluetooth3-5.48-150000.5.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libbluetooth3-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:bluez-5.48-150000.5.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:bluez-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:bluez-devel-5.48-150000.5.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:bluez-devel-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:libbluetooth3-5.48-150000.5.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:libbluetooth3-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:bluez-5.48-150000.5.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:bluez-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:bluez-devel-5.48-150000.5.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:bluez-devel-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:libbluetooth3-5.48-150000.5.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:libbluetooth3-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:bluez-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:bluez-devel-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:libbluetooth3-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bluez-5.48-150000.5.41.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bluez-5.48-150000.5.41.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bluez-5.48-150000.5.41.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bluez-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bluez-devel-5.48-150000.5.41.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bluez-devel-5.48-150000.5.41.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bluez-devel-5.48-150000.5.41.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bluez-devel-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libbluetooth3-5.48-150000.5.41.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libbluetooth3-5.48-150000.5.41.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libbluetooth3-5.48-150000.5.41.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libbluetooth3-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:bluez-5.48-150000.5.41.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:bluez-5.48-150000.5.41.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:bluez-5.48-150000.5.41.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:bluez-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:bluez-devel-5.48-150000.5.41.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:bluez-devel-5.48-150000.5.41.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:bluez-devel-5.48-150000.5.41.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:bluez-devel-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:libbluetooth3-5.48-150000.5.41.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:libbluetooth3-5.48-150000.5.41.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:libbluetooth3-5.48-150000.5.41.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:libbluetooth3-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bluez-5.48-150000.5.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bluez-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bluez-devel-5.48-150000.5.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bluez-devel-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libbluetooth3-5.48-150000.5.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libbluetooth3-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:bluez-5.48-150000.5.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:bluez-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:bluez-devel-5.48-150000.5.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:bluez-devel-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:libbluetooth3-5.48-150000.5.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:libbluetooth3-5.48-150000.5.41.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 6:bluez-5.48-150000.5.41.1.aarch64",
"SUSE Enterprise Storage 6:bluez-5.48-150000.5.41.1.x86_64",
"SUSE Enterprise Storage 6:bluez-devel-5.48-150000.5.41.1.aarch64",
"SUSE Enterprise Storage 6:bluez-devel-5.48-150000.5.41.1.x86_64",
"SUSE Enterprise Storage 6:libbluetooth3-5.48-150000.5.41.1.aarch64",
"SUSE Enterprise Storage 6:libbluetooth3-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:bluez-5.48-150000.5.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:bluez-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:bluez-devel-5.48-150000.5.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:bluez-devel-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:libbluetooth3-5.48-150000.5.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:libbluetooth3-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bluez-5.48-150000.5.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bluez-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bluez-devel-5.48-150000.5.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bluez-devel-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libbluetooth3-5.48-150000.5.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libbluetooth3-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:bluez-5.48-150000.5.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:bluez-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:bluez-devel-5.48-150000.5.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:bluez-devel-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:libbluetooth3-5.48-150000.5.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:libbluetooth3-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:bluez-5.48-150000.5.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:bluez-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:bluez-devel-5.48-150000.5.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:bluez-devel-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:libbluetooth3-5.48-150000.5.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:libbluetooth3-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:bluez-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:bluez-devel-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:libbluetooth3-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bluez-5.48-150000.5.41.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bluez-5.48-150000.5.41.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bluez-5.48-150000.5.41.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bluez-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bluez-devel-5.48-150000.5.41.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bluez-devel-5.48-150000.5.41.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bluez-devel-5.48-150000.5.41.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bluez-devel-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libbluetooth3-5.48-150000.5.41.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libbluetooth3-5.48-150000.5.41.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libbluetooth3-5.48-150000.5.41.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libbluetooth3-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:bluez-5.48-150000.5.41.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:bluez-5.48-150000.5.41.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:bluez-5.48-150000.5.41.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:bluez-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:bluez-devel-5.48-150000.5.41.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:bluez-devel-5.48-150000.5.41.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:bluez-devel-5.48-150000.5.41.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:bluez-devel-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:libbluetooth3-5.48-150000.5.41.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:libbluetooth3-5.48-150000.5.41.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:libbluetooth3-5.48-150000.5.41.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:libbluetooth3-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bluez-5.48-150000.5.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bluez-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bluez-devel-5.48-150000.5.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bluez-devel-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libbluetooth3-5.48-150000.5.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libbluetooth3-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:bluez-5.48-150000.5.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:bluez-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:bluez-devel-5.48-150000.5.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:bluez-devel-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:libbluetooth3-5.48-150000.5.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:libbluetooth3-5.48-150000.5.41.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-10-21T12:05:54Z",
"details": "important"
}
],
"title": "CVE-2019-8922"
},
{
"cve": "CVE-2020-26558",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-26558"
}
],
"notes": [
{
"category": "general",
"text": "Bluetooth LE and BR/EDR secure pairing in Bluetooth Core Specification 2.1 through 5.2 may permit a nearby man-in-the-middle attacker to identify the Passkey used during pairing (in the Passkey authentication procedure) by reflection of the public key and the authentication evidence of the initiating device, potentially permitting this attacker to complete authenticated pairing with the responding device using the correct Passkey for the pairing session. The attack methodology determines the Passkey value one bit at a time.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 6:bluez-5.48-150000.5.41.1.aarch64",
"SUSE Enterprise Storage 6:bluez-5.48-150000.5.41.1.x86_64",
"SUSE Enterprise Storage 6:bluez-devel-5.48-150000.5.41.1.aarch64",
"SUSE Enterprise Storage 6:bluez-devel-5.48-150000.5.41.1.x86_64",
"SUSE Enterprise Storage 6:libbluetooth3-5.48-150000.5.41.1.aarch64",
"SUSE Enterprise Storage 6:libbluetooth3-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:bluez-5.48-150000.5.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:bluez-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:bluez-devel-5.48-150000.5.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:bluez-devel-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:libbluetooth3-5.48-150000.5.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:libbluetooth3-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bluez-5.48-150000.5.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bluez-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bluez-devel-5.48-150000.5.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bluez-devel-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libbluetooth3-5.48-150000.5.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libbluetooth3-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:bluez-5.48-150000.5.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:bluez-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:bluez-devel-5.48-150000.5.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:bluez-devel-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:libbluetooth3-5.48-150000.5.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:libbluetooth3-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:bluez-5.48-150000.5.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:bluez-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:bluez-devel-5.48-150000.5.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:bluez-devel-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:libbluetooth3-5.48-150000.5.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:libbluetooth3-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:bluez-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:bluez-devel-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:libbluetooth3-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bluez-5.48-150000.5.41.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bluez-5.48-150000.5.41.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bluez-5.48-150000.5.41.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bluez-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bluez-devel-5.48-150000.5.41.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bluez-devel-5.48-150000.5.41.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bluez-devel-5.48-150000.5.41.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bluez-devel-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libbluetooth3-5.48-150000.5.41.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libbluetooth3-5.48-150000.5.41.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libbluetooth3-5.48-150000.5.41.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libbluetooth3-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:bluez-5.48-150000.5.41.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:bluez-5.48-150000.5.41.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:bluez-5.48-150000.5.41.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:bluez-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:bluez-devel-5.48-150000.5.41.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:bluez-devel-5.48-150000.5.41.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:bluez-devel-5.48-150000.5.41.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:bluez-devel-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:libbluetooth3-5.48-150000.5.41.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:libbluetooth3-5.48-150000.5.41.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:libbluetooth3-5.48-150000.5.41.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:libbluetooth3-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bluez-5.48-150000.5.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bluez-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bluez-devel-5.48-150000.5.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bluez-devel-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libbluetooth3-5.48-150000.5.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libbluetooth3-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:bluez-5.48-150000.5.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:bluez-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:bluez-devel-5.48-150000.5.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:bluez-devel-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:libbluetooth3-5.48-150000.5.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:libbluetooth3-5.48-150000.5.41.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-26558",
"url": "https://www.suse.com/security/cve/CVE-2020-26558"
},
{
"category": "external",
"summary": "SUSE Bug 1179610 for CVE-2020-26558",
"url": "https://bugzilla.suse.com/1179610"
},
{
"category": "external",
"summary": "SUSE Bug 1186463 for CVE-2020-26558",
"url": "https://bugzilla.suse.com/1186463"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 6:bluez-5.48-150000.5.41.1.aarch64",
"SUSE Enterprise Storage 6:bluez-5.48-150000.5.41.1.x86_64",
"SUSE Enterprise Storage 6:bluez-devel-5.48-150000.5.41.1.aarch64",
"SUSE Enterprise Storage 6:bluez-devel-5.48-150000.5.41.1.x86_64",
"SUSE Enterprise Storage 6:libbluetooth3-5.48-150000.5.41.1.aarch64",
"SUSE Enterprise Storage 6:libbluetooth3-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:bluez-5.48-150000.5.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:bluez-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:bluez-devel-5.48-150000.5.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:bluez-devel-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:libbluetooth3-5.48-150000.5.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:libbluetooth3-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bluez-5.48-150000.5.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bluez-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bluez-devel-5.48-150000.5.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bluez-devel-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libbluetooth3-5.48-150000.5.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libbluetooth3-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:bluez-5.48-150000.5.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:bluez-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:bluez-devel-5.48-150000.5.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:bluez-devel-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:libbluetooth3-5.48-150000.5.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:libbluetooth3-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:bluez-5.48-150000.5.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:bluez-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:bluez-devel-5.48-150000.5.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:bluez-devel-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:libbluetooth3-5.48-150000.5.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:libbluetooth3-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:bluez-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:bluez-devel-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:libbluetooth3-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bluez-5.48-150000.5.41.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bluez-5.48-150000.5.41.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bluez-5.48-150000.5.41.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bluez-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bluez-devel-5.48-150000.5.41.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bluez-devel-5.48-150000.5.41.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bluez-devel-5.48-150000.5.41.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bluez-devel-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libbluetooth3-5.48-150000.5.41.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libbluetooth3-5.48-150000.5.41.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libbluetooth3-5.48-150000.5.41.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libbluetooth3-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:bluez-5.48-150000.5.41.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:bluez-5.48-150000.5.41.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:bluez-5.48-150000.5.41.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:bluez-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:bluez-devel-5.48-150000.5.41.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:bluez-devel-5.48-150000.5.41.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:bluez-devel-5.48-150000.5.41.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:bluez-devel-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:libbluetooth3-5.48-150000.5.41.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:libbluetooth3-5.48-150000.5.41.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:libbluetooth3-5.48-150000.5.41.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:libbluetooth3-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bluez-5.48-150000.5.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bluez-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bluez-devel-5.48-150000.5.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bluez-devel-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libbluetooth3-5.48-150000.5.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libbluetooth3-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:bluez-5.48-150000.5.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:bluez-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:bluez-devel-5.48-150000.5.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:bluez-devel-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:libbluetooth3-5.48-150000.5.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:libbluetooth3-5.48-150000.5.41.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 6:bluez-5.48-150000.5.41.1.aarch64",
"SUSE Enterprise Storage 6:bluez-5.48-150000.5.41.1.x86_64",
"SUSE Enterprise Storage 6:bluez-devel-5.48-150000.5.41.1.aarch64",
"SUSE Enterprise Storage 6:bluez-devel-5.48-150000.5.41.1.x86_64",
"SUSE Enterprise Storage 6:libbluetooth3-5.48-150000.5.41.1.aarch64",
"SUSE Enterprise Storage 6:libbluetooth3-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:bluez-5.48-150000.5.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:bluez-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:bluez-devel-5.48-150000.5.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:bluez-devel-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:libbluetooth3-5.48-150000.5.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:libbluetooth3-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bluez-5.48-150000.5.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bluez-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bluez-devel-5.48-150000.5.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bluez-devel-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libbluetooth3-5.48-150000.5.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libbluetooth3-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:bluez-5.48-150000.5.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:bluez-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:bluez-devel-5.48-150000.5.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:bluez-devel-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:libbluetooth3-5.48-150000.5.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:libbluetooth3-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:bluez-5.48-150000.5.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:bluez-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:bluez-devel-5.48-150000.5.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:bluez-devel-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:libbluetooth3-5.48-150000.5.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:libbluetooth3-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:bluez-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:bluez-devel-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:libbluetooth3-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bluez-5.48-150000.5.41.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bluez-5.48-150000.5.41.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bluez-5.48-150000.5.41.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bluez-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bluez-devel-5.48-150000.5.41.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bluez-devel-5.48-150000.5.41.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bluez-devel-5.48-150000.5.41.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bluez-devel-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libbluetooth3-5.48-150000.5.41.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libbluetooth3-5.48-150000.5.41.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libbluetooth3-5.48-150000.5.41.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libbluetooth3-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:bluez-5.48-150000.5.41.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:bluez-5.48-150000.5.41.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:bluez-5.48-150000.5.41.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:bluez-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:bluez-devel-5.48-150000.5.41.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:bluez-devel-5.48-150000.5.41.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:bluez-devel-5.48-150000.5.41.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:bluez-devel-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:libbluetooth3-5.48-150000.5.41.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:libbluetooth3-5.48-150000.5.41.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:libbluetooth3-5.48-150000.5.41.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:libbluetooth3-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bluez-5.48-150000.5.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bluez-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bluez-devel-5.48-150000.5.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bluez-devel-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libbluetooth3-5.48-150000.5.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libbluetooth3-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:bluez-5.48-150000.5.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:bluez-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:bluez-devel-5.48-150000.5.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:bluez-devel-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:libbluetooth3-5.48-150000.5.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:libbluetooth3-5.48-150000.5.41.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-10-21T12:05:54Z",
"details": "moderate"
}
],
"title": "CVE-2020-26558"
},
{
"cve": "CVE-2021-0129",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-0129"
}
],
"notes": [
{
"category": "general",
"text": "Improper access control in BlueZ may allow an authenticated user to potentially enable information disclosure via adjacent access.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 6:bluez-5.48-150000.5.41.1.aarch64",
"SUSE Enterprise Storage 6:bluez-5.48-150000.5.41.1.x86_64",
"SUSE Enterprise Storage 6:bluez-devel-5.48-150000.5.41.1.aarch64",
"SUSE Enterprise Storage 6:bluez-devel-5.48-150000.5.41.1.x86_64",
"SUSE Enterprise Storage 6:libbluetooth3-5.48-150000.5.41.1.aarch64",
"SUSE Enterprise Storage 6:libbluetooth3-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:bluez-5.48-150000.5.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:bluez-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:bluez-devel-5.48-150000.5.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:bluez-devel-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:libbluetooth3-5.48-150000.5.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:libbluetooth3-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bluez-5.48-150000.5.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bluez-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bluez-devel-5.48-150000.5.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bluez-devel-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libbluetooth3-5.48-150000.5.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libbluetooth3-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:bluez-5.48-150000.5.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:bluez-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:bluez-devel-5.48-150000.5.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:bluez-devel-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:libbluetooth3-5.48-150000.5.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:libbluetooth3-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:bluez-5.48-150000.5.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:bluez-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:bluez-devel-5.48-150000.5.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:bluez-devel-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:libbluetooth3-5.48-150000.5.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:libbluetooth3-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:bluez-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:bluez-devel-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:libbluetooth3-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bluez-5.48-150000.5.41.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bluez-5.48-150000.5.41.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bluez-5.48-150000.5.41.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bluez-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bluez-devel-5.48-150000.5.41.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bluez-devel-5.48-150000.5.41.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bluez-devel-5.48-150000.5.41.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bluez-devel-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libbluetooth3-5.48-150000.5.41.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libbluetooth3-5.48-150000.5.41.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libbluetooth3-5.48-150000.5.41.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libbluetooth3-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:bluez-5.48-150000.5.41.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:bluez-5.48-150000.5.41.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:bluez-5.48-150000.5.41.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:bluez-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:bluez-devel-5.48-150000.5.41.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:bluez-devel-5.48-150000.5.41.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:bluez-devel-5.48-150000.5.41.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:bluez-devel-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:libbluetooth3-5.48-150000.5.41.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:libbluetooth3-5.48-150000.5.41.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:libbluetooth3-5.48-150000.5.41.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:libbluetooth3-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bluez-5.48-150000.5.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bluez-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bluez-devel-5.48-150000.5.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bluez-devel-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libbluetooth3-5.48-150000.5.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libbluetooth3-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:bluez-5.48-150000.5.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:bluez-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:bluez-devel-5.48-150000.5.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:bluez-devel-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:libbluetooth3-5.48-150000.5.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:libbluetooth3-5.48-150000.5.41.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-0129",
"url": "https://www.suse.com/security/cve/CVE-2021-0129"
},
{
"category": "external",
"summary": "SUSE Bug 1186463 for CVE-2021-0129",
"url": "https://bugzilla.suse.com/1186463"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 6:bluez-5.48-150000.5.41.1.aarch64",
"SUSE Enterprise Storage 6:bluez-5.48-150000.5.41.1.x86_64",
"SUSE Enterprise Storage 6:bluez-devel-5.48-150000.5.41.1.aarch64",
"SUSE Enterprise Storage 6:bluez-devel-5.48-150000.5.41.1.x86_64",
"SUSE Enterprise Storage 6:libbluetooth3-5.48-150000.5.41.1.aarch64",
"SUSE Enterprise Storage 6:libbluetooth3-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:bluez-5.48-150000.5.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:bluez-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:bluez-devel-5.48-150000.5.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:bluez-devel-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:libbluetooth3-5.48-150000.5.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:libbluetooth3-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bluez-5.48-150000.5.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bluez-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bluez-devel-5.48-150000.5.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bluez-devel-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libbluetooth3-5.48-150000.5.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libbluetooth3-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:bluez-5.48-150000.5.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:bluez-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:bluez-devel-5.48-150000.5.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:bluez-devel-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:libbluetooth3-5.48-150000.5.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:libbluetooth3-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:bluez-5.48-150000.5.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:bluez-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:bluez-devel-5.48-150000.5.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:bluez-devel-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:libbluetooth3-5.48-150000.5.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:libbluetooth3-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:bluez-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:bluez-devel-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:libbluetooth3-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bluez-5.48-150000.5.41.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bluez-5.48-150000.5.41.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bluez-5.48-150000.5.41.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bluez-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bluez-devel-5.48-150000.5.41.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bluez-devel-5.48-150000.5.41.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bluez-devel-5.48-150000.5.41.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bluez-devel-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libbluetooth3-5.48-150000.5.41.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libbluetooth3-5.48-150000.5.41.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libbluetooth3-5.48-150000.5.41.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libbluetooth3-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:bluez-5.48-150000.5.41.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:bluez-5.48-150000.5.41.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:bluez-5.48-150000.5.41.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:bluez-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:bluez-devel-5.48-150000.5.41.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:bluez-devel-5.48-150000.5.41.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:bluez-devel-5.48-150000.5.41.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:bluez-devel-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:libbluetooth3-5.48-150000.5.41.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:libbluetooth3-5.48-150000.5.41.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:libbluetooth3-5.48-150000.5.41.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:libbluetooth3-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bluez-5.48-150000.5.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bluez-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bluez-devel-5.48-150000.5.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bluez-devel-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libbluetooth3-5.48-150000.5.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libbluetooth3-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:bluez-5.48-150000.5.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:bluez-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:bluez-devel-5.48-150000.5.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:bluez-devel-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:libbluetooth3-5.48-150000.5.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:libbluetooth3-5.48-150000.5.41.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 6:bluez-5.48-150000.5.41.1.aarch64",
"SUSE Enterprise Storage 6:bluez-5.48-150000.5.41.1.x86_64",
"SUSE Enterprise Storage 6:bluez-devel-5.48-150000.5.41.1.aarch64",
"SUSE Enterprise Storage 6:bluez-devel-5.48-150000.5.41.1.x86_64",
"SUSE Enterprise Storage 6:libbluetooth3-5.48-150000.5.41.1.aarch64",
"SUSE Enterprise Storage 6:libbluetooth3-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:bluez-5.48-150000.5.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:bluez-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:bluez-devel-5.48-150000.5.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:bluez-devel-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:libbluetooth3-5.48-150000.5.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:libbluetooth3-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bluez-5.48-150000.5.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bluez-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bluez-devel-5.48-150000.5.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bluez-devel-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libbluetooth3-5.48-150000.5.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libbluetooth3-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:bluez-5.48-150000.5.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:bluez-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:bluez-devel-5.48-150000.5.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:bluez-devel-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:libbluetooth3-5.48-150000.5.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:libbluetooth3-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:bluez-5.48-150000.5.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:bluez-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:bluez-devel-5.48-150000.5.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:bluez-devel-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:libbluetooth3-5.48-150000.5.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:libbluetooth3-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:bluez-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:bluez-devel-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:libbluetooth3-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bluez-5.48-150000.5.41.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bluez-5.48-150000.5.41.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bluez-5.48-150000.5.41.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bluez-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bluez-devel-5.48-150000.5.41.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bluez-devel-5.48-150000.5.41.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bluez-devel-5.48-150000.5.41.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bluez-devel-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libbluetooth3-5.48-150000.5.41.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libbluetooth3-5.48-150000.5.41.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libbluetooth3-5.48-150000.5.41.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libbluetooth3-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:bluez-5.48-150000.5.41.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:bluez-5.48-150000.5.41.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:bluez-5.48-150000.5.41.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:bluez-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:bluez-devel-5.48-150000.5.41.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:bluez-devel-5.48-150000.5.41.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:bluez-devel-5.48-150000.5.41.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:bluez-devel-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:libbluetooth3-5.48-150000.5.41.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:libbluetooth3-5.48-150000.5.41.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:libbluetooth3-5.48-150000.5.41.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:libbluetooth3-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bluez-5.48-150000.5.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bluez-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bluez-devel-5.48-150000.5.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bluez-devel-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libbluetooth3-5.48-150000.5.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libbluetooth3-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:bluez-5.48-150000.5.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:bluez-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:bluez-devel-5.48-150000.5.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:bluez-devel-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:libbluetooth3-5.48-150000.5.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:libbluetooth3-5.48-150000.5.41.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-10-21T12:05:54Z",
"details": "moderate"
}
],
"title": "CVE-2021-0129"
},
{
"cve": "CVE-2021-3658",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3658"
}
],
"notes": [
{
"category": "general",
"text": "bluetoothd from bluez incorrectly saves adapters\u0027 Discoverable status when a device is powered down, and restores it when powered up. If a device is powered down while discoverable, it will be discoverable when powered on again. This could lead to inadvertent exposure of the bluetooth stack to physically nearby attackers.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 6:bluez-5.48-150000.5.41.1.aarch64",
"SUSE Enterprise Storage 6:bluez-5.48-150000.5.41.1.x86_64",
"SUSE Enterprise Storage 6:bluez-devel-5.48-150000.5.41.1.aarch64",
"SUSE Enterprise Storage 6:bluez-devel-5.48-150000.5.41.1.x86_64",
"SUSE Enterprise Storage 6:libbluetooth3-5.48-150000.5.41.1.aarch64",
"SUSE Enterprise Storage 6:libbluetooth3-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:bluez-5.48-150000.5.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:bluez-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:bluez-devel-5.48-150000.5.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:bluez-devel-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:libbluetooth3-5.48-150000.5.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:libbluetooth3-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bluez-5.48-150000.5.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bluez-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bluez-devel-5.48-150000.5.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bluez-devel-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libbluetooth3-5.48-150000.5.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libbluetooth3-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:bluez-5.48-150000.5.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:bluez-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:bluez-devel-5.48-150000.5.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:bluez-devel-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:libbluetooth3-5.48-150000.5.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:libbluetooth3-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:bluez-5.48-150000.5.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:bluez-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:bluez-devel-5.48-150000.5.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:bluez-devel-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:libbluetooth3-5.48-150000.5.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:libbluetooth3-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:bluez-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:bluez-devel-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:libbluetooth3-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bluez-5.48-150000.5.41.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bluez-5.48-150000.5.41.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bluez-5.48-150000.5.41.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bluez-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bluez-devel-5.48-150000.5.41.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bluez-devel-5.48-150000.5.41.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bluez-devel-5.48-150000.5.41.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bluez-devel-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libbluetooth3-5.48-150000.5.41.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libbluetooth3-5.48-150000.5.41.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libbluetooth3-5.48-150000.5.41.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libbluetooth3-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:bluez-5.48-150000.5.41.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:bluez-5.48-150000.5.41.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:bluez-5.48-150000.5.41.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:bluez-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:bluez-devel-5.48-150000.5.41.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:bluez-devel-5.48-150000.5.41.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:bluez-devel-5.48-150000.5.41.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:bluez-devel-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:libbluetooth3-5.48-150000.5.41.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:libbluetooth3-5.48-150000.5.41.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:libbluetooth3-5.48-150000.5.41.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:libbluetooth3-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bluez-5.48-150000.5.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bluez-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bluez-devel-5.48-150000.5.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bluez-devel-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libbluetooth3-5.48-150000.5.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libbluetooth3-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:bluez-5.48-150000.5.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:bluez-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:bluez-devel-5.48-150000.5.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:bluez-devel-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:libbluetooth3-5.48-150000.5.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:libbluetooth3-5.48-150000.5.41.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3658",
"url": "https://www.suse.com/security/cve/CVE-2021-3658"
},
{
"category": "external",
"summary": "SUSE Bug 1188859 for CVE-2021-3658",
"url": "https://bugzilla.suse.com/1188859"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 6:bluez-5.48-150000.5.41.1.aarch64",
"SUSE Enterprise Storage 6:bluez-5.48-150000.5.41.1.x86_64",
"SUSE Enterprise Storage 6:bluez-devel-5.48-150000.5.41.1.aarch64",
"SUSE Enterprise Storage 6:bluez-devel-5.48-150000.5.41.1.x86_64",
"SUSE Enterprise Storage 6:libbluetooth3-5.48-150000.5.41.1.aarch64",
"SUSE Enterprise Storage 6:libbluetooth3-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:bluez-5.48-150000.5.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:bluez-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:bluez-devel-5.48-150000.5.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:bluez-devel-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:libbluetooth3-5.48-150000.5.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:libbluetooth3-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bluez-5.48-150000.5.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bluez-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bluez-devel-5.48-150000.5.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bluez-devel-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libbluetooth3-5.48-150000.5.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libbluetooth3-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:bluez-5.48-150000.5.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:bluez-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:bluez-devel-5.48-150000.5.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:bluez-devel-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:libbluetooth3-5.48-150000.5.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:libbluetooth3-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:bluez-5.48-150000.5.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:bluez-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:bluez-devel-5.48-150000.5.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:bluez-devel-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:libbluetooth3-5.48-150000.5.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:libbluetooth3-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:bluez-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:bluez-devel-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:libbluetooth3-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bluez-5.48-150000.5.41.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bluez-5.48-150000.5.41.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bluez-5.48-150000.5.41.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bluez-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bluez-devel-5.48-150000.5.41.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bluez-devel-5.48-150000.5.41.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bluez-devel-5.48-150000.5.41.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bluez-devel-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libbluetooth3-5.48-150000.5.41.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libbluetooth3-5.48-150000.5.41.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libbluetooth3-5.48-150000.5.41.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libbluetooth3-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:bluez-5.48-150000.5.41.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:bluez-5.48-150000.5.41.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:bluez-5.48-150000.5.41.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:bluez-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:bluez-devel-5.48-150000.5.41.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:bluez-devel-5.48-150000.5.41.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:bluez-devel-5.48-150000.5.41.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:bluez-devel-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:libbluetooth3-5.48-150000.5.41.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:libbluetooth3-5.48-150000.5.41.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:libbluetooth3-5.48-150000.5.41.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:libbluetooth3-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bluez-5.48-150000.5.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bluez-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bluez-devel-5.48-150000.5.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bluez-devel-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libbluetooth3-5.48-150000.5.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libbluetooth3-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:bluez-5.48-150000.5.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:bluez-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:bluez-devel-5.48-150000.5.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:bluez-devel-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:libbluetooth3-5.48-150000.5.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:libbluetooth3-5.48-150000.5.41.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 6:bluez-5.48-150000.5.41.1.aarch64",
"SUSE Enterprise Storage 6:bluez-5.48-150000.5.41.1.x86_64",
"SUSE Enterprise Storage 6:bluez-devel-5.48-150000.5.41.1.aarch64",
"SUSE Enterprise Storage 6:bluez-devel-5.48-150000.5.41.1.x86_64",
"SUSE Enterprise Storage 6:libbluetooth3-5.48-150000.5.41.1.aarch64",
"SUSE Enterprise Storage 6:libbluetooth3-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:bluez-5.48-150000.5.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:bluez-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:bluez-devel-5.48-150000.5.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:bluez-devel-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:libbluetooth3-5.48-150000.5.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:libbluetooth3-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bluez-5.48-150000.5.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bluez-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bluez-devel-5.48-150000.5.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bluez-devel-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libbluetooth3-5.48-150000.5.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libbluetooth3-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:bluez-5.48-150000.5.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:bluez-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:bluez-devel-5.48-150000.5.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:bluez-devel-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:libbluetooth3-5.48-150000.5.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:libbluetooth3-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:bluez-5.48-150000.5.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:bluez-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:bluez-devel-5.48-150000.5.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:bluez-devel-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:libbluetooth3-5.48-150000.5.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:libbluetooth3-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:bluez-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:bluez-devel-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:libbluetooth3-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bluez-5.48-150000.5.41.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bluez-5.48-150000.5.41.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bluez-5.48-150000.5.41.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bluez-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bluez-devel-5.48-150000.5.41.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bluez-devel-5.48-150000.5.41.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bluez-devel-5.48-150000.5.41.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bluez-devel-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libbluetooth3-5.48-150000.5.41.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libbluetooth3-5.48-150000.5.41.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libbluetooth3-5.48-150000.5.41.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libbluetooth3-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:bluez-5.48-150000.5.41.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:bluez-5.48-150000.5.41.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:bluez-5.48-150000.5.41.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:bluez-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:bluez-devel-5.48-150000.5.41.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:bluez-devel-5.48-150000.5.41.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:bluez-devel-5.48-150000.5.41.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:bluez-devel-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:libbluetooth3-5.48-150000.5.41.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:libbluetooth3-5.48-150000.5.41.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:libbluetooth3-5.48-150000.5.41.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:libbluetooth3-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bluez-5.48-150000.5.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bluez-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bluez-devel-5.48-150000.5.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bluez-devel-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libbluetooth3-5.48-150000.5.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libbluetooth3-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:bluez-5.48-150000.5.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:bluez-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:bluez-devel-5.48-150000.5.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:bluez-devel-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:libbluetooth3-5.48-150000.5.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:libbluetooth3-5.48-150000.5.41.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-10-21T12:05:54Z",
"details": "moderate"
}
],
"title": "CVE-2021-3658"
},
{
"cve": "CVE-2021-43400",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-43400"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in gatt-database.c in BlueZ 5.61. A use-after-free can occur when a client disconnects during D-Bus processing of a WriteValue call.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 6:bluez-5.48-150000.5.41.1.aarch64",
"SUSE Enterprise Storage 6:bluez-5.48-150000.5.41.1.x86_64",
"SUSE Enterprise Storage 6:bluez-devel-5.48-150000.5.41.1.aarch64",
"SUSE Enterprise Storage 6:bluez-devel-5.48-150000.5.41.1.x86_64",
"SUSE Enterprise Storage 6:libbluetooth3-5.48-150000.5.41.1.aarch64",
"SUSE Enterprise Storage 6:libbluetooth3-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:bluez-5.48-150000.5.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:bluez-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:bluez-devel-5.48-150000.5.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:bluez-devel-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:libbluetooth3-5.48-150000.5.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:libbluetooth3-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bluez-5.48-150000.5.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bluez-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bluez-devel-5.48-150000.5.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bluez-devel-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libbluetooth3-5.48-150000.5.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libbluetooth3-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:bluez-5.48-150000.5.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:bluez-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:bluez-devel-5.48-150000.5.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:bluez-devel-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:libbluetooth3-5.48-150000.5.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:libbluetooth3-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:bluez-5.48-150000.5.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:bluez-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:bluez-devel-5.48-150000.5.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:bluez-devel-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:libbluetooth3-5.48-150000.5.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:libbluetooth3-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:bluez-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:bluez-devel-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:libbluetooth3-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bluez-5.48-150000.5.41.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bluez-5.48-150000.5.41.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bluez-5.48-150000.5.41.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bluez-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bluez-devel-5.48-150000.5.41.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bluez-devel-5.48-150000.5.41.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bluez-devel-5.48-150000.5.41.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bluez-devel-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libbluetooth3-5.48-150000.5.41.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libbluetooth3-5.48-150000.5.41.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libbluetooth3-5.48-150000.5.41.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libbluetooth3-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:bluez-5.48-150000.5.41.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:bluez-5.48-150000.5.41.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:bluez-5.48-150000.5.41.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:bluez-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:bluez-devel-5.48-150000.5.41.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:bluez-devel-5.48-150000.5.41.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:bluez-devel-5.48-150000.5.41.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:bluez-devel-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:libbluetooth3-5.48-150000.5.41.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:libbluetooth3-5.48-150000.5.41.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:libbluetooth3-5.48-150000.5.41.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:libbluetooth3-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bluez-5.48-150000.5.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bluez-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bluez-devel-5.48-150000.5.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bluez-devel-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libbluetooth3-5.48-150000.5.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libbluetooth3-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:bluez-5.48-150000.5.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:bluez-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:bluez-devel-5.48-150000.5.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:bluez-devel-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:libbluetooth3-5.48-150000.5.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:libbluetooth3-5.48-150000.5.41.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-43400",
"url": "https://www.suse.com/security/cve/CVE-2021-43400"
},
{
"category": "external",
"summary": "SUSE Bug 1192394 for CVE-2021-43400",
"url": "https://bugzilla.suse.com/1192394"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 6:bluez-5.48-150000.5.41.1.aarch64",
"SUSE Enterprise Storage 6:bluez-5.48-150000.5.41.1.x86_64",
"SUSE Enterprise Storage 6:bluez-devel-5.48-150000.5.41.1.aarch64",
"SUSE Enterprise Storage 6:bluez-devel-5.48-150000.5.41.1.x86_64",
"SUSE Enterprise Storage 6:libbluetooth3-5.48-150000.5.41.1.aarch64",
"SUSE Enterprise Storage 6:libbluetooth3-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:bluez-5.48-150000.5.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:bluez-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:bluez-devel-5.48-150000.5.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:bluez-devel-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:libbluetooth3-5.48-150000.5.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:libbluetooth3-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bluez-5.48-150000.5.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bluez-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bluez-devel-5.48-150000.5.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bluez-devel-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libbluetooth3-5.48-150000.5.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libbluetooth3-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:bluez-5.48-150000.5.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:bluez-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:bluez-devel-5.48-150000.5.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:bluez-devel-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:libbluetooth3-5.48-150000.5.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:libbluetooth3-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:bluez-5.48-150000.5.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:bluez-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:bluez-devel-5.48-150000.5.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:bluez-devel-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:libbluetooth3-5.48-150000.5.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:libbluetooth3-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:bluez-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:bluez-devel-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:libbluetooth3-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bluez-5.48-150000.5.41.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bluez-5.48-150000.5.41.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bluez-5.48-150000.5.41.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bluez-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bluez-devel-5.48-150000.5.41.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bluez-devel-5.48-150000.5.41.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bluez-devel-5.48-150000.5.41.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bluez-devel-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libbluetooth3-5.48-150000.5.41.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libbluetooth3-5.48-150000.5.41.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libbluetooth3-5.48-150000.5.41.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libbluetooth3-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:bluez-5.48-150000.5.41.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:bluez-5.48-150000.5.41.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:bluez-5.48-150000.5.41.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:bluez-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:bluez-devel-5.48-150000.5.41.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:bluez-devel-5.48-150000.5.41.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:bluez-devel-5.48-150000.5.41.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:bluez-devel-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:libbluetooth3-5.48-150000.5.41.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:libbluetooth3-5.48-150000.5.41.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:libbluetooth3-5.48-150000.5.41.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:libbluetooth3-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bluez-5.48-150000.5.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bluez-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bluez-devel-5.48-150000.5.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bluez-devel-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libbluetooth3-5.48-150000.5.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libbluetooth3-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:bluez-5.48-150000.5.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:bluez-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:bluez-devel-5.48-150000.5.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:bluez-devel-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:libbluetooth3-5.48-150000.5.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:libbluetooth3-5.48-150000.5.41.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 6:bluez-5.48-150000.5.41.1.aarch64",
"SUSE Enterprise Storage 6:bluez-5.48-150000.5.41.1.x86_64",
"SUSE Enterprise Storage 6:bluez-devel-5.48-150000.5.41.1.aarch64",
"SUSE Enterprise Storage 6:bluez-devel-5.48-150000.5.41.1.x86_64",
"SUSE Enterprise Storage 6:libbluetooth3-5.48-150000.5.41.1.aarch64",
"SUSE Enterprise Storage 6:libbluetooth3-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:bluez-5.48-150000.5.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:bluez-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:bluez-devel-5.48-150000.5.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:bluez-devel-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:libbluetooth3-5.48-150000.5.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:libbluetooth3-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bluez-5.48-150000.5.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bluez-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bluez-devel-5.48-150000.5.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:bluez-devel-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libbluetooth3-5.48-150000.5.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libbluetooth3-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:bluez-5.48-150000.5.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:bluez-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:bluez-devel-5.48-150000.5.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:bluez-devel-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:libbluetooth3-5.48-150000.5.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:libbluetooth3-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:bluez-5.48-150000.5.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:bluez-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:bluez-devel-5.48-150000.5.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:bluez-devel-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:libbluetooth3-5.48-150000.5.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:libbluetooth3-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:bluez-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:bluez-devel-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:libbluetooth3-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bluez-5.48-150000.5.41.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bluez-5.48-150000.5.41.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bluez-5.48-150000.5.41.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bluez-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bluez-devel-5.48-150000.5.41.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bluez-devel-5.48-150000.5.41.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bluez-devel-5.48-150000.5.41.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:bluez-devel-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libbluetooth3-5.48-150000.5.41.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libbluetooth3-5.48-150000.5.41.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libbluetooth3-5.48-150000.5.41.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:libbluetooth3-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:bluez-5.48-150000.5.41.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:bluez-5.48-150000.5.41.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:bluez-5.48-150000.5.41.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:bluez-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:bluez-devel-5.48-150000.5.41.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:bluez-devel-5.48-150000.5.41.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:bluez-devel-5.48-150000.5.41.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:bluez-devel-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:libbluetooth3-5.48-150000.5.41.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:libbluetooth3-5.48-150000.5.41.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:libbluetooth3-5.48-150000.5.41.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:libbluetooth3-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bluez-5.48-150000.5.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bluez-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bluez-devel-5.48-150000.5.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:bluez-devel-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libbluetooth3-5.48-150000.5.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:libbluetooth3-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:bluez-5.48-150000.5.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:bluez-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:bluez-devel-5.48-150000.5.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:bluez-devel-5.48-150000.5.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:libbluetooth3-5.48-150000.5.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:libbluetooth3-5.48-150000.5.41.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-10-21T12:05:54Z",
"details": "moderate"
}
],
"title": "CVE-2021-43400"
}
]
}
suse-su-2021:2184-1
Vulnerability from csaf_suse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel",
"title": "Title of the patch"
},
{
"category": "description",
"text": "The SUSE Linux Enterprise 15 SP3 kernel was updated to receive various security and bugfixes.\n\n\nThe following security bugs were fixed:\n\n- CVE-2020-26558: Bluetooth LE and BR/EDR secure pairing in Bluetooth Core Specification 2.1 may permit a nearby man-in-the-middle attacker to identify the Passkey used during pairing by reflection of the public key and the authentication evidence of the initiating device, potentially permitting this attacker to complete authenticated pairing with the responding device using the correct Passkey for the pairing session. (bnc#1179610 bnc#1186463)\n- CVE-2021-0129: Improper access control in BlueZ may have allowed an authenticated user to potentially enable information disclosure via adjacent access (bnc#1186463).\n- CVE-2020-36385: Fixed a use-after-free in drivers/infiniband/core/ucma.c which could be triggered if the ctx is reached via the ctx_list in some ucma_migrate_id situations where ucma_close is called (bnc#1187050).\n- CVE-2020-36386: Fixed a slab out-of-bounds read in hci_extended_inquiry_result_evt (bnc#1187038).\n\nThe following non-security bugs were fixed:\n\n- ACPICA: Clean up context mutex during object deletion (git-fixes).\n- ALSA: hda/cirrus: Set Initial DMIC volume to -26 dB (git-fixes).\n- ALSA: hda: Fix for mute key LED for HP Pavilion 15-CK0xx (git-fixes).\n- ALSA: hda: Fix for mute key LED for HP Pavilion 15-CK0xx (git-fixes).\n- ALSA: hda/realtek: fix mute/micmute LEDs and speaker for HP EliteBook x360 1040 G8 (git-fixes).\n- ALSA: hda/realtek: fix mute/micmute LEDs and speaker for HP Elite Dragonfly G2 (git-fixes).\n- ALSA: hda/realtek: fix mute/micmute LEDs for HP EliteBook 840 Aero G8 (git-fixes).\n- ALSA: hda/realtek: fix mute/micmute LEDs for HP ZBook Power G8 (git-fixes).\n- ALSA: hda/realtek: headphone and mic do not work on an Acer laptop (git-fixes).\n- ALSA: hda: update the power_state during the direct-complete (git-fixes).\n- ALSA: seq: Fix race of snd_seq_timer_open() (git-fixes).\n- ALSA: timer: Fix master timer notification (git-fixes).\n- arm64: Add missing ISB after invalidating TLB in __primary_switch (git-fixes).\n- arm64: avoid -Woverride-init warning (git-fixes).\n- arm64: kasan: fix page_alloc tagging with DEBUG_VIRTUAL (git-fixes).\n- arm64: kdump: update ppos when reading elfcorehdr (git-fixes).\n- arm64: kexec_file: fix memory leakage in create_dtb() when fdt_open_into() fails (git-fixes).\n- arm64: link with -z norelro for LLD or aarch64-elf (git-fixes).\n- arm64: link with -z norelro regardless of CONFIG_RELOCATABLE (git-fixes).\n- arm64/mm: Fix pfn_valid() for ZONE_DEVICE based memory (git-fixes).\n- arm64: ptrace: Fix seccomp of traced syscall -1 (NO_SYSCALL) (git-fixes).\n- arm64: ptrace: Use NO_SYSCALL instead of -1 in syscall_trace_enter() (git-fixes).\n- ARM64: vdso32: Install vdso32 from vdso_install (git-fixes).\n- arm64: vdso32: make vdso32 install conditional (git-fixes).\n- arm: mm: use __pfn_to_section() to get mem_section (git-fixes).\n- ASoC: amd: fix for pcm_read() error (git-fixes).\n- ASoC: cs43130: handle errors in cs43130_probe() properly (git-fixes).\n- ASoC: Intel: soc-acpi: remove TGL RVP mixed SoundWire/TDM config (git-fixes).\n- ASoC: max98088: fix ni clock divider calculation (git-fixes).\n- ath6kl: return error code in ath6kl_wmi_set_roam_lrssi_cmd() (git-fixes).\n- bcache: avoid oversized read request in cache missing code path (bsc#1187357, bsc#1185570, bsc#1184631).\n- bcache: Convert to DEFINE_SHOW_ATTRIBUTE (bsc#1187357).\n- bcache: do not pass BIOSET_NEED_BVECS for the \u0027bio_set\u0027 embedded in \u0027cache_set\u0027 (bsc#1187357).\n- bcache: fix a regression of code compiling failure in debug.c (bsc#1187357).\n- bcache: inherit the optimal I/O size (bsc#1187357).\n- bcache: reduce redundant code in bch_cached_dev_run() (bsc#1187357).\n- bcache: remove bcache device self-defined readahead (bsc#1187357, bsc#1185570, bsc#1184631).\n- bcache: remove PTR_CACHE (bsc#1187357).\n- bcache: Use 64-bit arithmetic instead of 32-bit (bsc#1187357).\n- bcache: use NULL instead of using plain integer as pointer (bsc#1187357).\n- blk-mq: Swap two calls in blk_mq_exit_queue() (git-fixes).\n- blk-settings: align max_sectors on \u0027logical_block_size\u0027 boundary (bsc#1185195).\n- block/genhd: use atomic_t for disk_event-\u003eblock (bsc#1185497).\n- block: return the correct bvec when checking for gaps (bsc#1187143).\n- block: return the correct bvec when checking for gaps (bsc#1187144).\n- Bluetooth: fix the erroneous flush_work() order (git-fixes).\n- brcmfmac: Add clm_blob firmware files to modinfo (bsc#1186677).\n- brcmfmac: properly check for bus register errors (git-fixes).\n- btrfs: open device without device_list_mutex (bsc#1176771).\n- bus: ti-sysc: Fix flakey idling of uarts and stop using swsup_sidle_act (git-fixes).\n- cdrom: gdrom: deallocate struct gdrom_unit fields in remove_gdrom (git-fixes).\n- cdrom: gdrom: initialize global variable at init time (git-fixes).\n- ceph: do not clobber i_snap_caps on non-I_NEW inode (bsc#1186501).\n- ceph: fix inode leak on getattr error in __fh_to_dentry (bsc#1186501).\n- ceph: fix up error handling with snapdirs (bsc#1186501).\n- ceph: only check pool permissions for regular files (bsc#1186501).\n- char: hpet: add checks after calling ioremap (git-fixes).\n- chelsio/chtls: unlock on error in chtls_pt_recvmsg() (jsc#SLE-15129).\n- cxgb4: avoid accessing registers when clearing filters (git-fixes).\n- cxgb4: avoid link re-train during TC-MQPRIO configuration (jsc#SLE-8389).\n- cxgb4/ch_ktls: Clear resources when pf4 device is removed (jsc#SLE-15129).\n- cxgb4: fix regression with HASH tc prio value update (jsc#SLE-15131).\n- devlink: Correct VIRTUAL port to not have phys_port attributes (jsc#SLE-15172).\n- dmaengine: idxd: add missing dsa driver unregister (git-fixes).\n- dmaengine: idxd: Use cpu_feature_enabled() (git-fixes).\n- dmaengine: qcom_hidma: comment platform_driver_register call (git-fixes).\n- drm/amd/amdgpu: fix a potential deadlock in gpu reset (git-fixes).\n- drm/amd/amdgpu: fix refcount leak (git-fixes).\n- drm/amd/display: Disconnect non-DP with no EDID (git-fixes).\n- drm/amdgpu: Do not query CE and UE errors (git-fixes).\n- drm/amdgpu: Fix a use-after-free (git-fixes).\n- drm/amdgpu/jpeg2.0: add cancel_delayed_work_sync before power gate (git-fixes).\n- drm/amdgpu/jpeg2.5: add cancel_delayed_work_sync before power gate (git-fixes).\n- drm/amdgpu/jpeg3: add cancel_delayed_work_sync before power gate (git-fixes).\n- drm/amdgpu: make sure we unpin the UVD BO (git-fixes).\n- drm/amdgpu: stop touching sched.ready in the backend (git-fixes).\n- drm/amdgpu/vcn1: add cancel_delayed_work_sync before power gate (git-fixes).\n- drm/amdgpu/vcn2.0: add cancel_delayed_work_sync before power gate (git-fixes).\n- drm/amdgpu/vcn2.5: add cancel_delayed_work_sync before power gate (git-fixes).\n- drm/amdgpu/vcn3: add cancel_delayed_work_sync before power gate (git-fixes).\n- drm/amdkfd: correct sienna_cichlid SDMA RLC register offset error (git-fixes).\n- drm/i915/selftests: Fix return value check in live_breadcrumbs_smoketest() (git-fixes).\n- drm/mcde: Fix off by 10^3 in calculation (git-fixes).\n- drm/meson: fix shutdown crash when component not probed (git-fixes).\n- drm/msm/a6xx: fix incorrectly set uavflagprd_inv field for A650 (git-fixes).\n- drm/msm/a6xx: update/fix CP_PROTECT initialization (git-fixes).\n- efi: Allow EFI_MEMORY_XP and EFI_MEMORY_RO both to be cleared (git-fixes).\n- efi: cper: fix snprintf() use in cper_dimm_err_location() (git-fixes).\n- efi/libstub: prevent read overflow in find_file_option() (git-fixes).\n- Enable CONFIG_PCI_PF_STUB for Nvidia Ampere vGPU support (jsc#SLE-17882 jsc#ECO-3691) \n- fs/nfs: Use fatal_signal_pending instead of signal_pending (git-fixes).\n- gpio: cadence: Add missing MODULE_DEVICE_TABLE (git-fixes).\n- gpio: wcd934x: Fix shift-out-of-bounds error (git-fixes).\n- gve: Add NULL pointer checks when freeing irqs (git-fixes).\n- gve: Correct SKB queue index validation (git-fixes).\n- gve: Update mgmt_msix_idx if num_ntfy changes (git-fixes).\n- gve: Upgrade memory barrier in poll routine (git-fixes).\n- HID: i2c-hid: fix format string mismatch (git-fixes).\n- HID: i2c-hid: Skip ELAN power-on command after reset (git-fixes).\n- HID: magicmouse: fix NULL-deref on disconnect (git-fixes).\n- HID: multitouch: require Finger field to mark Win8 reports as MT (git-fixes).\n- HID: pidff: fix error return code in hid_pidff_init() (git-fixes).\n- hwmon: (dell-smm-hwmon) Fix index values (git-fixes).\n- i2c: i801: Do not generate an interrupt on bus reset (git-fixes).\n- i2c: imx: fix reference leak when pm_runtime_get_sync fails (git-fixes).\n- i2c: qcom-geni: Suspend and resume the bus during SYSTEM_SLEEP_PM ops (git-fixes).\n- i2c: s3c2410: fix possible NULL pointer deref on read message after write (git-fixes).\n- i2c: sh_mobile: Use new clock calculation formulas for RZ/G2E (git-fixes).\n- ice: Allow all LLDP packets from PF to Tx (jsc#SLE-7926).\n- ice: Fix allowing VF to request more/less queues via virtchnl (jsc#SLE-12878).\n- ice: Fix VFR issues for AVF drivers that expect ATQLEN cleared (git-fixes).\n- ice: handle the VF VSI rebuild failure (jsc#SLE-12878).\n- iio: adc: ad7124: Fix missbalanced regulator enable / disable on error (git-fixes).\n- iio: adc: ad7124: Fix potential overflow due to non sequential channel numbers (git-fixes).\n- iio: adc: ad7768-1: Fix too small buffer passed to iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: adc: ad7793: Add missing error code in ad7793_setup() (git-fixes).\n- iio: gyro: fxas21002c: balance runtime power in error path (git-fixes).\n- iommu/amd: Keep track of amd_iommu_irq_remap state (https://bugzilla.kernel.org/show_bug.cgi?id=212133).\n- iommu: Fix a boundary issue to avoid performance drop (bsc#1187344).\n- iommu/virtio: Add missing MODULE_DEVICE_TABLE (bsc#1187345).\n- iommu/vt-d: Remove WO permissions on second-level paging entries (bsc#1187346).\n- iommu/vt-d: Report right snoop capability when using FL for IOVA (bsc#1187347).\n- iommu/vt-d: Use user privilege for RID2PASID translation (bsc#1187348).\n- isdn: mISDN: correctly handle ph_info allocation failure in hfcsusb_ph_info (git-fixes).\n- isdn: mISDNinfineon: check/cleanup ioremap failure correctly in setup_io (git-fixes).\n- ixgbe: fix large MTU request from VF (git-fixes).\n- kABI workaround for rtw88 (git-fixes).\n- kABI workaround for struct lis3lv02d change (git-fixes).\n- lib: crc64: fix kernel-doc warning (bsc#1187357).\n- libertas: register sysfs groups properly (git-fixes).\n- locking/mutex: clear MUTEX_FLAGS if wait_list is empty due to signal (git-fixes).\n- md: bcache: avoid -Wempty-body warnings (bsc#1187357).\n- md: bcache: Trivial typo fixes in the file journal.c (bsc#1187357).\n- md: Fix missing unused status line of /proc/mdstat (git-fixes).\n- media: dvb: Add check on sp8870_readreg return (git-fixes).\n- media: dvb: Add check on sp8870_readreg return (git-fixes).\n- media: gspca: mt9m111: Check write_bridge for timeout (git-fixes).\n- media: gspca: mt9m111: Check write_bridge for timeout (git-fixes).\n- media: gspca: properly check for errors in po1030_probe() (git-fixes).\n- media: gspca: properly check for errors in po1030_probe() (git-fixes).\n- mei: request autosuspend after sending rx flow control (git-fixes).\n- misc/uss720: fix memory leak in uss720_probe (git-fixes).\n- mmc: sdhci: Clear unused bounce buffer at DMA mmap error path (bsc#1187039).\n- net: bnx2: Fix error return code in bnx2_init_board() (git-fixes).\n- netfilter: nf_tables: missing error reporting for not selected expressions (bsc#1176447).\n- netfilter: nft_set_pipapo_avx2: Add irq_fpu_usable() check, fallback to non-AVX2 version (bsc#1176447).\n- net: fix iteration for sctp transport seq_files (git-fixes).\n- net: hns3: fix incorrect resp_msg issue (jsc#SLE-14777).\n- net: hns3: Limiting the scope of vector_ring_chain variable (git-fixes).\n- net: hns3: put off calling register_netdev() until client initialize complete (bsc#1154353).\n- net/mlx4: Fix EEPROM dump support (git-fixes).\n- net/mlx5: DR, Create multi-destination flow table with level less than 64 (jsc#SLE-8464).\n- net/mlx5e: Fix error path of updating netdev queues (jsc#SLE-15172).\n- net/mlx5e: Fix incompatible casting (jsc#SLE-15172).\n- net/mlx5e: Fix multipath lag activation (git-fixes).\n- net/mlx5e: Fix null deref accessing lag dev (jsc#SLE-15172).\n- net/mlx5e: Fix nullptr in add_vlan_push_action() (git-fixes).\n- net/mlx5e: reset XPS on error flow if netdev isn\u0027t registered yet (jsc#SLE-15172).\n- net/mlx5: Set reformat action when needed for termination rules (jsc#SLE-15172).\n- net/mlx5: Set term table as an unmanaged flow table (jsc#SLE-15172).\n- net/sched: act_ct: Offload connections with commit action (jsc#SLE-15172).\n- net/sched: fq_pie: fix OOB access in the traffic path (jsc#SLE-15172).\n- net/sched: fq_pie: re-factor fix for fq_pie endless loop (jsc#SLE-15172).\n- net: usb: fix memory leak in smsc75xx_bind (git-fixes).\n- net: zero-initialize tc skb extension on allocation (bsc#1176447).\n- nfc: fix NULL ptr dereference in llcp_sock_getname() after failed connect (git-fixes).\n- NFC: SUSE specific brutal fix for runtime PM (bsc#1185589).\n- NFS: Deal correctly with attribute generation counter overflow (git-fixes).\n- NFS: Do not corrupt the value of pg_bytes_written in nfs_do_recoalesce() (git-fixes).\n- NFS: Do not discard pNFS layout segments that are marked for return (git-fixes).\n- NFS: Do not gratuitously clear the inode cache when lookup failed (git-fixes).\n- NFS: Do not revalidate the directory permissions on a lookup failure (git-fixes).\n- nfsd: register pernet ops last, unregister first (git-fixes).\n- NFSD: Repair misuse of sv_lock in 5.10.16-rt30 (git-fixes).\n- NFS: fix an incorrect limit in filelayout_decode_layout() (git-fixes).\n- NFS: Fix an Oopsable condition in __nfs_pageio_add_request() (git-fixes).\n- NFSv4.2: Always flush out writes in nfs42_proc_fallocate() (git-fixes).\n- NFSv42: Copy offload should update the file size when appropriate (git-fixes).\n- NFSv4.2 fix handling of sr_eof in SEEK\u0027s reply (git-fixes).\n- NFSv4.2: fix return value of _nfs4_get_security_label() (git-fixes).\n- NFSv4: Do not discard segments marked for return in _pnfs_return_layout() (git-fixes).\n- NFSv4: Fix a NULL pointer dereference in pnfs_mark_matching_lsegs_return() (git-fixes).\n- NFSv4: Fix v4.0/v4.1 SEEK_DATA return -ENOTSUPP when set NFS_V4_2 config (git-fixes).\n- nvme: add new line after variable declatation (bsc#1184259, bsc#1178612, bsc#1186155).\n- nvme: document nvme controller states (git-fixes).\n- nvme: do not check nvme_req flags for new req (bsc#1184259, bsc#1178612, bsc#1186155).\n- nvme: fix deadlock in disconnect during scan_work and/or ana_work (git-fixes).\n- nvme: mark nvme_setup_passsthru() inline (bsc#1184259, bsc#1178612, bsc#1186155).\n- nvme-multipath: fix double initialization of ANA state (bsc#1178612, bsc#1184259, bsc#1186155).\n- nvme-pci: align io queue count with allocted nvme_queue in (git-fixes).\n- nvme-pci: avoid race between nvme_reap_pending_cqes() and nvme_poll() (git-fixes).\n- nvme-pci: dma read memory barrier for completions (git-fixes).\n- nvme-pci: fix \u0027slimmer CQ head update\u0027 (git-fixes).\n- nvme-pci: make sure write/poll_queues less or equal then cpu (git-fixes).\n- nvme-pci: remove last_sq_tail (git-fixes).\n- nvme-pci: Remove tag from process cq (git-fixes).\n- nvme-pci: Remove two-pass completions (git-fixes).\n- nvme-pci: remove volatile cqes (git-fixes).\n- nvme-pci: Simplify nvme_poll_irqdisable (git-fixes).\n- nvme-pci: slimmer CQ head update (git-fixes).\n- nvme-pci: use simple suspend when a HMB is enabled (git-fixes).\n- nvme: reduce checks for zero command effects (bsc#1184259, bsc#1178612, bsc#1186155).\n- nvme: rename nvme_init_identify() (bsc#1184259, bsc#1178612, bsc#1186155).\n- nvme: split init identify into helper (bsc#1184259, bsc#1178612, bsc#1186155).\n- nvmet: use new ana_log_size instead the old one (bsc#1178612, bsc#1184259, bsc#1186155).\n- nvme: use NVME_CTRL_CMIC_ANA macro (bsc#1184259, bsc#1178612, bsc#1186155).\n- nxp-i2c: restore includes for kABI (bsc#1185589).\n- nxp-nci: add NXP1002 id (bsc#1185589).\n- PCI/LINK: Remove bandwidth notification (bsc#1183712).\n- pid: take a reference when initializing `cad_pid` (bsc#1152489).\n- platform/x86: hp_accel: Avoid invoking _INI to speed up resume (git-fixes).\n- platform/x86: hp-wireless: add AMD\u0027s hardware id to the supported list (git-fixes).\n- platform/x86: intel_punit_ipc: Append MODULE_DEVICE_TABLE for ACPI (git-fixes).\n- platform/x86: touchscreen_dmi: Add info for the Mediacom Winpad 7.0 W700 tablet (git-fixes).\n- PM: sleep: Add pm_debug_messages kernel command line option (bsc#1186752).\n- pNFS/flexfiles: fix incorrect size check in decode_nfs_fh() (git-fixes).\n- pNFS/NFSv4: Fix a layout segment leak in pnfs_layout_process() (git-fixes).\n- powerpc/32: Fix boot failure with CONFIG_STACKPROTECTOR (jsc#SLE-13847 git-fixes).\n- powerpc/kprobes: Fix validation of prefixed instructions across page boundary (jsc#SLE-13847 git-fixes).\n- regulator: core: resolve supply for boot-on/always-on regulators (git-fixes).\n- regulator: max77620: Use device_set_of_node_from_dev() (git-fixes).\n- rtw88: 8822c: add LC calibration for RTL8822C (git-fixes).\n- scsi: aacraid: Fix an oops in error handling (bsc#1187072).\n- scsi: aacraid: Remove erroneous fallthrough annotation (bsc#1186950).\n- scsi: aacraid: Use memdup_user() as a cleanup (bsc#1186951).\n- scsi: acornscsi: Fix an error handling path in acornscsi_probe() (bsc#1186952).\n- scsi: be2iscsi: Fix a theoretical leak in beiscsi_create_eqs() (bsc#1186953).\n- scsi: be2iscsi: Revert \u0027Fix a theoretical leak in beiscsi_create_eqs()\u0027 (bsc#1187067).\n- scsi: bfa: Fix error return in bfad_pci_init() (bsc#1186954).\n- scsi: bnx2fc: Fix Kconfig warning \u0026 CNIC build errors (bsc#1186955).\n- scsi: bnx2i: Requires MMU (bsc#1186956).\n- scsi: csiostor: Fix wrong return value in csio_hw_prep_fw() (bsc#1186957).\n- scsi: cumana_2: Fix different dev_id between request_irq() and free_irq() (bsc#1186958).\n- scsi: cxgb3i: Fix some leaks in init_act_open() (bsc#1186959).\n- scsi: cxgb4i: Fix TLS dependency (bsc#1186960).\n- scsi: eesox: Fix different dev_id between request_irq() and free_irq() (bsc#1186961).\n- scsi: fnic: Fix error return code in fnic_probe() (bsc#1186962).\n- scsi: hisi_sas: Fix IRQ checks (bsc#1186963).\n- scsi: hisi_sas: Remove preemptible() (bsc#1186964).\n- scsi: jazz_esp: Add IRQ check (bsc#1186965).\n- scsi: libfc: Fix enum-conversion warning (bsc#1186966).\n- scsi: libsas: Fix error path in sas_notify_lldd_dev_found() (bsc#1186967).\n- scsi: libsas: Reset num_scatter if libata marks qc as NODATA (bsc#1187068).\n- scsi: libsas: Set data_dir as DMA_NONE if libata marks qc as NODATA (bsc#1186968).\n- scsi: lpfc: Fix ancient double free (bsc#1186969).\n- scsi: lpfc: Fix failure to transmit ABTS on FC link (git-fixes).\n- scsi: megaraid_sas: Check user-provided offsets (bsc#1186970).\n- scsi: megaraid_sas: Clear affinity hint (bsc#1186971).\n- scsi: megaraid_sas: Do not call disable_irq from process IRQ poll (bsc#1186972).\n- scsi: megaraid_sas: Fix MEGASAS_IOC_FIRMWARE regression (bsc#1186973).\n- scsi: megaraid_sas: Remove undefined ENABLE_IRQ_POLL macro (bsc#1186974).\n- scsi: mesh: Fix panic after host or bus reset (bsc#1186976).\n- scsi: mpt3sas: Do not use GFP_KERNEL in atomic context (bsc#1186977).\n- scsi: mpt3sas: Fix error return code of mpt3sas_base_attach() (bsc#1186978).\n- scsi: mpt3sas: Fix ioctl timeout (bsc#1186979).\n- scsi: myrs: Fix a double free in myrs_cleanup() (bsc#1186980).\n- scsi: pm80xx: Fix error return in pm8001_pci_probe() (bsc#1186981).\n- scsi: powertec: Fix different dev_id between request_irq() and free_irq() (bsc#1186982).\n- scsi: qedi: Check for buffer overflow in qedi_set_path() (bsc#1186983).\n- scsi: qedi: Fix error return code of qedi_alloc_global_queues() (bsc#1186984).\n- scsi: qedi: Fix missing destroy_workqueue() on error in __qedi_probe (bsc#1186985).\n- scsi: qla2xxx: Prevent PRLI in target mode (git-fixes).\n- scsi: qla4xxx: Fix an error handling path in \u0027qla4xxx_get_host_stats()\u0027 (bsc#1186986).\n- scsi: qla4xxx: Remove in_interrupt() (bsc#1186987).\n- scsi: scsi_debug: Add check for sdebug_max_queue during module init (bsc#1186988).\n- scsi: scsi_dh_alua: Retry RTPG on a different path after failure (bsc#1174978 bsc#1185701).\n- scsi: sd: Fix Opal support (bsc#1186989).\n- scsi: smartpqi: Add additional logging for LUN resets (bsc#1186472).\n- scsi: smartpqi: Add host level stream detection enable (bsc#1186472).\n- scsi: smartpqi: Add new PCI IDs (bsc#1186472).\n- scsi: smartpqi: Add phy ID support for the physical drives (bsc#1186472).\n- scsi: smartpqi: Add stream detection (bsc#1186472).\n- scsi: smartpqi: Add support for BMIC sense feature cmd and feature bits (bsc#1186472).\n- scsi: smartpqi: Add support for long firmware version (bsc#1186472).\n- scsi: smartpqi: Add support for new product ids (bsc#1186472).\n- scsi: smartpqi: Add support for RAID1 writes (bsc#1186472).\n- scsi: smartpqi: Add support for RAID5 and RAID6 writes (bsc#1186472).\n- scsi: smartpqi: Add support for wwid (bsc#1186472).\n- scsi: smartpqi: Align code with oob driver (bsc#1186472).\n- scsi: smartpqi: Convert snprintf() to scnprintf() (bsc#1186472).\n- scsi: smartpqi: Correct request leakage during reset operations (bsc#1186472).\n- scsi: smartpqi: Correct system hangs when resuming from hibernation (bsc#1186472).\n- scsi: smartpqi: Disable WRITE SAME for HBA NVMe disks (bsc#1186472).\n- scsi: smartpqi: Fix blocks_per_row static checker issue (bsc#1186472).\n- scsi: smartpqi: Fix device pointer variable reference static checker issue (bsc#1186472).\n- scsi: smartpqi: Fix driver synchronization issues (bsc#1186472).\n- scsi: smartpqi: Refactor aio submission code (bsc#1186472).\n- scsi: smartpqi: Refactor scatterlist code (bsc#1186472).\n- scsi: smartpqi: Remove timeouts from internal cmds (bsc#1186472).\n- scsi: smartpqi: Remove unused functions (bsc#1186472).\n- scsi: smartpqi: Synchronize device resets with mutex (bsc#1186472).\n- scsi: smartpqi: Update device scan operations (bsc#1186472).\n- scsi: smartpqi: Update enclosure identifier in sysfs (bsc#1186472).\n- scsi: smartpqi: Update event handler (bsc#1186472).\n- scsi: smartpqi: Update OFA management (bsc#1186472).\n- scsi: smartpqi: Update RAID bypass handling (bsc#1186472).\n- scsi: smartpqi: Update SAS initiator_port_protocols and target_port_protocols (bsc#1186472).\n- scsi: smartpqi: Update soft reset management for OFA (bsc#1186472).\n- scsi: smartpqi: Update suspend/resume and shutdown (bsc#1186472).\n- scsi: smartpqi: Update version to 2.1.8-045 (bsc#1186472).\n- scsi: smartpqi: Use host-wide tag space (bsc#1186472).\n- scsi: sni_53c710: Add IRQ check (bsc#1186990).\n- scsi: sun3x_esp: Add IRQ check (bsc#1186991).\n- scsi: ufs: Add quirk to disallow reset of interrupt aggregation (bsc#1186992).\n- scsi: ufs: Add quirk to enable host controller without hce (bsc#1186993).\n- scsi: ufs: Add quirk to fix abnormal ocs fatal error (bsc#1186994).\n- scsi: ufs: Add quirk to fix mishandling utrlclr/utmrlclr (bsc#1186995).\n- scsi: ufs: core: Narrow down fast path in system suspend path (bsc#1186996).\n- scsi: ufs: Do not update urgent bkops level when toggling auto bkops (bsc#1186997).\n- scsi: ufs: Fix race between shutdown and runtime resume flow (bsc#1186998).\n- scsi: ufshcd: use an enum for quirks (bsc#1186999).\n- scsi: ufs: Introduce UFSHCD_QUIRK_PRDT_BYTE_GRAN quirk (bsc#1187000).\n- scsi: ufs: Make ufshcd_print_trs() consider UFSHCD_QUIRK_PRDT_BYTE_GRAN (bsc#1187069).\n- scsi: ufs: Properly release resources if a task is aborted successfully (bsc#1187001).\n- scsi: ufs-qcom: Fix scheduling while atomic issue (bsc#1187002).\n- scsi: ufs: ufshcd-pltfrm: Fix deferred probing (bsc#1187003).\n- serial: 8250_pci: handle FL_NOIRQ board flag (git-fixes).\n- serial: core: fix suspicious security_locked_down() call (git-fixes).\n- serial: max310x: unregister uart driver in case of failure and abort (git-fixes).\n- serial: rp2: use \u0027request_firmware\u0027 instead of \u0027request_firmware_nowait\u0027 (git-fixes).\n- serial: sh-sci: Fix off-by-one error in FIFO threshold register setting (git-fixes).\n- serial: tegra: Fix a mask operation that is always true (git-fixes).\n- staging: emxx_udc: fix loop in _nbu2ss_nuke() (git-fixes).\n- staging: iio: cdc: ad7746: avoid overwrite of num_channels (git-fixes).\n- staging: rtl8723bs: Fix uninitialized variables (git-fixes).\n- sunrpc: fix refcount leak for rpc auth modules (git-fixes).\n- SUNRPC: More fixes for backlog congestion (bsc#1185428).\n- SUNRPC: Move fault injection call sites (git-fixes).\n- SUNRPC: Set memalloc_nofs_save() for sync tasks (git-fixes).\n- svcrdma: disable timeouts on rdma backchannel (git-fixes).\n- thermal/drivers/intel: Initialize RW trip to THERMAL_TEMP_INVALID (git-fixes).\n- thunderbolt: dma_port: Fix NVM read buffer bounds and offset issue (git-fixes).\n- thunderbolt: usb4: Fix NVM read buffer bounds and offset issue (git-fixes).\n- tpm: fix error return code in tpm2_get_cc_attrs_tbl() (git-fixes).\n- ttyprintk: Add TTY hangup callback (git-fixes).\n- UCSI fixup of array of PDOs (git-fixes).\n- usb: chipidea: imx: Fix Battery Charger 1.2 CDP detection (git-fixes).\n- usb: core: reduce power-on-good delay time of root hub (git-fixes).\n- usb: dwc3: gadget: Enable suspend events (git-fixes).\n- usb: fix various gadgets null ptr deref on 10gbps cabling (git-fixes).\n- USB: f_ncm: ncm_bitrate (speed) is unsigned (git-fixes).\n- usb: gadget: udc: renesas_usb3: Fix a race in usb3_start_pipen() (git-fixes).\n- usb: musb: fix MUSB_QUIRK_B_DISCONNECT_99 handling (git-fixes).\n- usb: pd: Set PD_T_SINK_WAIT_CAP to 310ms (git-fixes).\n- USB: serial: cp210x: fix alternate function for CP2102N QFN20 (git-fixes).\n- USB: serial: ftdi_sio: add IDs for IDS GmbH Products (git-fixes).\n- USB: serial: option: add Telit LE910-S1 compositions 0x7010, 0x7011 (git-fixes).\n- USB: serial: pl2303: add device id for ADLINK ND-6530 GC (git-fixes).\n- USB: serial: quatech2: fix control-request directions (git-fixes).\n- USB: serial: ti_usb_3410_5052: add startech.com device id (git-fixes).\n- USB: trancevibrator: fix control-request direction (git-fixes).\n- usb: typec: intel_pmc_mux: Put fwnode in error case during -\u003eprobe() (git-fixes).\n- usb: typec: mux: Fix copy-paste mistake in typec_mux_match (git-fixes).\n- usb: typec: mux: Fix matching with typec_altmode_desc (git-fixes).\n- usb: typec: tcpm: Use LE to CPU conversion when accessing msg-\u003eheader (git-fixes).\n- usb: typec: ucsi: Clear PPM capability data in ucsi_init() error path (git-fixes).\n- usb: typec: ucsi: Retrieve all the PDOs instead of just the first 4 (git-fixes).\n- usb: typec: wcove: Use LE to CPU conversion when accessing msg-\u003eheader (git-fixes).\n- USB: usbfs: Do not WARN about excessively large memory allocations (git-fixes).\n- vfio/pci: Fix error return code in vfio_ecap_init() (git-fixes).\n- vfio/pci: zap_vma_ptes() needs MMU (git-fixes).\n- vfio/platform: fix module_put call in error flow (git-fixes).\n- vmlinux.lds.h: Avoid orphan section with !SMP (git-fixes).\n- vsock/vmci: log once the failed queue pair allocation (git-fixes).\n- wireguard: allowedips: initialize list head in selftest (git-fixes).\n- wireguard: do not use -O3 (git-fixes).\n- wireguard: peer: allocate in kmem_cache (git-fixes).\n- wireguard: peer: put frequently used members above cache lines (git-fixes).\n- wireguard: queueing: get rid of per-peer ring buffers (git-fixes).\n- wireguard: selftests: make sure rp_filter is disabled on vethc (git-fixes).\n- wireguard: selftests: remove old conntrack kconfig value (git-fixes).\n- wireguard: use synchronize_net rather than synchronize_rcu (git-fixes).\n- x86/apic: Mark _all_ legacy interrupts when IO/APIC is missing (bsc#1152489).\n- x86/boot/64: Explicitly map boot_params and command line (jsc#SLE-14337).\n- x86/boot/compressed/64: Add 32-bit boot #VC handler (jsc#SLE-14337).\n- x86/boot/compressed/64: Add CPUID sanity check to 32-bit boot-path (jsc#SLE-14337).\n- x86/boot/compressed/64: Check SEV encryption in 64-bit boot-path (jsc#SLE-14337).\n- x86/boot/compressed/64: Check SEV encryption in the 32-bit boot-path (jsc#SLE-14337).\n- x86/boot/compressed/64: Cleanup exception handling before booting kernel (jsc#SLE-14337).\n- x86/boot/compressed/64: Introduce sev_status (jsc#SLE-14337).\n- x86/boot/compressed/64: Reload CS in startup_32 (jsc#SLE-14337).\n- x86/boot/compressed/64: Sanity-check CPUID results in the early #VC handler (jsc#SLE-14337).\n- x86/boot/compressed/64: Setup IDT in startup_32 boot path (jsc#SLE-14337).\n- x86/cpufeatures: Force disable X86_FEATURE_ENQCMD and remove update_pasid() (bsc#1178134).\n- x86/cpu: Initialize MSR_TSC_AUX if RDTSCP *or* RDPID is supported (bsc#1152489).\n- x86/fault: Do not send SIGSEGV twice on SEGV_PKUERR (bsc#1152489).\n- x86: fix seq_file iteration for pat.c (git-fixes).\n- x86/fpu: Prevent state corruption in __fpu__restore_sig() (bsc#1178134).\n- x86/head/64: Check SEV encryption before switching to kernel page-table (jsc#SLE-14337).\n- x86/head/64: Disable stack protection for head$(BITS).o (jsc#SLE-14337).\n- x86/ioremap: Map efi_mem_reserve() memory as encrypted for SEV (bsc#1186885).\n- x86/sev: Check SME/SEV support in CPUID first (jsc#SLE-14337).\n- x86/sev: Do not require Hypervisor CPUID bit for SEV guests (jsc#SLE-14337).\n- x86/sev-es: Do not return NULL from sev_es_get_ghcb() (bsc#1187349).\n- x86/sev-es: Do not support MMIO to/from encrypted memory (jsc#SLE-14337).\n- x86/sev-es: Forward page-faults which happen during emulation (bsc#1187350).\n- x86/sev-es: Replace open-coded hlt-loops with sev_es_terminate() (jsc#SLE-14337).\n- x86/sev-es: Use __put_user()/__get_user() for data accesses (bsc#1187351).\n- xfrm: policy: Read seqcount outside of rcu-read side in xfrm_policy_lookup_bytype (bsc#1185675).\n- xprtrdma: Avoid Receive Queue wrapping (git-fixes).\n- xprtrdma: rpcrdma_mr_pop() already does list_del_init() (git-fixes).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2021-2184,SUSE-SLE-Module-Basesystem-15-SP3-2021-2184,SUSE-SLE-Module-Development-Tools-15-SP3-2021-2184,SUSE-SLE-Module-Legacy-15-SP3-2021-2184,SUSE-SLE-Module-Live-Patching-15-SP3-2021-2184,SUSE-SLE-Product-HA-15-SP3-2021-2184,SUSE-SLE-Product-WE-15-SP3-2021-2184",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2021_2184-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2021:2184-1",
"url": "https://www.suse.com/support/update/announcement/2021/suse-su-20212184-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2021:2184-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2021-June/009097.html"
},
{
"category": "self",
"summary": "SUSE Bug 1087082",
"url": "https://bugzilla.suse.com/1087082"
},
{
"category": "self",
"summary": "SUSE Bug 1152489",
"url": "https://bugzilla.suse.com/1152489"
},
{
"category": "self",
"summary": "SUSE Bug 1154353",
"url": "https://bugzilla.suse.com/1154353"
},
{
"category": "self",
"summary": "SUSE Bug 1174978",
"url": "https://bugzilla.suse.com/1174978"
},
{
"category": "self",
"summary": "SUSE Bug 1176447",
"url": "https://bugzilla.suse.com/1176447"
},
{
"category": "self",
"summary": "SUSE Bug 1176771",
"url": "https://bugzilla.suse.com/1176771"
},
{
"category": "self",
"summary": "SUSE Bug 1177666",
"url": "https://bugzilla.suse.com/1177666"
},
{
"category": "self",
"summary": "SUSE Bug 1178134",
"url": "https://bugzilla.suse.com/1178134"
},
{
"category": "self",
"summary": "SUSE Bug 1178378",
"url": "https://bugzilla.suse.com/1178378"
},
{
"category": "self",
"summary": "SUSE Bug 1178612",
"url": "https://bugzilla.suse.com/1178612"
},
{
"category": "self",
"summary": "SUSE Bug 1179610",
"url": "https://bugzilla.suse.com/1179610"
},
{
"category": "self",
"summary": "SUSE Bug 1182999",
"url": "https://bugzilla.suse.com/1182999"
},
{
"category": "self",
"summary": "SUSE Bug 1183712",
"url": "https://bugzilla.suse.com/1183712"
},
{
"category": "self",
"summary": "SUSE Bug 1184259",
"url": "https://bugzilla.suse.com/1184259"
},
{
"category": "self",
"summary": "SUSE Bug 1184436",
"url": "https://bugzilla.suse.com/1184436"
},
{
"category": "self",
"summary": "SUSE Bug 1184631",
"url": "https://bugzilla.suse.com/1184631"
},
{
"category": "self",
"summary": "SUSE Bug 1185195",
"url": "https://bugzilla.suse.com/1185195"
},
{
"category": "self",
"summary": "SUSE Bug 1185428",
"url": "https://bugzilla.suse.com/1185428"
},
{
"category": "self",
"summary": "SUSE Bug 1185497",
"url": "https://bugzilla.suse.com/1185497"
},
{
"category": "self",
"summary": "SUSE Bug 1185570",
"url": "https://bugzilla.suse.com/1185570"
},
{
"category": "self",
"summary": "SUSE Bug 1185589",
"url": "https://bugzilla.suse.com/1185589"
},
{
"category": "self",
"summary": "SUSE Bug 1185675",
"url": "https://bugzilla.suse.com/1185675"
},
{
"category": "self",
"summary": "SUSE Bug 1185701",
"url": "https://bugzilla.suse.com/1185701"
},
{
"category": "self",
"summary": "SUSE Bug 1186155",
"url": "https://bugzilla.suse.com/1186155"
},
{
"category": "self",
"summary": "SUSE Bug 1186286",
"url": "https://bugzilla.suse.com/1186286"
},
{
"category": "self",
"summary": "SUSE Bug 1186460",
"url": "https://bugzilla.suse.com/1186460"
},
{
"category": "self",
"summary": "SUSE Bug 1186463",
"url": "https://bugzilla.suse.com/1186463"
},
{
"category": "self",
"summary": "SUSE Bug 1186472",
"url": "https://bugzilla.suse.com/1186472"
},
{
"category": "self",
"summary": "SUSE Bug 1186501",
"url": "https://bugzilla.suse.com/1186501"
},
{
"category": "self",
"summary": "SUSE Bug 1186672",
"url": "https://bugzilla.suse.com/1186672"
},
{
"category": "self",
"summary": "SUSE Bug 1186677",
"url": "https://bugzilla.suse.com/1186677"
},
{
"category": "self",
"summary": "SUSE Bug 1186681",
"url": "https://bugzilla.suse.com/1186681"
},
{
"category": "self",
"summary": "SUSE Bug 1186752",
"url": "https://bugzilla.suse.com/1186752"
},
{
"category": "self",
"summary": "SUSE Bug 1186885",
"url": "https://bugzilla.suse.com/1186885"
},
{
"category": "self",
"summary": "SUSE Bug 1186928",
"url": "https://bugzilla.suse.com/1186928"
},
{
"category": "self",
"summary": "SUSE Bug 1186949",
"url": "https://bugzilla.suse.com/1186949"
},
{
"category": "self",
"summary": "SUSE Bug 1186950",
"url": "https://bugzilla.suse.com/1186950"
},
{
"category": "self",
"summary": "SUSE Bug 1186951",
"url": "https://bugzilla.suse.com/1186951"
},
{
"category": "self",
"summary": "SUSE Bug 1186952",
"url": "https://bugzilla.suse.com/1186952"
},
{
"category": "self",
"summary": "SUSE Bug 1186953",
"url": "https://bugzilla.suse.com/1186953"
},
{
"category": "self",
"summary": "SUSE Bug 1186954",
"url": "https://bugzilla.suse.com/1186954"
},
{
"category": "self",
"summary": "SUSE Bug 1186955",
"url": "https://bugzilla.suse.com/1186955"
},
{
"category": "self",
"summary": "SUSE Bug 1186956",
"url": "https://bugzilla.suse.com/1186956"
},
{
"category": "self",
"summary": "SUSE Bug 1186957",
"url": "https://bugzilla.suse.com/1186957"
},
{
"category": "self",
"summary": "SUSE Bug 1186958",
"url": "https://bugzilla.suse.com/1186958"
},
{
"category": "self",
"summary": "SUSE Bug 1186959",
"url": "https://bugzilla.suse.com/1186959"
},
{
"category": "self",
"summary": "SUSE Bug 1186960",
"url": "https://bugzilla.suse.com/1186960"
},
{
"category": "self",
"summary": "SUSE Bug 1186961",
"url": "https://bugzilla.suse.com/1186961"
},
{
"category": "self",
"summary": "SUSE Bug 1186962",
"url": "https://bugzilla.suse.com/1186962"
},
{
"category": "self",
"summary": "SUSE Bug 1186963",
"url": "https://bugzilla.suse.com/1186963"
},
{
"category": "self",
"summary": "SUSE Bug 1186964",
"url": "https://bugzilla.suse.com/1186964"
},
{
"category": "self",
"summary": "SUSE Bug 1186965",
"url": "https://bugzilla.suse.com/1186965"
},
{
"category": "self",
"summary": "SUSE Bug 1186966",
"url": "https://bugzilla.suse.com/1186966"
},
{
"category": "self",
"summary": "SUSE Bug 1186967",
"url": "https://bugzilla.suse.com/1186967"
},
{
"category": "self",
"summary": "SUSE Bug 1186968",
"url": "https://bugzilla.suse.com/1186968"
},
{
"category": "self",
"summary": "SUSE Bug 1186969",
"url": "https://bugzilla.suse.com/1186969"
},
{
"category": "self",
"summary": "SUSE Bug 1186970",
"url": "https://bugzilla.suse.com/1186970"
},
{
"category": "self",
"summary": "SUSE Bug 1186971",
"url": "https://bugzilla.suse.com/1186971"
},
{
"category": "self",
"summary": "SUSE Bug 1186972",
"url": "https://bugzilla.suse.com/1186972"
},
{
"category": "self",
"summary": "SUSE Bug 1186973",
"url": "https://bugzilla.suse.com/1186973"
},
{
"category": "self",
"summary": "SUSE Bug 1186974",
"url": "https://bugzilla.suse.com/1186974"
},
{
"category": "self",
"summary": "SUSE Bug 1186976",
"url": "https://bugzilla.suse.com/1186976"
},
{
"category": "self",
"summary": "SUSE Bug 1186977",
"url": "https://bugzilla.suse.com/1186977"
},
{
"category": "self",
"summary": "SUSE Bug 1186978",
"url": "https://bugzilla.suse.com/1186978"
},
{
"category": "self",
"summary": "SUSE Bug 1186979",
"url": "https://bugzilla.suse.com/1186979"
},
{
"category": "self",
"summary": "SUSE Bug 1186980",
"url": "https://bugzilla.suse.com/1186980"
},
{
"category": "self",
"summary": "SUSE Bug 1186981",
"url": "https://bugzilla.suse.com/1186981"
},
{
"category": "self",
"summary": "SUSE Bug 1186982",
"url": "https://bugzilla.suse.com/1186982"
},
{
"category": "self",
"summary": "SUSE Bug 1186983",
"url": "https://bugzilla.suse.com/1186983"
},
{
"category": "self",
"summary": "SUSE Bug 1186984",
"url": "https://bugzilla.suse.com/1186984"
},
{
"category": "self",
"summary": "SUSE Bug 1186985",
"url": "https://bugzilla.suse.com/1186985"
},
{
"category": "self",
"summary": "SUSE Bug 1186986",
"url": "https://bugzilla.suse.com/1186986"
},
{
"category": "self",
"summary": "SUSE Bug 1186987",
"url": "https://bugzilla.suse.com/1186987"
},
{
"category": "self",
"summary": "SUSE Bug 1186988",
"url": "https://bugzilla.suse.com/1186988"
},
{
"category": "self",
"summary": "SUSE Bug 1186989",
"url": "https://bugzilla.suse.com/1186989"
},
{
"category": "self",
"summary": "SUSE Bug 1186990",
"url": "https://bugzilla.suse.com/1186990"
},
{
"category": "self",
"summary": "SUSE Bug 1186991",
"url": "https://bugzilla.suse.com/1186991"
},
{
"category": "self",
"summary": "SUSE Bug 1186992",
"url": "https://bugzilla.suse.com/1186992"
},
{
"category": "self",
"summary": "SUSE Bug 1186993",
"url": "https://bugzilla.suse.com/1186993"
},
{
"category": "self",
"summary": "SUSE Bug 1186994",
"url": "https://bugzilla.suse.com/1186994"
},
{
"category": "self",
"summary": "SUSE Bug 1186995",
"url": "https://bugzilla.suse.com/1186995"
},
{
"category": "self",
"summary": "SUSE Bug 1186996",
"url": "https://bugzilla.suse.com/1186996"
},
{
"category": "self",
"summary": "SUSE Bug 1186997",
"url": "https://bugzilla.suse.com/1186997"
},
{
"category": "self",
"summary": "SUSE Bug 1186998",
"url": "https://bugzilla.suse.com/1186998"
},
{
"category": "self",
"summary": "SUSE Bug 1186999",
"url": "https://bugzilla.suse.com/1186999"
},
{
"category": "self",
"summary": "SUSE Bug 1187000",
"url": "https://bugzilla.suse.com/1187000"
},
{
"category": "self",
"summary": "SUSE Bug 1187001",
"url": "https://bugzilla.suse.com/1187001"
},
{
"category": "self",
"summary": "SUSE Bug 1187002",
"url": "https://bugzilla.suse.com/1187002"
},
{
"category": "self",
"summary": "SUSE Bug 1187003",
"url": "https://bugzilla.suse.com/1187003"
},
{
"category": "self",
"summary": "SUSE Bug 1187038",
"url": "https://bugzilla.suse.com/1187038"
},
{
"category": "self",
"summary": "SUSE Bug 1187039",
"url": "https://bugzilla.suse.com/1187039"
},
{
"category": "self",
"summary": "SUSE Bug 1187050",
"url": "https://bugzilla.suse.com/1187050"
},
{
"category": "self",
"summary": "SUSE Bug 1187052",
"url": "https://bugzilla.suse.com/1187052"
},
{
"category": "self",
"summary": "SUSE Bug 1187067",
"url": "https://bugzilla.suse.com/1187067"
},
{
"category": "self",
"summary": "SUSE Bug 1187068",
"url": "https://bugzilla.suse.com/1187068"
},
{
"category": "self",
"summary": "SUSE Bug 1187069",
"url": "https://bugzilla.suse.com/1187069"
},
{
"category": "self",
"summary": "SUSE Bug 1187072",
"url": "https://bugzilla.suse.com/1187072"
},
{
"category": "self",
"summary": "SUSE Bug 1187143",
"url": "https://bugzilla.suse.com/1187143"
},
{
"category": "self",
"summary": "SUSE Bug 1187144",
"url": "https://bugzilla.suse.com/1187144"
},
{
"category": "self",
"summary": "SUSE Bug 1187167",
"url": "https://bugzilla.suse.com/1187167"
},
{
"category": "self",
"summary": "SUSE Bug 1187334",
"url": "https://bugzilla.suse.com/1187334"
},
{
"category": "self",
"summary": "SUSE Bug 1187344",
"url": "https://bugzilla.suse.com/1187344"
},
{
"category": "self",
"summary": "SUSE Bug 1187345",
"url": "https://bugzilla.suse.com/1187345"
},
{
"category": "self",
"summary": "SUSE Bug 1187346",
"url": "https://bugzilla.suse.com/1187346"
},
{
"category": "self",
"summary": "SUSE Bug 1187347",
"url": "https://bugzilla.suse.com/1187347"
},
{
"category": "self",
"summary": "SUSE Bug 1187348",
"url": "https://bugzilla.suse.com/1187348"
},
{
"category": "self",
"summary": "SUSE Bug 1187349",
"url": "https://bugzilla.suse.com/1187349"
},
{
"category": "self",
"summary": "SUSE Bug 1187350",
"url": "https://bugzilla.suse.com/1187350"
},
{
"category": "self",
"summary": "SUSE Bug 1187351",
"url": "https://bugzilla.suse.com/1187351"
},
{
"category": "self",
"summary": "SUSE Bug 1187357",
"url": "https://bugzilla.suse.com/1187357"
},
{
"category": "self",
"summary": "SUSE Bug 1187711",
"url": "https://bugzilla.suse.com/1187711"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-26558 page",
"url": "https://www.suse.com/security/cve/CVE-2020-26558/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-36385 page",
"url": "https://www.suse.com/security/cve/CVE-2020-36385/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-36386 page",
"url": "https://www.suse.com/security/cve/CVE-2020-36386/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-0129 page",
"url": "https://www.suse.com/security/cve/CVE-2021-0129/"
}
],
"title": "Security update for the Linux Kernel",
"tracking": {
"current_release_date": "2021-06-28T16:23:03Z",
"generator": {
"date": "2021-06-28T16:23:03Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2021:2184-1",
"initial_release_date": "2021-06-28T16:23:03Z",
"revision_history": [
{
"date": "2021-06-28T16:23:03Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-64kb-5.3.18-59.10.1.aarch64",
"product": {
"name": "cluster-md-kmp-64kb-5.3.18-59.10.1.aarch64",
"product_id": "cluster-md-kmp-64kb-5.3.18-59.10.1.aarch64"
}
},
{
"category": "product_version",
"name": "cluster-md-kmp-default-5.3.18-59.10.1.aarch64",
"product": {
"name": "cluster-md-kmp-default-5.3.18-59.10.1.aarch64",
"product_id": "cluster-md-kmp-default-5.3.18-59.10.1.aarch64"
}
},
{
"category": "product_version",
"name": "cluster-md-kmp-preempt-5.3.18-59.10.1.aarch64",
"product": {
"name": "cluster-md-kmp-preempt-5.3.18-59.10.1.aarch64",
"product_id": "cluster-md-kmp-preempt-5.3.18-59.10.1.aarch64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-64kb-5.3.18-59.10.1.aarch64",
"product": {
"name": "dlm-kmp-64kb-5.3.18-59.10.1.aarch64",
"product_id": "dlm-kmp-64kb-5.3.18-59.10.1.aarch64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-5.3.18-59.10.1.aarch64",
"product": {
"name": "dlm-kmp-default-5.3.18-59.10.1.aarch64",
"product_id": "dlm-kmp-default-5.3.18-59.10.1.aarch64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-preempt-5.3.18-59.10.1.aarch64",
"product": {
"name": "dlm-kmp-preempt-5.3.18-59.10.1.aarch64",
"product_id": "dlm-kmp-preempt-5.3.18-59.10.1.aarch64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-64kb-5.3.18-59.10.1.aarch64",
"product": {
"name": "gfs2-kmp-64kb-5.3.18-59.10.1.aarch64",
"product_id": "gfs2-kmp-64kb-5.3.18-59.10.1.aarch64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-5.3.18-59.10.1.aarch64",
"product": {
"name": "gfs2-kmp-default-5.3.18-59.10.1.aarch64",
"product_id": "gfs2-kmp-default-5.3.18-59.10.1.aarch64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-preempt-5.3.18-59.10.1.aarch64",
"product": {
"name": "gfs2-kmp-preempt-5.3.18-59.10.1.aarch64",
"product_id": "gfs2-kmp-preempt-5.3.18-59.10.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-64kb-5.3.18-59.10.1.aarch64",
"product": {
"name": "kernel-64kb-5.3.18-59.10.1.aarch64",
"product_id": "kernel-64kb-5.3.18-59.10.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-64kb-devel-5.3.18-59.10.1.aarch64",
"product": {
"name": "kernel-64kb-devel-5.3.18-59.10.1.aarch64",
"product_id": "kernel-64kb-devel-5.3.18-59.10.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-64kb-extra-5.3.18-59.10.1.aarch64",
"product": {
"name": "kernel-64kb-extra-5.3.18-59.10.1.aarch64",
"product_id": "kernel-64kb-extra-5.3.18-59.10.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-64kb-livepatch-devel-5.3.18-59.10.1.aarch64",
"product": {
"name": "kernel-64kb-livepatch-devel-5.3.18-59.10.1.aarch64",
"product_id": "kernel-64kb-livepatch-devel-5.3.18-59.10.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-64kb-optional-5.3.18-59.10.1.aarch64",
"product": {
"name": "kernel-64kb-optional-5.3.18-59.10.1.aarch64",
"product_id": "kernel-64kb-optional-5.3.18-59.10.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-5.3.18-59.10.1.aarch64",
"product": {
"name": "kernel-default-5.3.18-59.10.1.aarch64",
"product_id": "kernel-default-5.3.18-59.10.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-5.3.18-59.10.1.18.4.2.aarch64",
"product": {
"name": "kernel-default-base-5.3.18-59.10.1.18.4.2.aarch64",
"product_id": "kernel-default-base-5.3.18-59.10.1.18.4.2.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-rebuild-5.3.18-59.10.1.18.4.2.aarch64",
"product": {
"name": "kernel-default-base-rebuild-5.3.18-59.10.1.18.4.2.aarch64",
"product_id": "kernel-default-base-rebuild-5.3.18-59.10.1.18.4.2.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-5.3.18-59.10.1.aarch64",
"product": {
"name": "kernel-default-devel-5.3.18-59.10.1.aarch64",
"product_id": "kernel-default-devel-5.3.18-59.10.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-5.3.18-59.10.1.aarch64",
"product": {
"name": "kernel-default-extra-5.3.18-59.10.1.aarch64",
"product_id": "kernel-default-extra-5.3.18-59.10.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-5.3.18-59.10.1.aarch64",
"product": {
"name": "kernel-default-livepatch-5.3.18-59.10.1.aarch64",
"product_id": "kernel-default-livepatch-5.3.18-59.10.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-devel-5.3.18-59.10.1.aarch64",
"product": {
"name": "kernel-default-livepatch-devel-5.3.18-59.10.1.aarch64",
"product_id": "kernel-default-livepatch-devel-5.3.18-59.10.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-optional-5.3.18-59.10.1.aarch64",
"product": {
"name": "kernel-default-optional-5.3.18-59.10.1.aarch64",
"product_id": "kernel-default-optional-5.3.18-59.10.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-5.3.18-59.10.1.aarch64",
"product": {
"name": "kernel-obs-build-5.3.18-59.10.1.aarch64",
"product_id": "kernel-obs-build-5.3.18-59.10.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-5.3.18-59.10.1.aarch64",
"product": {
"name": "kernel-obs-qa-5.3.18-59.10.1.aarch64",
"product_id": "kernel-obs-qa-5.3.18-59.10.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-preempt-5.3.18-59.10.1.aarch64",
"product": {
"name": "kernel-preempt-5.3.18-59.10.1.aarch64",
"product_id": "kernel-preempt-5.3.18-59.10.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-preempt-devel-5.3.18-59.10.1.aarch64",
"product": {
"name": "kernel-preempt-devel-5.3.18-59.10.1.aarch64",
"product_id": "kernel-preempt-devel-5.3.18-59.10.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-preempt-extra-5.3.18-59.10.1.aarch64",
"product": {
"name": "kernel-preempt-extra-5.3.18-59.10.1.aarch64",
"product_id": "kernel-preempt-extra-5.3.18-59.10.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-preempt-livepatch-devel-5.3.18-59.10.1.aarch64",
"product": {
"name": "kernel-preempt-livepatch-devel-5.3.18-59.10.1.aarch64",
"product_id": "kernel-preempt-livepatch-devel-5.3.18-59.10.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-preempt-optional-5.3.18-59.10.1.aarch64",
"product": {
"name": "kernel-preempt-optional-5.3.18-59.10.1.aarch64",
"product_id": "kernel-preempt-optional-5.3.18-59.10.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-syms-5.3.18-59.10.1.aarch64",
"product": {
"name": "kernel-syms-5.3.18-59.10.1.aarch64",
"product_id": "kernel-syms-5.3.18-59.10.1.aarch64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-64kb-5.3.18-59.10.1.aarch64",
"product": {
"name": "kselftests-kmp-64kb-5.3.18-59.10.1.aarch64",
"product_id": "kselftests-kmp-64kb-5.3.18-59.10.1.aarch64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-5.3.18-59.10.1.aarch64",
"product": {
"name": "kselftests-kmp-default-5.3.18-59.10.1.aarch64",
"product_id": "kselftests-kmp-default-5.3.18-59.10.1.aarch64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-preempt-5.3.18-59.10.1.aarch64",
"product": {
"name": "kselftests-kmp-preempt-5.3.18-59.10.1.aarch64",
"product_id": "kselftests-kmp-preempt-5.3.18-59.10.1.aarch64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-64kb-5.3.18-59.10.1.aarch64",
"product": {
"name": "ocfs2-kmp-64kb-5.3.18-59.10.1.aarch64",
"product_id": "ocfs2-kmp-64kb-5.3.18-59.10.1.aarch64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-5.3.18-59.10.1.aarch64",
"product": {
"name": "ocfs2-kmp-default-5.3.18-59.10.1.aarch64",
"product_id": "ocfs2-kmp-default-5.3.18-59.10.1.aarch64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-preempt-5.3.18-59.10.1.aarch64",
"product": {
"name": "ocfs2-kmp-preempt-5.3.18-59.10.1.aarch64",
"product_id": "ocfs2-kmp-preempt-5.3.18-59.10.1.aarch64"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-64kb-5.3.18-59.10.1.aarch64",
"product": {
"name": "reiserfs-kmp-64kb-5.3.18-59.10.1.aarch64",
"product_id": "reiserfs-kmp-64kb-5.3.18-59.10.1.aarch64"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-default-5.3.18-59.10.1.aarch64",
"product": {
"name": "reiserfs-kmp-default-5.3.18-59.10.1.aarch64",
"product_id": "reiserfs-kmp-default-5.3.18-59.10.1.aarch64"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-preempt-5.3.18-59.10.1.aarch64",
"product": {
"name": "reiserfs-kmp-preempt-5.3.18-59.10.1.aarch64",
"product_id": "reiserfs-kmp-preempt-5.3.18-59.10.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-devel-5.3.18-59.10.1.noarch",
"product": {
"name": "kernel-devel-5.3.18-59.10.1.noarch",
"product_id": "kernel-devel-5.3.18-59.10.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-docs-5.3.18-59.10.1.noarch",
"product": {
"name": "kernel-docs-5.3.18-59.10.1.noarch",
"product_id": "kernel-docs-5.3.18-59.10.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-docs-html-5.3.18-59.10.1.noarch",
"product": {
"name": "kernel-docs-html-5.3.18-59.10.1.noarch",
"product_id": "kernel-docs-html-5.3.18-59.10.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-macros-5.3.18-59.10.1.noarch",
"product": {
"name": "kernel-macros-5.3.18-59.10.1.noarch",
"product_id": "kernel-macros-5.3.18-59.10.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-5.3.18-59.10.1.noarch",
"product": {
"name": "kernel-source-5.3.18-59.10.1.noarch",
"product_id": "kernel-source-5.3.18-59.10.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-vanilla-5.3.18-59.10.1.noarch",
"product": {
"name": "kernel-source-vanilla-5.3.18-59.10.1.noarch",
"product_id": "kernel-source-vanilla-5.3.18-59.10.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-5.3.18-59.10.1.ppc64le",
"product": {
"name": "cluster-md-kmp-default-5.3.18-59.10.1.ppc64le",
"product_id": "cluster-md-kmp-default-5.3.18-59.10.1.ppc64le"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-5.3.18-59.10.1.ppc64le",
"product": {
"name": "dlm-kmp-default-5.3.18-59.10.1.ppc64le",
"product_id": "dlm-kmp-default-5.3.18-59.10.1.ppc64le"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-5.3.18-59.10.1.ppc64le",
"product": {
"name": "gfs2-kmp-default-5.3.18-59.10.1.ppc64le",
"product_id": "gfs2-kmp-default-5.3.18-59.10.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-5.3.18-59.10.1.ppc64le",
"product": {
"name": "kernel-debug-5.3.18-59.10.1.ppc64le",
"product_id": "kernel-debug-5.3.18-59.10.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-5.3.18-59.10.1.ppc64le",
"product": {
"name": "kernel-debug-devel-5.3.18-59.10.1.ppc64le",
"product_id": "kernel-debug-devel-5.3.18-59.10.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-livepatch-devel-5.3.18-59.10.1.ppc64le",
"product": {
"name": "kernel-debug-livepatch-devel-5.3.18-59.10.1.ppc64le",
"product_id": "kernel-debug-livepatch-devel-5.3.18-59.10.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-5.3.18-59.10.1.ppc64le",
"product": {
"name": "kernel-default-5.3.18-59.10.1.ppc64le",
"product_id": "kernel-default-5.3.18-59.10.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-base-5.3.18-59.10.1.18.4.2.ppc64le",
"product": {
"name": "kernel-default-base-5.3.18-59.10.1.18.4.2.ppc64le",
"product_id": "kernel-default-base-5.3.18-59.10.1.18.4.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-base-rebuild-5.3.18-59.10.1.18.4.2.ppc64le",
"product": {
"name": "kernel-default-base-rebuild-5.3.18-59.10.1.18.4.2.ppc64le",
"product_id": "kernel-default-base-rebuild-5.3.18-59.10.1.18.4.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-5.3.18-59.10.1.ppc64le",
"product": {
"name": "kernel-default-devel-5.3.18-59.10.1.ppc64le",
"product_id": "kernel-default-devel-5.3.18-59.10.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-5.3.18-59.10.1.ppc64le",
"product": {
"name": "kernel-default-extra-5.3.18-59.10.1.ppc64le",
"product_id": "kernel-default-extra-5.3.18-59.10.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-5.3.18-59.10.1.ppc64le",
"product": {
"name": "kernel-default-livepatch-5.3.18-59.10.1.ppc64le",
"product_id": "kernel-default-livepatch-5.3.18-59.10.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-devel-5.3.18-59.10.1.ppc64le",
"product": {
"name": "kernel-default-livepatch-devel-5.3.18-59.10.1.ppc64le",
"product_id": "kernel-default-livepatch-devel-5.3.18-59.10.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-optional-5.3.18-59.10.1.ppc64le",
"product": {
"name": "kernel-default-optional-5.3.18-59.10.1.ppc64le",
"product_id": "kernel-default-optional-5.3.18-59.10.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-5.3.18-59.10.1.ppc64le",
"product": {
"name": "kernel-kvmsmall-5.3.18-59.10.1.ppc64le",
"product_id": "kernel-kvmsmall-5.3.18-59.10.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-devel-5.3.18-59.10.1.ppc64le",
"product": {
"name": "kernel-kvmsmall-devel-5.3.18-59.10.1.ppc64le",
"product_id": "kernel-kvmsmall-devel-5.3.18-59.10.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-livepatch-devel-5.3.18-59.10.1.ppc64le",
"product": {
"name": "kernel-kvmsmall-livepatch-devel-5.3.18-59.10.1.ppc64le",
"product_id": "kernel-kvmsmall-livepatch-devel-5.3.18-59.10.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-59_10-default-1-7.5.1.ppc64le",
"product": {
"name": "kernel-livepatch-5_3_18-59_10-default-1-7.5.1.ppc64le",
"product_id": "kernel-livepatch-5_3_18-59_10-default-1-7.5.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-5.3.18-59.10.1.ppc64le",
"product": {
"name": "kernel-obs-build-5.3.18-59.10.1.ppc64le",
"product_id": "kernel-obs-build-5.3.18-59.10.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-5.3.18-59.10.1.ppc64le",
"product": {
"name": "kernel-obs-qa-5.3.18-59.10.1.ppc64le",
"product_id": "kernel-obs-qa-5.3.18-59.10.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-syms-5.3.18-59.10.1.ppc64le",
"product": {
"name": "kernel-syms-5.3.18-59.10.1.ppc64le",
"product_id": "kernel-syms-5.3.18-59.10.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-5.3.18-59.10.1.ppc64le",
"product": {
"name": "kselftests-kmp-default-5.3.18-59.10.1.ppc64le",
"product_id": "kselftests-kmp-default-5.3.18-59.10.1.ppc64le"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-5.3.18-59.10.1.ppc64le",
"product": {
"name": "ocfs2-kmp-default-5.3.18-59.10.1.ppc64le",
"product_id": "ocfs2-kmp-default-5.3.18-59.10.1.ppc64le"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-default-5.3.18-59.10.1.ppc64le",
"product": {
"name": "reiserfs-kmp-default-5.3.18-59.10.1.ppc64le",
"product_id": "reiserfs-kmp-default-5.3.18-59.10.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-5.3.18-59.10.1.s390x",
"product": {
"name": "cluster-md-kmp-default-5.3.18-59.10.1.s390x",
"product_id": "cluster-md-kmp-default-5.3.18-59.10.1.s390x"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-5.3.18-59.10.1.s390x",
"product": {
"name": "dlm-kmp-default-5.3.18-59.10.1.s390x",
"product_id": "dlm-kmp-default-5.3.18-59.10.1.s390x"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-5.3.18-59.10.1.s390x",
"product": {
"name": "gfs2-kmp-default-5.3.18-59.10.1.s390x",
"product_id": "gfs2-kmp-default-5.3.18-59.10.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-5.3.18-59.10.1.s390x",
"product": {
"name": "kernel-default-5.3.18-59.10.1.s390x",
"product_id": "kernel-default-5.3.18-59.10.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-base-5.3.18-59.10.1.18.4.2.s390x",
"product": {
"name": "kernel-default-base-5.3.18-59.10.1.18.4.2.s390x",
"product_id": "kernel-default-base-5.3.18-59.10.1.18.4.2.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-base-rebuild-5.3.18-59.10.1.18.4.2.s390x",
"product": {
"name": "kernel-default-base-rebuild-5.3.18-59.10.1.18.4.2.s390x",
"product_id": "kernel-default-base-rebuild-5.3.18-59.10.1.18.4.2.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-5.3.18-59.10.1.s390x",
"product": {
"name": "kernel-default-devel-5.3.18-59.10.1.s390x",
"product_id": "kernel-default-devel-5.3.18-59.10.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-5.3.18-59.10.1.s390x",
"product": {
"name": "kernel-default-extra-5.3.18-59.10.1.s390x",
"product_id": "kernel-default-extra-5.3.18-59.10.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-5.3.18-59.10.1.s390x",
"product": {
"name": "kernel-default-livepatch-5.3.18-59.10.1.s390x",
"product_id": "kernel-default-livepatch-5.3.18-59.10.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-devel-5.3.18-59.10.1.s390x",
"product": {
"name": "kernel-default-livepatch-devel-5.3.18-59.10.1.s390x",
"product_id": "kernel-default-livepatch-devel-5.3.18-59.10.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-optional-5.3.18-59.10.1.s390x",
"product": {
"name": "kernel-default-optional-5.3.18-59.10.1.s390x",
"product_id": "kernel-default-optional-5.3.18-59.10.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-59_10-default-1-7.5.1.s390x",
"product": {
"name": "kernel-livepatch-5_3_18-59_10-default-1-7.5.1.s390x",
"product_id": "kernel-livepatch-5_3_18-59_10-default-1-7.5.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-5.3.18-59.10.1.s390x",
"product": {
"name": "kernel-obs-build-5.3.18-59.10.1.s390x",
"product_id": "kernel-obs-build-5.3.18-59.10.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-5.3.18-59.10.1.s390x",
"product": {
"name": "kernel-obs-qa-5.3.18-59.10.1.s390x",
"product_id": "kernel-obs-qa-5.3.18-59.10.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-syms-5.3.18-59.10.1.s390x",
"product": {
"name": "kernel-syms-5.3.18-59.10.1.s390x",
"product_id": "kernel-syms-5.3.18-59.10.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-5.3.18-59.10.1.s390x",
"product": {
"name": "kernel-zfcpdump-5.3.18-59.10.1.s390x",
"product_id": "kernel-zfcpdump-5.3.18-59.10.1.s390x"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-5.3.18-59.10.1.s390x",
"product": {
"name": "kselftests-kmp-default-5.3.18-59.10.1.s390x",
"product_id": "kselftests-kmp-default-5.3.18-59.10.1.s390x"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-5.3.18-59.10.1.s390x",
"product": {
"name": "ocfs2-kmp-default-5.3.18-59.10.1.s390x",
"product_id": "ocfs2-kmp-default-5.3.18-59.10.1.s390x"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-default-5.3.18-59.10.1.s390x",
"product": {
"name": "reiserfs-kmp-default-5.3.18-59.10.1.s390x",
"product_id": "reiserfs-kmp-default-5.3.18-59.10.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-5.3.18-59.10.1.x86_64",
"product": {
"name": "cluster-md-kmp-default-5.3.18-59.10.1.x86_64",
"product_id": "cluster-md-kmp-default-5.3.18-59.10.1.x86_64"
}
},
{
"category": "product_version",
"name": "cluster-md-kmp-preempt-5.3.18-59.10.1.x86_64",
"product": {
"name": "cluster-md-kmp-preempt-5.3.18-59.10.1.x86_64",
"product_id": "cluster-md-kmp-preempt-5.3.18-59.10.1.x86_64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-5.3.18-59.10.1.x86_64",
"product": {
"name": "dlm-kmp-default-5.3.18-59.10.1.x86_64",
"product_id": "dlm-kmp-default-5.3.18-59.10.1.x86_64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-preempt-5.3.18-59.10.1.x86_64",
"product": {
"name": "dlm-kmp-preempt-5.3.18-59.10.1.x86_64",
"product_id": "dlm-kmp-preempt-5.3.18-59.10.1.x86_64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-5.3.18-59.10.1.x86_64",
"product": {
"name": "gfs2-kmp-default-5.3.18-59.10.1.x86_64",
"product_id": "gfs2-kmp-default-5.3.18-59.10.1.x86_64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-preempt-5.3.18-59.10.1.x86_64",
"product": {
"name": "gfs2-kmp-preempt-5.3.18-59.10.1.x86_64",
"product_id": "gfs2-kmp-preempt-5.3.18-59.10.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-5.3.18-59.10.1.x86_64",
"product": {
"name": "kernel-debug-5.3.18-59.10.1.x86_64",
"product_id": "kernel-debug-5.3.18-59.10.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-5.3.18-59.10.1.x86_64",
"product": {
"name": "kernel-debug-devel-5.3.18-59.10.1.x86_64",
"product_id": "kernel-debug-devel-5.3.18-59.10.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-livepatch-devel-5.3.18-59.10.1.x86_64",
"product": {
"name": "kernel-debug-livepatch-devel-5.3.18-59.10.1.x86_64",
"product_id": "kernel-debug-livepatch-devel-5.3.18-59.10.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-5.3.18-59.10.1.x86_64",
"product": {
"name": "kernel-default-5.3.18-59.10.1.x86_64",
"product_id": "kernel-default-5.3.18-59.10.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-5.3.18-59.10.1.18.4.2.x86_64",
"product": {
"name": "kernel-default-base-5.3.18-59.10.1.18.4.2.x86_64",
"product_id": "kernel-default-base-5.3.18-59.10.1.18.4.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-rebuild-5.3.18-59.10.1.18.4.2.x86_64",
"product": {
"name": "kernel-default-base-rebuild-5.3.18-59.10.1.18.4.2.x86_64",
"product_id": "kernel-default-base-rebuild-5.3.18-59.10.1.18.4.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-5.3.18-59.10.1.x86_64",
"product": {
"name": "kernel-default-devel-5.3.18-59.10.1.x86_64",
"product_id": "kernel-default-devel-5.3.18-59.10.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-5.3.18-59.10.1.x86_64",
"product": {
"name": "kernel-default-extra-5.3.18-59.10.1.x86_64",
"product_id": "kernel-default-extra-5.3.18-59.10.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-5.3.18-59.10.1.x86_64",
"product": {
"name": "kernel-default-livepatch-5.3.18-59.10.1.x86_64",
"product_id": "kernel-default-livepatch-5.3.18-59.10.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-devel-5.3.18-59.10.1.x86_64",
"product": {
"name": "kernel-default-livepatch-devel-5.3.18-59.10.1.x86_64",
"product_id": "kernel-default-livepatch-devel-5.3.18-59.10.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-optional-5.3.18-59.10.1.x86_64",
"product": {
"name": "kernel-default-optional-5.3.18-59.10.1.x86_64",
"product_id": "kernel-default-optional-5.3.18-59.10.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-5.3.18-59.10.1.x86_64",
"product": {
"name": "kernel-kvmsmall-5.3.18-59.10.1.x86_64",
"product_id": "kernel-kvmsmall-5.3.18-59.10.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-devel-5.3.18-59.10.1.x86_64",
"product": {
"name": "kernel-kvmsmall-devel-5.3.18-59.10.1.x86_64",
"product_id": "kernel-kvmsmall-devel-5.3.18-59.10.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-livepatch-devel-5.3.18-59.10.1.x86_64",
"product": {
"name": "kernel-kvmsmall-livepatch-devel-5.3.18-59.10.1.x86_64",
"product_id": "kernel-kvmsmall-livepatch-devel-5.3.18-59.10.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-59_10-default-1-7.5.1.x86_64",
"product": {
"name": "kernel-livepatch-5_3_18-59_10-default-1-7.5.1.x86_64",
"product_id": "kernel-livepatch-5_3_18-59_10-default-1-7.5.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-59_10-preempt-1-7.5.1.x86_64",
"product": {
"name": "kernel-livepatch-5_3_18-59_10-preempt-1-7.5.1.x86_64",
"product_id": "kernel-livepatch-5_3_18-59_10-preempt-1-7.5.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-5.3.18-59.10.1.x86_64",
"product": {
"name": "kernel-obs-build-5.3.18-59.10.1.x86_64",
"product_id": "kernel-obs-build-5.3.18-59.10.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-5.3.18-59.10.1.x86_64",
"product": {
"name": "kernel-obs-qa-5.3.18-59.10.1.x86_64",
"product_id": "kernel-obs-qa-5.3.18-59.10.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-preempt-5.3.18-59.10.1.x86_64",
"product": {
"name": "kernel-preempt-5.3.18-59.10.1.x86_64",
"product_id": "kernel-preempt-5.3.18-59.10.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-preempt-devel-5.3.18-59.10.1.x86_64",
"product": {
"name": "kernel-preempt-devel-5.3.18-59.10.1.x86_64",
"product_id": "kernel-preempt-devel-5.3.18-59.10.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-preempt-extra-5.3.18-59.10.1.x86_64",
"product": {
"name": "kernel-preempt-extra-5.3.18-59.10.1.x86_64",
"product_id": "kernel-preempt-extra-5.3.18-59.10.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-preempt-livepatch-devel-5.3.18-59.10.1.x86_64",
"product": {
"name": "kernel-preempt-livepatch-devel-5.3.18-59.10.1.x86_64",
"product_id": "kernel-preempt-livepatch-devel-5.3.18-59.10.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-preempt-optional-5.3.18-59.10.1.x86_64",
"product": {
"name": "kernel-preempt-optional-5.3.18-59.10.1.x86_64",
"product_id": "kernel-preempt-optional-5.3.18-59.10.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-syms-5.3.18-59.10.1.x86_64",
"product": {
"name": "kernel-syms-5.3.18-59.10.1.x86_64",
"product_id": "kernel-syms-5.3.18-59.10.1.x86_64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-5.3.18-59.10.1.x86_64",
"product": {
"name": "kselftests-kmp-default-5.3.18-59.10.1.x86_64",
"product_id": "kselftests-kmp-default-5.3.18-59.10.1.x86_64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-preempt-5.3.18-59.10.1.x86_64",
"product": {
"name": "kselftests-kmp-preempt-5.3.18-59.10.1.x86_64",
"product_id": "kselftests-kmp-preempt-5.3.18-59.10.1.x86_64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-5.3.18-59.10.1.x86_64",
"product": {
"name": "ocfs2-kmp-default-5.3.18-59.10.1.x86_64",
"product_id": "ocfs2-kmp-default-5.3.18-59.10.1.x86_64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-preempt-5.3.18-59.10.1.x86_64",
"product": {
"name": "ocfs2-kmp-preempt-5.3.18-59.10.1.x86_64",
"product_id": "ocfs2-kmp-preempt-5.3.18-59.10.1.x86_64"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-default-5.3.18-59.10.1.x86_64",
"product": {
"name": "reiserfs-kmp-default-5.3.18-59.10.1.x86_64",
"product_id": "reiserfs-kmp-default-5.3.18-59.10.1.x86_64"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-preempt-5.3.18-59.10.1.x86_64",
"product": {
"name": "reiserfs-kmp-preempt-5.3.18-59.10.1.x86_64",
"product_id": "reiserfs-kmp-preempt-5.3.18-59.10.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Basesystem 15 SP3",
"product": {
"name": "SUSE Linux Enterprise Module for Basesystem 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-basesystem:15:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Development Tools 15 SP3",
"product": {
"name": "SUSE Linux Enterprise Module for Development Tools 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-development-tools:15:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Legacy 15 SP3",
"product": {
"name": "SUSE Linux Enterprise Module for Legacy 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Legacy 15 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-legacy:15:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 15 SP3",
"product": {
"name": "SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-live-patching:15:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Availability Extension 15 SP3",
"product": {
"name": "SUSE Linux Enterprise High Availability Extension 15 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-ha:15:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Workstation Extension 15 SP3",
"product": {
"name": "SUSE Linux Enterprise Workstation Extension 15 SP3",
"product_id": "SUSE Linux Enterprise Workstation Extension 15 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-we:15:sp3"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64kb-5.3.18-59.10.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.10.1.aarch64"
},
"product_reference": "kernel-64kb-5.3.18-59.10.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64kb-devel-5.3.18-59.10.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.10.1.aarch64"
},
"product_reference": "kernel-64kb-devel-5.3.18-59.10.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.3.18-59.10.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.10.1.aarch64"
},
"product_reference": "kernel-default-5.3.18-59.10.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.3.18-59.10.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.10.1.ppc64le"
},
"product_reference": "kernel-default-5.3.18-59.10.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.3.18-59.10.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.10.1.s390x"
},
"product_reference": "kernel-default-5.3.18-59.10.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.3.18-59.10.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.10.1.x86_64"
},
"product_reference": "kernel-default-5.3.18-59.10.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-5.3.18-59.10.1.18.4.2.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.10.1.18.4.2.aarch64"
},
"product_reference": "kernel-default-base-5.3.18-59.10.1.18.4.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-5.3.18-59.10.1.18.4.2.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.10.1.18.4.2.ppc64le"
},
"product_reference": "kernel-default-base-5.3.18-59.10.1.18.4.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-5.3.18-59.10.1.18.4.2.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.10.1.18.4.2.s390x"
},
"product_reference": "kernel-default-base-5.3.18-59.10.1.18.4.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-5.3.18-59.10.1.18.4.2.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.10.1.18.4.2.x86_64"
},
"product_reference": "kernel-default-base-5.3.18-59.10.1.18.4.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-5.3.18-59.10.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.10.1.aarch64"
},
"product_reference": "kernel-default-devel-5.3.18-59.10.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-5.3.18-59.10.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.10.1.ppc64le"
},
"product_reference": "kernel-default-devel-5.3.18-59.10.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-5.3.18-59.10.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.10.1.s390x"
},
"product_reference": "kernel-default-devel-5.3.18-59.10.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-5.3.18-59.10.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.10.1.x86_64"
},
"product_reference": "kernel-default-devel-5.3.18-59.10.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-5.3.18-59.10.1.noarch as component of SUSE Linux Enterprise Module for Basesystem 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.10.1.noarch"
},
"product_reference": "kernel-devel-5.3.18-59.10.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-5.3.18-59.10.1.noarch as component of SUSE Linux Enterprise Module for Basesystem 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.10.1.noarch"
},
"product_reference": "kernel-macros-5.3.18-59.10.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-preempt-5.3.18-59.10.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.10.1.aarch64"
},
"product_reference": "kernel-preempt-5.3.18-59.10.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-preempt-5.3.18-59.10.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.10.1.x86_64"
},
"product_reference": "kernel-preempt-5.3.18-59.10.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-5.3.18-59.10.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.10.1.s390x"
},
"product_reference": "kernel-zfcpdump-5.3.18-59.10.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-docs-5.3.18-59.10.1.noarch as component of SUSE Linux Enterprise Module for Development Tools 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.10.1.noarch"
},
"product_reference": "kernel-docs-5.3.18-59.10.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-5.3.18-59.10.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.10.1.aarch64"
},
"product_reference": "kernel-obs-build-5.3.18-59.10.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-5.3.18-59.10.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.10.1.ppc64le"
},
"product_reference": "kernel-obs-build-5.3.18-59.10.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-5.3.18-59.10.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.10.1.s390x"
},
"product_reference": "kernel-obs-build-5.3.18-59.10.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-5.3.18-59.10.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.10.1.x86_64"
},
"product_reference": "kernel-obs-build-5.3.18-59.10.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-preempt-devel-5.3.18-59.10.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.10.1.aarch64"
},
"product_reference": "kernel-preempt-devel-5.3.18-59.10.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-preempt-devel-5.3.18-59.10.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.10.1.x86_64"
},
"product_reference": "kernel-preempt-devel-5.3.18-59.10.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-5.3.18-59.10.1.noarch as component of SUSE Linux Enterprise Module for Development Tools 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.10.1.noarch"
},
"product_reference": "kernel-source-5.3.18-59.10.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-5.3.18-59.10.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.10.1.aarch64"
},
"product_reference": "kernel-syms-5.3.18-59.10.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-5.3.18-59.10.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.10.1.ppc64le"
},
"product_reference": "kernel-syms-5.3.18-59.10.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-5.3.18-59.10.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.10.1.s390x"
},
"product_reference": "kernel-syms-5.3.18-59.10.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-5.3.18-59.10.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.10.1.x86_64"
},
"product_reference": "kernel-syms-5.3.18-59.10.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-5.3.18-59.10.1.aarch64 as component of SUSE Linux Enterprise Module for Legacy 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.10.1.aarch64"
},
"product_reference": "reiserfs-kmp-default-5.3.18-59.10.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-5.3.18-59.10.1.ppc64le as component of SUSE Linux Enterprise Module for Legacy 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.10.1.ppc64le"
},
"product_reference": "reiserfs-kmp-default-5.3.18-59.10.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-5.3.18-59.10.1.s390x as component of SUSE Linux Enterprise Module for Legacy 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.10.1.s390x"
},
"product_reference": "reiserfs-kmp-default-5.3.18-59.10.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-5.3.18-59.10.1.x86_64 as component of SUSE Linux Enterprise Module for Legacy 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.10.1.x86_64"
},
"product_reference": "reiserfs-kmp-default-5.3.18-59.10.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-5.3.18-59.10.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.10.1.ppc64le"
},
"product_reference": "kernel-default-livepatch-5.3.18-59.10.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-5.3.18-59.10.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.10.1.s390x"
},
"product_reference": "kernel-default-livepatch-5.3.18-59.10.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-5.3.18-59.10.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.10.1.x86_64"
},
"product_reference": "kernel-default-livepatch-5.3.18-59.10.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-devel-5.3.18-59.10.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.10.1.ppc64le"
},
"product_reference": "kernel-default-livepatch-devel-5.3.18-59.10.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-devel-5.3.18-59.10.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.10.1.s390x"
},
"product_reference": "kernel-default-livepatch-devel-5.3.18-59.10.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-devel-5.3.18-59.10.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.10.1.x86_64"
},
"product_reference": "kernel-default-livepatch-devel-5.3.18-59.10.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-59_10-default-1-7.5.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_10-default-1-7.5.1.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-59_10-default-1-7.5.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-59_10-default-1-7.5.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_10-default-1-7.5.1.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-59_10-default-1-7.5.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-59_10-default-1-7.5.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_10-default-1-7.5.1.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-59_10-default-1-7.5.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-5.3.18-59.10.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.10.1.aarch64"
},
"product_reference": "cluster-md-kmp-default-5.3.18-59.10.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-5.3.18-59.10.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.10.1.ppc64le"
},
"product_reference": "cluster-md-kmp-default-5.3.18-59.10.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-5.3.18-59.10.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.10.1.s390x"
},
"product_reference": "cluster-md-kmp-default-5.3.18-59.10.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-5.3.18-59.10.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.10.1.x86_64"
},
"product_reference": "cluster-md-kmp-default-5.3.18-59.10.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-5.3.18-59.10.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.10.1.aarch64"
},
"product_reference": "dlm-kmp-default-5.3.18-59.10.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-5.3.18-59.10.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.10.1.ppc64le"
},
"product_reference": "dlm-kmp-default-5.3.18-59.10.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-5.3.18-59.10.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.10.1.s390x"
},
"product_reference": "dlm-kmp-default-5.3.18-59.10.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-5.3.18-59.10.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.10.1.x86_64"
},
"product_reference": "dlm-kmp-default-5.3.18-59.10.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-5.3.18-59.10.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.10.1.aarch64"
},
"product_reference": "gfs2-kmp-default-5.3.18-59.10.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-5.3.18-59.10.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.10.1.ppc64le"
},
"product_reference": "gfs2-kmp-default-5.3.18-59.10.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-5.3.18-59.10.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.10.1.s390x"
},
"product_reference": "gfs2-kmp-default-5.3.18-59.10.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-5.3.18-59.10.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.10.1.x86_64"
},
"product_reference": "gfs2-kmp-default-5.3.18-59.10.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-5.3.18-59.10.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.10.1.aarch64"
},
"product_reference": "ocfs2-kmp-default-5.3.18-59.10.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-5.3.18-59.10.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.10.1.ppc64le"
},
"product_reference": "ocfs2-kmp-default-5.3.18-59.10.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-5.3.18-59.10.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.10.1.s390x"
},
"product_reference": "ocfs2-kmp-default-5.3.18-59.10.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-5.3.18-59.10.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.10.1.x86_64"
},
"product_reference": "ocfs2-kmp-default-5.3.18-59.10.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-extra-5.3.18-59.10.1.x86_64 as component of SUSE Linux Enterprise Workstation Extension 15 SP3",
"product_id": "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.10.1.x86_64"
},
"product_reference": "kernel-default-extra-5.3.18-59.10.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Workstation Extension 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-preempt-extra-5.3.18-59.10.1.x86_64 as component of SUSE Linux Enterprise Workstation Extension 15 SP3",
"product_id": "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.10.1.x86_64"
},
"product_reference": "kernel-preempt-extra-5.3.18-59.10.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Workstation Extension 15 SP3"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2020-26558",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-26558"
}
],
"notes": [
{
"category": "general",
"text": "Bluetooth LE and BR/EDR secure pairing in Bluetooth Core Specification 2.1 through 5.2 may permit a nearby man-in-the-middle attacker to identify the Passkey used during pairing (in the Passkey authentication procedure) by reflection of the public key and the authentication evidence of the initiating device, potentially permitting this attacker to complete authenticated pairing with the responding device using the correct Passkey for the pairing session. The attack methodology determines the Passkey value one bit at a time.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.10.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.10.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.10.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.10.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.10.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.10.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.10.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.10.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.10.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.10.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.10.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.10.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.10.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.10.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.10.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.10.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.10.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.10.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.10.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.10.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.10.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.10.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_10-default-1-7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_10-default-1-7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_10-default-1-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.10.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.10.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.10.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.10.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.10.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.10.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.10.1.18.4.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.10.1.18.4.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.10.1.18.4.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.10.1.18.4.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.10.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.10.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.10.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.10.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.10.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.10.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.10.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.10.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.10.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.10.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.10.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.10.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.10.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.10.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.10.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.10.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.10.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.10.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.10.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.10.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.10.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.10.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.10.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.10.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.10.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.10.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.10.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-26558",
"url": "https://www.suse.com/security/cve/CVE-2020-26558"
},
{
"category": "external",
"summary": "SUSE Bug 1179610 for CVE-2020-26558",
"url": "https://bugzilla.suse.com/1179610"
},
{
"category": "external",
"summary": "SUSE Bug 1186463 for CVE-2020-26558",
"url": "https://bugzilla.suse.com/1186463"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.10.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.10.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.10.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.10.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.10.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.10.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.10.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.10.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.10.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.10.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.10.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.10.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.10.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.10.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.10.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.10.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.10.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.10.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.10.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.10.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.10.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.10.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_10-default-1-7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_10-default-1-7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_10-default-1-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.10.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.10.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.10.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.10.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.10.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.10.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.10.1.18.4.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.10.1.18.4.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.10.1.18.4.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.10.1.18.4.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.10.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.10.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.10.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.10.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.10.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.10.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.10.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.10.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.10.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.10.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.10.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.10.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.10.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.10.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.10.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.10.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.10.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.10.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.10.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.10.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.10.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.10.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.10.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.10.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.10.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.10.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.10.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.10.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.10.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.10.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.10.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.10.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.10.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.10.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.10.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.10.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.10.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.10.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.10.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.10.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.10.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.10.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.10.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.10.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.10.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.10.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.10.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.10.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.10.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_10-default-1-7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_10-default-1-7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_10-default-1-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.10.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.10.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.10.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.10.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.10.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.10.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.10.1.18.4.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.10.1.18.4.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.10.1.18.4.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.10.1.18.4.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.10.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.10.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.10.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.10.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.10.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.10.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.10.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.10.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.10.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.10.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.10.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.10.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.10.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.10.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.10.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.10.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.10.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.10.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.10.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.10.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.10.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.10.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.10.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.10.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.10.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.10.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.10.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-28T16:23:03Z",
"details": "moderate"
}
],
"title": "CVE-2020-26558"
},
{
"cve": "CVE-2020-36385",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-36385"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel before 5.10. drivers/infiniband/core/ucma.c has a use-after-free because the ctx is reached via the ctx_list in some ucma_migrate_id situations where ucma_close is called, aka CID-f5449e74802c.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.10.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.10.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.10.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.10.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.10.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.10.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.10.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.10.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.10.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.10.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.10.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.10.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.10.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.10.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.10.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.10.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.10.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.10.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.10.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.10.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.10.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.10.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_10-default-1-7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_10-default-1-7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_10-default-1-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.10.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.10.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.10.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.10.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.10.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.10.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.10.1.18.4.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.10.1.18.4.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.10.1.18.4.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.10.1.18.4.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.10.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.10.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.10.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.10.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.10.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.10.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.10.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.10.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.10.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.10.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.10.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.10.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.10.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.10.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.10.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.10.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.10.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.10.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.10.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.10.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.10.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.10.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.10.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.10.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.10.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.10.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.10.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-36385",
"url": "https://www.suse.com/security/cve/CVE-2020-36385"
},
{
"category": "external",
"summary": "SUSE Bug 1187050 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1187050"
},
{
"category": "external",
"summary": "SUSE Bug 1187052 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1187052"
},
{
"category": "external",
"summary": "SUSE Bug 1189302 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1189302"
},
{
"category": "external",
"summary": "SUSE Bug 1196174 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1196174"
},
{
"category": "external",
"summary": "SUSE Bug 1196810 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1196810"
},
{
"category": "external",
"summary": "SUSE Bug 1196914 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1196914"
},
{
"category": "external",
"summary": "SUSE Bug 1200084 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1200084"
},
{
"category": "external",
"summary": "SUSE Bug 1201734 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1201734"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.10.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.10.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.10.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.10.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.10.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.10.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.10.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.10.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.10.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.10.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.10.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.10.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.10.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.10.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.10.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.10.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.10.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.10.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.10.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.10.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.10.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.10.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_10-default-1-7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_10-default-1-7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_10-default-1-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.10.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.10.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.10.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.10.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.10.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.10.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.10.1.18.4.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.10.1.18.4.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.10.1.18.4.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.10.1.18.4.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.10.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.10.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.10.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.10.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.10.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.10.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.10.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.10.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.10.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.10.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.10.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.10.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.10.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.10.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.10.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.10.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.10.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.10.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.10.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.10.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.10.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.10.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.10.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.10.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.10.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.10.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.10.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.10.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.10.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.10.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.10.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.10.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.10.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.10.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.10.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.10.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.10.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.10.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.10.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.10.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.10.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.10.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.10.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.10.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.10.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.10.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.10.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.10.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.10.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_10-default-1-7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_10-default-1-7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_10-default-1-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.10.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.10.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.10.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.10.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.10.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.10.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.10.1.18.4.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.10.1.18.4.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.10.1.18.4.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.10.1.18.4.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.10.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.10.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.10.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.10.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.10.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.10.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.10.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.10.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.10.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.10.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.10.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.10.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.10.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.10.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.10.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.10.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.10.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.10.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.10.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.10.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.10.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.10.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.10.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.10.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.10.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.10.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.10.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-28T16:23:03Z",
"details": "important"
}
],
"title": "CVE-2020-36385"
},
{
"cve": "CVE-2020-36386",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-36386"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel before 5.8.1. net/bluetooth/hci_event.c has a slab out-of-bounds read in hci_extended_inquiry_result_evt, aka CID-51c19bf3d5cf.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.10.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.10.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.10.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.10.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.10.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.10.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.10.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.10.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.10.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.10.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.10.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.10.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.10.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.10.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.10.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.10.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.10.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.10.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.10.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.10.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.10.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.10.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_10-default-1-7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_10-default-1-7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_10-default-1-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.10.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.10.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.10.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.10.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.10.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.10.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.10.1.18.4.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.10.1.18.4.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.10.1.18.4.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.10.1.18.4.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.10.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.10.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.10.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.10.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.10.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.10.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.10.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.10.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.10.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.10.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.10.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.10.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.10.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.10.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.10.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.10.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.10.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.10.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.10.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.10.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.10.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.10.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.10.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.10.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.10.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.10.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.10.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-36386",
"url": "https://www.suse.com/security/cve/CVE-2020-36386"
},
{
"category": "external",
"summary": "SUSE Bug 1187038 for CVE-2020-36386",
"url": "https://bugzilla.suse.com/1187038"
},
{
"category": "external",
"summary": "SUSE Bug 1192868 for CVE-2020-36386",
"url": "https://bugzilla.suse.com/1192868"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.10.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.10.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.10.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.10.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.10.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.10.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.10.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.10.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.10.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.10.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.10.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.10.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.10.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.10.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.10.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.10.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.10.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.10.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.10.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.10.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.10.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.10.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_10-default-1-7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_10-default-1-7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_10-default-1-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.10.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.10.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.10.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.10.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.10.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.10.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.10.1.18.4.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.10.1.18.4.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.10.1.18.4.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.10.1.18.4.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.10.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.10.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.10.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.10.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.10.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.10.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.10.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.10.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.10.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.10.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.10.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.10.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.10.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.10.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.10.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.10.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.10.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.10.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.10.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.10.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.10.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.10.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.10.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.10.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.10.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.10.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.10.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.10.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.10.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.10.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.10.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.10.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.10.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.10.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.10.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.10.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.10.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.10.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.10.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.10.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.10.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.10.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.10.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.10.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.10.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.10.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.10.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.10.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.10.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_10-default-1-7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_10-default-1-7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_10-default-1-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.10.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.10.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.10.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.10.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.10.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.10.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.10.1.18.4.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.10.1.18.4.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.10.1.18.4.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.10.1.18.4.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.10.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.10.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.10.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.10.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.10.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.10.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.10.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.10.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.10.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.10.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.10.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.10.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.10.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.10.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.10.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.10.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.10.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.10.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.10.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.10.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.10.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.10.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.10.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.10.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.10.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.10.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.10.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-28T16:23:03Z",
"details": "moderate"
}
],
"title": "CVE-2020-36386"
},
{
"cve": "CVE-2021-0129",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-0129"
}
],
"notes": [
{
"category": "general",
"text": "Improper access control in BlueZ may allow an authenticated user to potentially enable information disclosure via adjacent access.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.10.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.10.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.10.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.10.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.10.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.10.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.10.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.10.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.10.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.10.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.10.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.10.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.10.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.10.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.10.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.10.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.10.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.10.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.10.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.10.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.10.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.10.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_10-default-1-7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_10-default-1-7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_10-default-1-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.10.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.10.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.10.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.10.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.10.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.10.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.10.1.18.4.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.10.1.18.4.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.10.1.18.4.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.10.1.18.4.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.10.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.10.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.10.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.10.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.10.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.10.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.10.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.10.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.10.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.10.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.10.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.10.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.10.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.10.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.10.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.10.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.10.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.10.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.10.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.10.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.10.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.10.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.10.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.10.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.10.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.10.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.10.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-0129",
"url": "https://www.suse.com/security/cve/CVE-2021-0129"
},
{
"category": "external",
"summary": "SUSE Bug 1186463 for CVE-2021-0129",
"url": "https://bugzilla.suse.com/1186463"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.10.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.10.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.10.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.10.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.10.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.10.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.10.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.10.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.10.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.10.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.10.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.10.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.10.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.10.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.10.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.10.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.10.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.10.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.10.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.10.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.10.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.10.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_10-default-1-7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_10-default-1-7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_10-default-1-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.10.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.10.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.10.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.10.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.10.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.10.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.10.1.18.4.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.10.1.18.4.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.10.1.18.4.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.10.1.18.4.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.10.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.10.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.10.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.10.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.10.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.10.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.10.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.10.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.10.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.10.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.10.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.10.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.10.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.10.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.10.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.10.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.10.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.10.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.10.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.10.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.10.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.10.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.10.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.10.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.10.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.10.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.10.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.10.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.10.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.10.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.10.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.10.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.10.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.10.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.10.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.10.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.10.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.10.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.10.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.10.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.10.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.10.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.10.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.10.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.10.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.10.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.10.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.10.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.10.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_10-default-1-7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_10-default-1-7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_10-default-1-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.10.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.10.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.10.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.10.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.10.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.10.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.10.1.18.4.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.10.1.18.4.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.10.1.18.4.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.10.1.18.4.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.10.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.10.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.10.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.10.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.10.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.10.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.10.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.10.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.10.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.10.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.10.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.10.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.10.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.10.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.10.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.10.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.10.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.10.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.10.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.10.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.10.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.10.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.10.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.10.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.10.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.10.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.10.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-28T16:23:03Z",
"details": "moderate"
}
],
"title": "CVE-2021-0129"
}
]
}
suse-su-2024:2923-1
Vulnerability from csaf_suse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel",
"title": "Title of the patch"
},
{
"category": "description",
"text": "The SUSE Linux Enterprise 15 SP2 kernel was updated to receive various security bugfixes.\n\n\nThe following security bugs were fixed:\n\n- CVE-2024-39494: ima: Fix use-after-free on a dentry\u0027s dname.name (bsc#1227716).\n- CVE-2024-41069: ASoC: topology: Fix route memory corruption (bsc#1228644).\n- CVE-2024-42145: IB/core: Implement a limit on UMAD receive List (bsc#1228743).\n- CVE-2024-41059: hfsplus: fix uninit-value in copy_name (bsc#1228561).\n- CVE-2023-52885: SUNRPC: Fix UAF in svc_tcp_listen_data_ready() (bsc#1227750).\n- CVE-2022-48792: scsi: pm8001: Fix use-after-free for aborted SSP/STP sas_task (bsc#1228013).\n- CVE-2024-41090: tap: add missing verification for short frame (bsc#1228328).\n- CVE-2021-47291: ipv6: fix another slab-out-of-bounds in fib6_nh_flush_exceptions (bsc#1224918).\n- CVE-2021-47126: ipv6: Fix KASAN: slab-out-of-bounds Read in fib6_nh_flush_exceptions (bsc#1221539).\n- CVE-2024-41011: drm/amdkfd: do not allow mapping the MMIO HDP page with large pages (bsc#1228114).\n- CVE-2021-47598: sch_cake: do not call cake_destroy() from cake_init() (bsc#1226574).\n- CVE-2021-47580: scsi: scsi_debug: Fix type in min_t to avoid stack OOB (bsc#1226550).\n- CVE-2021-47219: scsi: scsi_debug: Fix out-of-bound read in resp_report_tgtpgs() (bsc#1222824).\n- CVE-2024-40937: gve: Clear napi-\u003eskb before dev_kfree_skb_any() (bsc#1227836).\n- CVE-2021-0129: Improper access control in BlueZ may have allowed an authenticated user to potentially enable information disclosure via adjacent access (bsc#1186463).\n- CVE-2020-26558: Fixed a flaw in the Bluetooth LE and BR/EDR secure pairing that could permit a nearby man-in-the-middle attacker to identify the Passkey used during pairing (bsc#1179610).\n- CVE-2022-48821: misc: fastrpc: avoid double fput() on failed usercopy (bsc#1227976).\n- CVE-2021-47506: nfsd: fix use-after-free due to delegation race (bsc#1225404).\n- CVE-2021-47520: can: pch_can: pch_can_rx_normal: fix use after free (bsc#1225431).\n- CVE-2024-26583: tls: fix use-after-free on failed backlog decryption (bsc#1220185).\n- CVE-2024-26585: Fixed race between tx work scheduling and socket close (bsc#1220187).\n- CVE-2021-47600: dm btree remove: fix use after free in rebalance_children() (bsc#1226575).\n- CVE-2024-36974: net/sched: taprio: always validate TCA_TAPRIO_ATTR_PRIOMAP (bsc#1226519).\n\nThe following non-security bugs were fixed:\n\n- Fix spurious WARNING caused by a qxl driver patch (bsc#1227213)\n- X.509: Fix the parser of extended key usage for length (bsc#1218820 bsc#1226666).\n- ocfs2: fix DIO failure due to insufficient transaction credits (bsc#1216834).\n- powerpc/rtas: Prevent Spectre v1 gadget construction in sys_rtas() (bsc#1227487).\n- powerpc/rtas: clean up includes (bsc#1227487).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2024-2923,SUSE-SLE-Module-Live-Patching-15-SP2-2024-2923,SUSE-SLE-Product-HA-15-SP2-2024-2923,SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-2923,SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-2923,SUSE-SLE-Product-SLES_SAP-15-SP2-2024-2923",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2024_2923-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2024:2923-1",
"url": "https://www.suse.com/support/update/announcement/2024/suse-su-20242923-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2024:2923-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-August/019201.html"
},
{
"category": "self",
"summary": "SUSE Bug 1065729",
"url": "https://bugzilla.suse.com/1065729"
},
{
"category": "self",
"summary": "SUSE Bug 1179610",
"url": "https://bugzilla.suse.com/1179610"
},
{
"category": "self",
"summary": "SUSE Bug 1186463",
"url": "https://bugzilla.suse.com/1186463"
},
{
"category": "self",
"summary": "SUSE Bug 1216834",
"url": "https://bugzilla.suse.com/1216834"
},
{
"category": "self",
"summary": "SUSE Bug 1218820",
"url": "https://bugzilla.suse.com/1218820"
},
{
"category": "self",
"summary": "SUSE Bug 1220185",
"url": "https://bugzilla.suse.com/1220185"
},
{
"category": "self",
"summary": "SUSE Bug 1220186",
"url": "https://bugzilla.suse.com/1220186"
},
{
"category": "self",
"summary": "SUSE Bug 1220187",
"url": "https://bugzilla.suse.com/1220187"
},
{
"category": "self",
"summary": "SUSE Bug 1221539",
"url": "https://bugzilla.suse.com/1221539"
},
{
"category": "self",
"summary": "SUSE Bug 1222824",
"url": "https://bugzilla.suse.com/1222824"
},
{
"category": "self",
"summary": "SUSE Bug 1224682",
"url": "https://bugzilla.suse.com/1224682"
},
{
"category": "self",
"summary": "SUSE Bug 1224918",
"url": "https://bugzilla.suse.com/1224918"
},
{
"category": "self",
"summary": "SUSE Bug 1225404",
"url": "https://bugzilla.suse.com/1225404"
},
{
"category": "self",
"summary": "SUSE Bug 1225431",
"url": "https://bugzilla.suse.com/1225431"
},
{
"category": "self",
"summary": "SUSE Bug 1226519",
"url": "https://bugzilla.suse.com/1226519"
},
{
"category": "self",
"summary": "SUSE Bug 1226550",
"url": "https://bugzilla.suse.com/1226550"
},
{
"category": "self",
"summary": "SUSE Bug 1226574",
"url": "https://bugzilla.suse.com/1226574"
},
{
"category": "self",
"summary": "SUSE Bug 1226575",
"url": "https://bugzilla.suse.com/1226575"
},
{
"category": "self",
"summary": "SUSE Bug 1226666",
"url": "https://bugzilla.suse.com/1226666"
},
{
"category": "self",
"summary": "SUSE Bug 1226758",
"url": "https://bugzilla.suse.com/1226758"
},
{
"category": "self",
"summary": "SUSE Bug 1226785",
"url": "https://bugzilla.suse.com/1226785"
},
{
"category": "self",
"summary": "SUSE Bug 1227213",
"url": "https://bugzilla.suse.com/1227213"
},
{
"category": "self",
"summary": "SUSE Bug 1227487",
"url": "https://bugzilla.suse.com/1227487"
},
{
"category": "self",
"summary": "SUSE Bug 1227716",
"url": "https://bugzilla.suse.com/1227716"
},
{
"category": "self",
"summary": "SUSE Bug 1227750",
"url": "https://bugzilla.suse.com/1227750"
},
{
"category": "self",
"summary": "SUSE Bug 1227836",
"url": "https://bugzilla.suse.com/1227836"
},
{
"category": "self",
"summary": "SUSE Bug 1227976",
"url": "https://bugzilla.suse.com/1227976"
},
{
"category": "self",
"summary": "SUSE Bug 1228013",
"url": "https://bugzilla.suse.com/1228013"
},
{
"category": "self",
"summary": "SUSE Bug 1228114",
"url": "https://bugzilla.suse.com/1228114"
},
{
"category": "self",
"summary": "SUSE Bug 1228328",
"url": "https://bugzilla.suse.com/1228328"
},
{
"category": "self",
"summary": "SUSE Bug 1228561",
"url": "https://bugzilla.suse.com/1228561"
},
{
"category": "self",
"summary": "SUSE Bug 1228644",
"url": "https://bugzilla.suse.com/1228644"
},
{
"category": "self",
"summary": "SUSE Bug 1228743",
"url": "https://bugzilla.suse.com/1228743"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-26558 page",
"url": "https://www.suse.com/security/cve/CVE-2020-26558/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-0129 page",
"url": "https://www.suse.com/security/cve/CVE-2021-0129/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47126 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47126/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47219 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47219/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47291 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47291/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47506 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47506/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47520 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47520/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47580 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47580/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47598 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47598/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47600 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47600/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-48792 page",
"url": "https://www.suse.com/security/cve/CVE-2022-48792/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-48821 page",
"url": "https://www.suse.com/security/cve/CVE-2022-48821/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-52686 page",
"url": "https://www.suse.com/security/cve/CVE-2023-52686/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-52885 page",
"url": "https://www.suse.com/security/cve/CVE-2023-52885/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-26583 page",
"url": "https://www.suse.com/security/cve/CVE-2024-26583/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-26584 page",
"url": "https://www.suse.com/security/cve/CVE-2024-26584/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-26585 page",
"url": "https://www.suse.com/security/cve/CVE-2024-26585/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-36974 page",
"url": "https://www.suse.com/security/cve/CVE-2024-36974/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-38559 page",
"url": "https://www.suse.com/security/cve/CVE-2024-38559/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-39494 page",
"url": "https://www.suse.com/security/cve/CVE-2024-39494/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-40937 page",
"url": "https://www.suse.com/security/cve/CVE-2024-40937/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-41011 page",
"url": "https://www.suse.com/security/cve/CVE-2024-41011/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-41059 page",
"url": "https://www.suse.com/security/cve/CVE-2024-41059/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-41069 page",
"url": "https://www.suse.com/security/cve/CVE-2024-41069/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-41090 page",
"url": "https://www.suse.com/security/cve/CVE-2024-41090/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-42145 page",
"url": "https://www.suse.com/security/cve/CVE-2024-42145/"
}
],
"title": "Security update for the Linux Kernel",
"tracking": {
"current_release_date": "2024-08-15T07:01:07Z",
"generator": {
"date": "2024-08-15T07:01:07Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2024:2923-1",
"initial_release_date": "2024-08-15T07:01:07Z",
"revision_history": [
{
"date": "2024-08-15T07:01:07Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-5.3.18-150200.24.200.1.aarch64",
"product": {
"name": "cluster-md-kmp-default-5.3.18-150200.24.200.1.aarch64",
"product_id": "cluster-md-kmp-default-5.3.18-150200.24.200.1.aarch64"
}
},
{
"category": "product_version",
"name": "cluster-md-kmp-preempt-5.3.18-150200.24.200.1.aarch64",
"product": {
"name": "cluster-md-kmp-preempt-5.3.18-150200.24.200.1.aarch64",
"product_id": "cluster-md-kmp-preempt-5.3.18-150200.24.200.1.aarch64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-5.3.18-150200.24.200.1.aarch64",
"product": {
"name": "dlm-kmp-default-5.3.18-150200.24.200.1.aarch64",
"product_id": "dlm-kmp-default-5.3.18-150200.24.200.1.aarch64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-preempt-5.3.18-150200.24.200.1.aarch64",
"product": {
"name": "dlm-kmp-preempt-5.3.18-150200.24.200.1.aarch64",
"product_id": "dlm-kmp-preempt-5.3.18-150200.24.200.1.aarch64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-5.3.18-150200.24.200.1.aarch64",
"product": {
"name": "gfs2-kmp-default-5.3.18-150200.24.200.1.aarch64",
"product_id": "gfs2-kmp-default-5.3.18-150200.24.200.1.aarch64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-preempt-5.3.18-150200.24.200.1.aarch64",
"product": {
"name": "gfs2-kmp-preempt-5.3.18-150200.24.200.1.aarch64",
"product_id": "gfs2-kmp-preempt-5.3.18-150200.24.200.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-5.3.18-150200.24.200.1.aarch64",
"product": {
"name": "kernel-default-5.3.18-150200.24.200.1.aarch64",
"product_id": "kernel-default-5.3.18-150200.24.200.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.aarch64",
"product": {
"name": "kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.aarch64",
"product_id": "kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-rebuild-5.3.18-150200.24.200.1.150200.9.103.1.aarch64",
"product": {
"name": "kernel-default-base-rebuild-5.3.18-150200.24.200.1.150200.9.103.1.aarch64",
"product_id": "kernel-default-base-rebuild-5.3.18-150200.24.200.1.150200.9.103.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-5.3.18-150200.24.200.1.aarch64",
"product": {
"name": "kernel-default-devel-5.3.18-150200.24.200.1.aarch64",
"product_id": "kernel-default-devel-5.3.18-150200.24.200.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-5.3.18-150200.24.200.1.aarch64",
"product": {
"name": "kernel-default-extra-5.3.18-150200.24.200.1.aarch64",
"product_id": "kernel-default-extra-5.3.18-150200.24.200.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-5.3.18-150200.24.200.1.aarch64",
"product": {
"name": "kernel-default-livepatch-5.3.18-150200.24.200.1.aarch64",
"product_id": "kernel-default-livepatch-5.3.18-150200.24.200.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-devel-5.3.18-150200.24.200.1.aarch64",
"product": {
"name": "kernel-default-livepatch-devel-5.3.18-150200.24.200.1.aarch64",
"product_id": "kernel-default-livepatch-devel-5.3.18-150200.24.200.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-5.3.18-150200.24.200.1.aarch64",
"product": {
"name": "kernel-obs-build-5.3.18-150200.24.200.1.aarch64",
"product_id": "kernel-obs-build-5.3.18-150200.24.200.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-5.3.18-150200.24.200.1.aarch64",
"product": {
"name": "kernel-obs-qa-5.3.18-150200.24.200.1.aarch64",
"product_id": "kernel-obs-qa-5.3.18-150200.24.200.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-preempt-5.3.18-150200.24.200.1.aarch64",
"product": {
"name": "kernel-preempt-5.3.18-150200.24.200.1.aarch64",
"product_id": "kernel-preempt-5.3.18-150200.24.200.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-preempt-devel-5.3.18-150200.24.200.1.aarch64",
"product": {
"name": "kernel-preempt-devel-5.3.18-150200.24.200.1.aarch64",
"product_id": "kernel-preempt-devel-5.3.18-150200.24.200.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-preempt-extra-5.3.18-150200.24.200.1.aarch64",
"product": {
"name": "kernel-preempt-extra-5.3.18-150200.24.200.1.aarch64",
"product_id": "kernel-preempt-extra-5.3.18-150200.24.200.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-preempt-livepatch-devel-5.3.18-150200.24.200.1.aarch64",
"product": {
"name": "kernel-preempt-livepatch-devel-5.3.18-150200.24.200.1.aarch64",
"product_id": "kernel-preempt-livepatch-devel-5.3.18-150200.24.200.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-syms-5.3.18-150200.24.200.1.aarch64",
"product": {
"name": "kernel-syms-5.3.18-150200.24.200.1.aarch64",
"product_id": "kernel-syms-5.3.18-150200.24.200.1.aarch64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-5.3.18-150200.24.200.1.aarch64",
"product": {
"name": "kselftests-kmp-default-5.3.18-150200.24.200.1.aarch64",
"product_id": "kselftests-kmp-default-5.3.18-150200.24.200.1.aarch64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-preempt-5.3.18-150200.24.200.1.aarch64",
"product": {
"name": "kselftests-kmp-preempt-5.3.18-150200.24.200.1.aarch64",
"product_id": "kselftests-kmp-preempt-5.3.18-150200.24.200.1.aarch64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-5.3.18-150200.24.200.1.aarch64",
"product": {
"name": "ocfs2-kmp-default-5.3.18-150200.24.200.1.aarch64",
"product_id": "ocfs2-kmp-default-5.3.18-150200.24.200.1.aarch64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-preempt-5.3.18-150200.24.200.1.aarch64",
"product": {
"name": "ocfs2-kmp-preempt-5.3.18-150200.24.200.1.aarch64",
"product_id": "ocfs2-kmp-preempt-5.3.18-150200.24.200.1.aarch64"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-default-5.3.18-150200.24.200.1.aarch64",
"product": {
"name": "reiserfs-kmp-default-5.3.18-150200.24.200.1.aarch64",
"product_id": "reiserfs-kmp-default-5.3.18-150200.24.200.1.aarch64"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-preempt-5.3.18-150200.24.200.1.aarch64",
"product": {
"name": "reiserfs-kmp-preempt-5.3.18-150200.24.200.1.aarch64",
"product_id": "reiserfs-kmp-preempt-5.3.18-150200.24.200.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-devel-5.3.18-150200.24.200.1.noarch",
"product": {
"name": "kernel-devel-5.3.18-150200.24.200.1.noarch",
"product_id": "kernel-devel-5.3.18-150200.24.200.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-docs-5.3.18-150200.24.200.1.noarch",
"product": {
"name": "kernel-docs-5.3.18-150200.24.200.1.noarch",
"product_id": "kernel-docs-5.3.18-150200.24.200.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-docs-html-5.3.18-150200.24.200.1.noarch",
"product": {
"name": "kernel-docs-html-5.3.18-150200.24.200.1.noarch",
"product_id": "kernel-docs-html-5.3.18-150200.24.200.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-macros-5.3.18-150200.24.200.1.noarch",
"product": {
"name": "kernel-macros-5.3.18-150200.24.200.1.noarch",
"product_id": "kernel-macros-5.3.18-150200.24.200.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-5.3.18-150200.24.200.1.noarch",
"product": {
"name": "kernel-source-5.3.18-150200.24.200.1.noarch",
"product_id": "kernel-source-5.3.18-150200.24.200.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-vanilla-5.3.18-150200.24.200.1.noarch",
"product": {
"name": "kernel-source-vanilla-5.3.18-150200.24.200.1.noarch",
"product_id": "kernel-source-vanilla-5.3.18-150200.24.200.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"product": {
"name": "cluster-md-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"product_id": "cluster-md-kmp-default-5.3.18-150200.24.200.1.ppc64le"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"product": {
"name": "dlm-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"product_id": "dlm-kmp-default-5.3.18-150200.24.200.1.ppc64le"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"product": {
"name": "gfs2-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"product_id": "gfs2-kmp-default-5.3.18-150200.24.200.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-5.3.18-150200.24.200.1.ppc64le",
"product": {
"name": "kernel-debug-5.3.18-150200.24.200.1.ppc64le",
"product_id": "kernel-debug-5.3.18-150200.24.200.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-5.3.18-150200.24.200.1.ppc64le",
"product": {
"name": "kernel-debug-devel-5.3.18-150200.24.200.1.ppc64le",
"product_id": "kernel-debug-devel-5.3.18-150200.24.200.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-livepatch-devel-5.3.18-150200.24.200.1.ppc64le",
"product": {
"name": "kernel-debug-livepatch-devel-5.3.18-150200.24.200.1.ppc64le",
"product_id": "kernel-debug-livepatch-devel-5.3.18-150200.24.200.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-5.3.18-150200.24.200.1.ppc64le",
"product": {
"name": "kernel-default-5.3.18-150200.24.200.1.ppc64le",
"product_id": "kernel-default-5.3.18-150200.24.200.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.ppc64le",
"product": {
"name": "kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.ppc64le",
"product_id": "kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-base-rebuild-5.3.18-150200.24.200.1.150200.9.103.1.ppc64le",
"product": {
"name": "kernel-default-base-rebuild-5.3.18-150200.24.200.1.150200.9.103.1.ppc64le",
"product_id": "kernel-default-base-rebuild-5.3.18-150200.24.200.1.150200.9.103.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-5.3.18-150200.24.200.1.ppc64le",
"product": {
"name": "kernel-default-devel-5.3.18-150200.24.200.1.ppc64le",
"product_id": "kernel-default-devel-5.3.18-150200.24.200.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-5.3.18-150200.24.200.1.ppc64le",
"product": {
"name": "kernel-default-extra-5.3.18-150200.24.200.1.ppc64le",
"product_id": "kernel-default-extra-5.3.18-150200.24.200.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-5.3.18-150200.24.200.1.ppc64le",
"product": {
"name": "kernel-default-livepatch-5.3.18-150200.24.200.1.ppc64le",
"product_id": "kernel-default-livepatch-5.3.18-150200.24.200.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-devel-5.3.18-150200.24.200.1.ppc64le",
"product": {
"name": "kernel-default-livepatch-devel-5.3.18-150200.24.200.1.ppc64le",
"product_id": "kernel-default-livepatch-devel-5.3.18-150200.24.200.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-5.3.18-150200.24.200.1.ppc64le",
"product": {
"name": "kernel-kvmsmall-5.3.18-150200.24.200.1.ppc64le",
"product_id": "kernel-kvmsmall-5.3.18-150200.24.200.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-devel-5.3.18-150200.24.200.1.ppc64le",
"product": {
"name": "kernel-kvmsmall-devel-5.3.18-150200.24.200.1.ppc64le",
"product_id": "kernel-kvmsmall-devel-5.3.18-150200.24.200.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-livepatch-devel-5.3.18-150200.24.200.1.ppc64le",
"product": {
"name": "kernel-kvmsmall-livepatch-devel-5.3.18-150200.24.200.1.ppc64le",
"product_id": "kernel-kvmsmall-livepatch-devel-5.3.18-150200.24.200.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-150200_24_200-default-1-150200.5.3.1.ppc64le",
"product": {
"name": "kernel-livepatch-5_3_18-150200_24_200-default-1-150200.5.3.1.ppc64le",
"product_id": "kernel-livepatch-5_3_18-150200_24_200-default-1-150200.5.3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-5.3.18-150200.24.200.1.ppc64le",
"product": {
"name": "kernel-obs-build-5.3.18-150200.24.200.1.ppc64le",
"product_id": "kernel-obs-build-5.3.18-150200.24.200.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-5.3.18-150200.24.200.1.ppc64le",
"product": {
"name": "kernel-obs-qa-5.3.18-150200.24.200.1.ppc64le",
"product_id": "kernel-obs-qa-5.3.18-150200.24.200.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-syms-5.3.18-150200.24.200.1.ppc64le",
"product": {
"name": "kernel-syms-5.3.18-150200.24.200.1.ppc64le",
"product_id": "kernel-syms-5.3.18-150200.24.200.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"product": {
"name": "kselftests-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"product_id": "kselftests-kmp-default-5.3.18-150200.24.200.1.ppc64le"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"product": {
"name": "ocfs2-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"product_id": "ocfs2-kmp-default-5.3.18-150200.24.200.1.ppc64le"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"product": {
"name": "reiserfs-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"product_id": "reiserfs-kmp-default-5.3.18-150200.24.200.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-5.3.18-150200.24.200.1.s390x",
"product": {
"name": "cluster-md-kmp-default-5.3.18-150200.24.200.1.s390x",
"product_id": "cluster-md-kmp-default-5.3.18-150200.24.200.1.s390x"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-5.3.18-150200.24.200.1.s390x",
"product": {
"name": "dlm-kmp-default-5.3.18-150200.24.200.1.s390x",
"product_id": "dlm-kmp-default-5.3.18-150200.24.200.1.s390x"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-5.3.18-150200.24.200.1.s390x",
"product": {
"name": "gfs2-kmp-default-5.3.18-150200.24.200.1.s390x",
"product_id": "gfs2-kmp-default-5.3.18-150200.24.200.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-5.3.18-150200.24.200.1.s390x",
"product": {
"name": "kernel-default-5.3.18-150200.24.200.1.s390x",
"product_id": "kernel-default-5.3.18-150200.24.200.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.s390x",
"product": {
"name": "kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.s390x",
"product_id": "kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-base-rebuild-5.3.18-150200.24.200.1.150200.9.103.1.s390x",
"product": {
"name": "kernel-default-base-rebuild-5.3.18-150200.24.200.1.150200.9.103.1.s390x",
"product_id": "kernel-default-base-rebuild-5.3.18-150200.24.200.1.150200.9.103.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-5.3.18-150200.24.200.1.s390x",
"product": {
"name": "kernel-default-devel-5.3.18-150200.24.200.1.s390x",
"product_id": "kernel-default-devel-5.3.18-150200.24.200.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-5.3.18-150200.24.200.1.s390x",
"product": {
"name": "kernel-default-extra-5.3.18-150200.24.200.1.s390x",
"product_id": "kernel-default-extra-5.3.18-150200.24.200.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-5.3.18-150200.24.200.1.s390x",
"product": {
"name": "kernel-default-livepatch-5.3.18-150200.24.200.1.s390x",
"product_id": "kernel-default-livepatch-5.3.18-150200.24.200.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-devel-5.3.18-150200.24.200.1.s390x",
"product": {
"name": "kernel-default-livepatch-devel-5.3.18-150200.24.200.1.s390x",
"product_id": "kernel-default-livepatch-devel-5.3.18-150200.24.200.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-150200_24_200-default-1-150200.5.3.1.s390x",
"product": {
"name": "kernel-livepatch-5_3_18-150200_24_200-default-1-150200.5.3.1.s390x",
"product_id": "kernel-livepatch-5_3_18-150200_24_200-default-1-150200.5.3.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-5.3.18-150200.24.200.1.s390x",
"product": {
"name": "kernel-obs-build-5.3.18-150200.24.200.1.s390x",
"product_id": "kernel-obs-build-5.3.18-150200.24.200.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-5.3.18-150200.24.200.1.s390x",
"product": {
"name": "kernel-obs-qa-5.3.18-150200.24.200.1.s390x",
"product_id": "kernel-obs-qa-5.3.18-150200.24.200.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-syms-5.3.18-150200.24.200.1.s390x",
"product": {
"name": "kernel-syms-5.3.18-150200.24.200.1.s390x",
"product_id": "kernel-syms-5.3.18-150200.24.200.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-5.3.18-150200.24.200.1.s390x",
"product": {
"name": "kernel-zfcpdump-5.3.18-150200.24.200.1.s390x",
"product_id": "kernel-zfcpdump-5.3.18-150200.24.200.1.s390x"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-5.3.18-150200.24.200.1.s390x",
"product": {
"name": "kselftests-kmp-default-5.3.18-150200.24.200.1.s390x",
"product_id": "kselftests-kmp-default-5.3.18-150200.24.200.1.s390x"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-5.3.18-150200.24.200.1.s390x",
"product": {
"name": "ocfs2-kmp-default-5.3.18-150200.24.200.1.s390x",
"product_id": "ocfs2-kmp-default-5.3.18-150200.24.200.1.s390x"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-default-5.3.18-150200.24.200.1.s390x",
"product": {
"name": "reiserfs-kmp-default-5.3.18-150200.24.200.1.s390x",
"product_id": "reiserfs-kmp-default-5.3.18-150200.24.200.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-5.3.18-150200.24.200.1.x86_64",
"product": {
"name": "cluster-md-kmp-default-5.3.18-150200.24.200.1.x86_64",
"product_id": "cluster-md-kmp-default-5.3.18-150200.24.200.1.x86_64"
}
},
{
"category": "product_version",
"name": "cluster-md-kmp-preempt-5.3.18-150200.24.200.1.x86_64",
"product": {
"name": "cluster-md-kmp-preempt-5.3.18-150200.24.200.1.x86_64",
"product_id": "cluster-md-kmp-preempt-5.3.18-150200.24.200.1.x86_64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-5.3.18-150200.24.200.1.x86_64",
"product": {
"name": "dlm-kmp-default-5.3.18-150200.24.200.1.x86_64",
"product_id": "dlm-kmp-default-5.3.18-150200.24.200.1.x86_64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-preempt-5.3.18-150200.24.200.1.x86_64",
"product": {
"name": "dlm-kmp-preempt-5.3.18-150200.24.200.1.x86_64",
"product_id": "dlm-kmp-preempt-5.3.18-150200.24.200.1.x86_64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-5.3.18-150200.24.200.1.x86_64",
"product": {
"name": "gfs2-kmp-default-5.3.18-150200.24.200.1.x86_64",
"product_id": "gfs2-kmp-default-5.3.18-150200.24.200.1.x86_64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-preempt-5.3.18-150200.24.200.1.x86_64",
"product": {
"name": "gfs2-kmp-preempt-5.3.18-150200.24.200.1.x86_64",
"product_id": "gfs2-kmp-preempt-5.3.18-150200.24.200.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-5.3.18-150200.24.200.1.x86_64",
"product": {
"name": "kernel-debug-5.3.18-150200.24.200.1.x86_64",
"product_id": "kernel-debug-5.3.18-150200.24.200.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-5.3.18-150200.24.200.1.x86_64",
"product": {
"name": "kernel-debug-devel-5.3.18-150200.24.200.1.x86_64",
"product_id": "kernel-debug-devel-5.3.18-150200.24.200.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-livepatch-devel-5.3.18-150200.24.200.1.x86_64",
"product": {
"name": "kernel-debug-livepatch-devel-5.3.18-150200.24.200.1.x86_64",
"product_id": "kernel-debug-livepatch-devel-5.3.18-150200.24.200.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-5.3.18-150200.24.200.1.x86_64",
"product": {
"name": "kernel-default-5.3.18-150200.24.200.1.x86_64",
"product_id": "kernel-default-5.3.18-150200.24.200.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.x86_64",
"product": {
"name": "kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.x86_64",
"product_id": "kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-rebuild-5.3.18-150200.24.200.1.150200.9.103.1.x86_64",
"product": {
"name": "kernel-default-base-rebuild-5.3.18-150200.24.200.1.150200.9.103.1.x86_64",
"product_id": "kernel-default-base-rebuild-5.3.18-150200.24.200.1.150200.9.103.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-5.3.18-150200.24.200.1.x86_64",
"product": {
"name": "kernel-default-devel-5.3.18-150200.24.200.1.x86_64",
"product_id": "kernel-default-devel-5.3.18-150200.24.200.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-5.3.18-150200.24.200.1.x86_64",
"product": {
"name": "kernel-default-extra-5.3.18-150200.24.200.1.x86_64",
"product_id": "kernel-default-extra-5.3.18-150200.24.200.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-5.3.18-150200.24.200.1.x86_64",
"product": {
"name": "kernel-default-livepatch-5.3.18-150200.24.200.1.x86_64",
"product_id": "kernel-default-livepatch-5.3.18-150200.24.200.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-devel-5.3.18-150200.24.200.1.x86_64",
"product": {
"name": "kernel-default-livepatch-devel-5.3.18-150200.24.200.1.x86_64",
"product_id": "kernel-default-livepatch-devel-5.3.18-150200.24.200.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-5.3.18-150200.24.200.1.x86_64",
"product": {
"name": "kernel-kvmsmall-5.3.18-150200.24.200.1.x86_64",
"product_id": "kernel-kvmsmall-5.3.18-150200.24.200.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-devel-5.3.18-150200.24.200.1.x86_64",
"product": {
"name": "kernel-kvmsmall-devel-5.3.18-150200.24.200.1.x86_64",
"product_id": "kernel-kvmsmall-devel-5.3.18-150200.24.200.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-livepatch-devel-5.3.18-150200.24.200.1.x86_64",
"product": {
"name": "kernel-kvmsmall-livepatch-devel-5.3.18-150200.24.200.1.x86_64",
"product_id": "kernel-kvmsmall-livepatch-devel-5.3.18-150200.24.200.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-150200_24_200-default-1-150200.5.3.1.x86_64",
"product": {
"name": "kernel-livepatch-5_3_18-150200_24_200-default-1-150200.5.3.1.x86_64",
"product_id": "kernel-livepatch-5_3_18-150200_24_200-default-1-150200.5.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-150200_24_200-preempt-1-150200.5.3.1.x86_64",
"product": {
"name": "kernel-livepatch-5_3_18-150200_24_200-preempt-1-150200.5.3.1.x86_64",
"product_id": "kernel-livepatch-5_3_18-150200_24_200-preempt-1-150200.5.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-5.3.18-150200.24.200.1.x86_64",
"product": {
"name": "kernel-obs-build-5.3.18-150200.24.200.1.x86_64",
"product_id": "kernel-obs-build-5.3.18-150200.24.200.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-5.3.18-150200.24.200.1.x86_64",
"product": {
"name": "kernel-obs-qa-5.3.18-150200.24.200.1.x86_64",
"product_id": "kernel-obs-qa-5.3.18-150200.24.200.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-preempt-5.3.18-150200.24.200.1.x86_64",
"product": {
"name": "kernel-preempt-5.3.18-150200.24.200.1.x86_64",
"product_id": "kernel-preempt-5.3.18-150200.24.200.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-preempt-devel-5.3.18-150200.24.200.1.x86_64",
"product": {
"name": "kernel-preempt-devel-5.3.18-150200.24.200.1.x86_64",
"product_id": "kernel-preempt-devel-5.3.18-150200.24.200.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-preempt-extra-5.3.18-150200.24.200.1.x86_64",
"product": {
"name": "kernel-preempt-extra-5.3.18-150200.24.200.1.x86_64",
"product_id": "kernel-preempt-extra-5.3.18-150200.24.200.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-preempt-livepatch-devel-5.3.18-150200.24.200.1.x86_64",
"product": {
"name": "kernel-preempt-livepatch-devel-5.3.18-150200.24.200.1.x86_64",
"product_id": "kernel-preempt-livepatch-devel-5.3.18-150200.24.200.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-syms-5.3.18-150200.24.200.1.x86_64",
"product": {
"name": "kernel-syms-5.3.18-150200.24.200.1.x86_64",
"product_id": "kernel-syms-5.3.18-150200.24.200.1.x86_64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-5.3.18-150200.24.200.1.x86_64",
"product": {
"name": "kselftests-kmp-default-5.3.18-150200.24.200.1.x86_64",
"product_id": "kselftests-kmp-default-5.3.18-150200.24.200.1.x86_64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-preempt-5.3.18-150200.24.200.1.x86_64",
"product": {
"name": "kselftests-kmp-preempt-5.3.18-150200.24.200.1.x86_64",
"product_id": "kselftests-kmp-preempt-5.3.18-150200.24.200.1.x86_64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-5.3.18-150200.24.200.1.x86_64",
"product": {
"name": "ocfs2-kmp-default-5.3.18-150200.24.200.1.x86_64",
"product_id": "ocfs2-kmp-default-5.3.18-150200.24.200.1.x86_64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-preempt-5.3.18-150200.24.200.1.x86_64",
"product": {
"name": "ocfs2-kmp-preempt-5.3.18-150200.24.200.1.x86_64",
"product_id": "ocfs2-kmp-preempt-5.3.18-150200.24.200.1.x86_64"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-default-5.3.18-150200.24.200.1.x86_64",
"product": {
"name": "reiserfs-kmp-default-5.3.18-150200.24.200.1.x86_64",
"product_id": "reiserfs-kmp-default-5.3.18-150200.24.200.1.x86_64"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-preempt-5.3.18-150200.24.200.1.x86_64",
"product": {
"name": "reiserfs-kmp-preempt-5.3.18-150200.24.200.1.x86_64",
"product_id": "reiserfs-kmp-preempt-5.3.18-150200.24.200.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 15 SP2",
"product": {
"name": "SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-live-patching:15:sp2"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Availability Extension 15 SP2",
"product": {
"name": "SUSE Linux Enterprise High Availability Extension 15 SP2",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-ha:15:sp2"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle_hpc-ltss:15:sp2"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 15 SP2-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:15:sp2"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP2",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:15:sp2"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-5.3.18-150200.24.200.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.200.1.ppc64le"
},
"product_reference": "kernel-default-livepatch-5.3.18-150200.24.200.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-5.3.18-150200.24.200.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.200.1.s390x"
},
"product_reference": "kernel-default-livepatch-5.3.18-150200.24.200.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-5.3.18-150200.24.200.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.200.1.x86_64"
},
"product_reference": "kernel-default-livepatch-5.3.18-150200.24.200.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-devel-5.3.18-150200.24.200.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.200.1.ppc64le"
},
"product_reference": "kernel-default-livepatch-devel-5.3.18-150200.24.200.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-devel-5.3.18-150200.24.200.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.200.1.s390x"
},
"product_reference": "kernel-default-livepatch-devel-5.3.18-150200.24.200.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-devel-5.3.18-150200.24.200.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.200.1.x86_64"
},
"product_reference": "kernel-default-livepatch-devel-5.3.18-150200.24.200.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-150200_24_200-default-1-150200.5.3.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_200-default-1-150200.5.3.1.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-150200_24_200-default-1-150200.5.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-150200_24_200-default-1-150200.5.3.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_200-default-1-150200.5.3.1.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-150200_24_200-default-1-150200.5.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-150200_24_200-default-1-150200.5.3.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_200-default-1-150200.5.3.1.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-150200_24_200-default-1-150200.5.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-5.3.18-150200.24.200.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP2",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.200.1.aarch64"
},
"product_reference": "cluster-md-kmp-default-5.3.18-150200.24.200.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-5.3.18-150200.24.200.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP2",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.200.1.ppc64le"
},
"product_reference": "cluster-md-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-5.3.18-150200.24.200.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP2",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.200.1.s390x"
},
"product_reference": "cluster-md-kmp-default-5.3.18-150200.24.200.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-5.3.18-150200.24.200.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP2",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.200.1.x86_64"
},
"product_reference": "cluster-md-kmp-default-5.3.18-150200.24.200.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-5.3.18-150200.24.200.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP2",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.200.1.aarch64"
},
"product_reference": "dlm-kmp-default-5.3.18-150200.24.200.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-5.3.18-150200.24.200.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP2",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.200.1.ppc64le"
},
"product_reference": "dlm-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-5.3.18-150200.24.200.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP2",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.200.1.s390x"
},
"product_reference": "dlm-kmp-default-5.3.18-150200.24.200.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-5.3.18-150200.24.200.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP2",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.200.1.x86_64"
},
"product_reference": "dlm-kmp-default-5.3.18-150200.24.200.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-5.3.18-150200.24.200.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP2",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.200.1.aarch64"
},
"product_reference": "gfs2-kmp-default-5.3.18-150200.24.200.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-5.3.18-150200.24.200.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP2",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.200.1.ppc64le"
},
"product_reference": "gfs2-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-5.3.18-150200.24.200.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP2",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.200.1.s390x"
},
"product_reference": "gfs2-kmp-default-5.3.18-150200.24.200.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-5.3.18-150200.24.200.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP2",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.200.1.x86_64"
},
"product_reference": "gfs2-kmp-default-5.3.18-150200.24.200.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-5.3.18-150200.24.200.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP2",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.200.1.aarch64"
},
"product_reference": "ocfs2-kmp-default-5.3.18-150200.24.200.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-5.3.18-150200.24.200.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP2",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.200.1.ppc64le"
},
"product_reference": "ocfs2-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-5.3.18-150200.24.200.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP2",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.200.1.s390x"
},
"product_reference": "ocfs2-kmp-default-5.3.18-150200.24.200.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-5.3.18-150200.24.200.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP2",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.200.1.x86_64"
},
"product_reference": "ocfs2-kmp-default-5.3.18-150200.24.200.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.3.18-150200.24.200.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.aarch64"
},
"product_reference": "kernel-default-5.3.18-150200.24.200.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.3.18-150200.24.200.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.x86_64"
},
"product_reference": "kernel-default-5.3.18-150200.24.200.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.aarch64"
},
"product_reference": "kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.x86_64"
},
"product_reference": "kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-5.3.18-150200.24.200.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.aarch64"
},
"product_reference": "kernel-default-devel-5.3.18-150200.24.200.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-5.3.18-150200.24.200.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.x86_64"
},
"product_reference": "kernel-default-devel-5.3.18-150200.24.200.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-5.3.18-150200.24.200.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.200.1.noarch"
},
"product_reference": "kernel-devel-5.3.18-150200.24.200.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-docs-5.3.18-150200.24.200.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.200.1.noarch"
},
"product_reference": "kernel-docs-5.3.18-150200.24.200.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-5.3.18-150200.24.200.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.200.1.noarch"
},
"product_reference": "kernel-macros-5.3.18-150200.24.200.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-5.3.18-150200.24.200.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.aarch64"
},
"product_reference": "kernel-obs-build-5.3.18-150200.24.200.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-5.3.18-150200.24.200.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.x86_64"
},
"product_reference": "kernel-obs-build-5.3.18-150200.24.200.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-preempt-5.3.18-150200.24.200.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.200.1.aarch64"
},
"product_reference": "kernel-preempt-5.3.18-150200.24.200.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-preempt-5.3.18-150200.24.200.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.200.1.x86_64"
},
"product_reference": "kernel-preempt-5.3.18-150200.24.200.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-preempt-devel-5.3.18-150200.24.200.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.200.1.aarch64"
},
"product_reference": "kernel-preempt-devel-5.3.18-150200.24.200.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-preempt-devel-5.3.18-150200.24.200.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.200.1.x86_64"
},
"product_reference": "kernel-preempt-devel-5.3.18-150200.24.200.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-5.3.18-150200.24.200.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.200.1.noarch"
},
"product_reference": "kernel-source-5.3.18-150200.24.200.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-5.3.18-150200.24.200.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.aarch64"
},
"product_reference": "kernel-syms-5.3.18-150200.24.200.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-5.3.18-150200.24.200.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.x86_64"
},
"product_reference": "kernel-syms-5.3.18-150200.24.200.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.3.18-150200.24.200.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.aarch64"
},
"product_reference": "kernel-default-5.3.18-150200.24.200.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.3.18-150200.24.200.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.ppc64le"
},
"product_reference": "kernel-default-5.3.18-150200.24.200.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.3.18-150200.24.200.1.s390x as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.s390x"
},
"product_reference": "kernel-default-5.3.18-150200.24.200.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.3.18-150200.24.200.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.x86_64"
},
"product_reference": "kernel-default-5.3.18-150200.24.200.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.aarch64"
},
"product_reference": "kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.ppc64le"
},
"product_reference": "kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.s390x as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.s390x"
},
"product_reference": "kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.x86_64"
},
"product_reference": "kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-5.3.18-150200.24.200.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.aarch64"
},
"product_reference": "kernel-default-devel-5.3.18-150200.24.200.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-5.3.18-150200.24.200.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.ppc64le"
},
"product_reference": "kernel-default-devel-5.3.18-150200.24.200.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-5.3.18-150200.24.200.1.s390x as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.s390x"
},
"product_reference": "kernel-default-devel-5.3.18-150200.24.200.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-5.3.18-150200.24.200.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.x86_64"
},
"product_reference": "kernel-default-devel-5.3.18-150200.24.200.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-5.3.18-150200.24.200.1.noarch as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.200.1.noarch"
},
"product_reference": "kernel-devel-5.3.18-150200.24.200.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-docs-5.3.18-150200.24.200.1.noarch as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.200.1.noarch"
},
"product_reference": "kernel-docs-5.3.18-150200.24.200.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-5.3.18-150200.24.200.1.noarch as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.200.1.noarch"
},
"product_reference": "kernel-macros-5.3.18-150200.24.200.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-5.3.18-150200.24.200.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.aarch64"
},
"product_reference": "kernel-obs-build-5.3.18-150200.24.200.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-5.3.18-150200.24.200.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.ppc64le"
},
"product_reference": "kernel-obs-build-5.3.18-150200.24.200.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-5.3.18-150200.24.200.1.s390x as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.s390x"
},
"product_reference": "kernel-obs-build-5.3.18-150200.24.200.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-5.3.18-150200.24.200.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.x86_64"
},
"product_reference": "kernel-obs-build-5.3.18-150200.24.200.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-preempt-5.3.18-150200.24.200.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.200.1.aarch64"
},
"product_reference": "kernel-preempt-5.3.18-150200.24.200.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-preempt-5.3.18-150200.24.200.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.200.1.x86_64"
},
"product_reference": "kernel-preempt-5.3.18-150200.24.200.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-preempt-devel-5.3.18-150200.24.200.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.200.1.aarch64"
},
"product_reference": "kernel-preempt-devel-5.3.18-150200.24.200.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-preempt-devel-5.3.18-150200.24.200.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.200.1.x86_64"
},
"product_reference": "kernel-preempt-devel-5.3.18-150200.24.200.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-5.3.18-150200.24.200.1.noarch as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.200.1.noarch"
},
"product_reference": "kernel-source-5.3.18-150200.24.200.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-5.3.18-150200.24.200.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.aarch64"
},
"product_reference": "kernel-syms-5.3.18-150200.24.200.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-5.3.18-150200.24.200.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.ppc64le"
},
"product_reference": "kernel-syms-5.3.18-150200.24.200.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-5.3.18-150200.24.200.1.s390x as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.s390x"
},
"product_reference": "kernel-syms-5.3.18-150200.24.200.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-5.3.18-150200.24.200.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.x86_64"
},
"product_reference": "kernel-syms-5.3.18-150200.24.200.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-5.3.18-150200.24.200.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.200.1.aarch64"
},
"product_reference": "reiserfs-kmp-default-5.3.18-150200.24.200.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-5.3.18-150200.24.200.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.200.1.ppc64le"
},
"product_reference": "reiserfs-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-5.3.18-150200.24.200.1.s390x as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.200.1.s390x"
},
"product_reference": "reiserfs-kmp-default-5.3.18-150200.24.200.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-5.3.18-150200.24.200.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.200.1.x86_64"
},
"product_reference": "reiserfs-kmp-default-5.3.18-150200.24.200.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.3.18-150200.24.200.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.200.1.ppc64le"
},
"product_reference": "kernel-default-5.3.18-150200.24.200.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.3.18-150200.24.200.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.200.1.x86_64"
},
"product_reference": "kernel-default-5.3.18-150200.24.200.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.ppc64le"
},
"product_reference": "kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.x86_64"
},
"product_reference": "kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-5.3.18-150200.24.200.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.200.1.ppc64le"
},
"product_reference": "kernel-default-devel-5.3.18-150200.24.200.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-5.3.18-150200.24.200.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.200.1.x86_64"
},
"product_reference": "kernel-default-devel-5.3.18-150200.24.200.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-5.3.18-150200.24.200.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.200.1.noarch"
},
"product_reference": "kernel-devel-5.3.18-150200.24.200.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-docs-5.3.18-150200.24.200.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.200.1.noarch"
},
"product_reference": "kernel-docs-5.3.18-150200.24.200.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-5.3.18-150200.24.200.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.200.1.noarch"
},
"product_reference": "kernel-macros-5.3.18-150200.24.200.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-5.3.18-150200.24.200.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.200.1.ppc64le"
},
"product_reference": "kernel-obs-build-5.3.18-150200.24.200.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-5.3.18-150200.24.200.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.200.1.x86_64"
},
"product_reference": "kernel-obs-build-5.3.18-150200.24.200.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-preempt-5.3.18-150200.24.200.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.200.1.x86_64"
},
"product_reference": "kernel-preempt-5.3.18-150200.24.200.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-preempt-devel-5.3.18-150200.24.200.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.200.1.x86_64"
},
"product_reference": "kernel-preempt-devel-5.3.18-150200.24.200.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-5.3.18-150200.24.200.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.200.1.noarch"
},
"product_reference": "kernel-source-5.3.18-150200.24.200.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-5.3.18-150200.24.200.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.200.1.ppc64le"
},
"product_reference": "kernel-syms-5.3.18-150200.24.200.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-5.3.18-150200.24.200.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.200.1.x86_64"
},
"product_reference": "kernel-syms-5.3.18-150200.24.200.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-5.3.18-150200.24.200.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.200.1.ppc64le"
},
"product_reference": "reiserfs-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-5.3.18-150200.24.200.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.200.1.x86_64"
},
"product_reference": "reiserfs-kmp-default-5.3.18-150200.24.200.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2020-26558",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-26558"
}
],
"notes": [
{
"category": "general",
"text": "Bluetooth LE and BR/EDR secure pairing in Bluetooth Core Specification 2.1 through 5.2 may permit a nearby man-in-the-middle attacker to identify the Passkey used during pairing (in the Passkey authentication procedure) by reflection of the public key and the authentication evidence of the initiating device, potentially permitting this attacker to complete authenticated pairing with the responding device using the correct Passkey for the pairing session. The attack methodology determines the Passkey value one bit at a time.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_200-default-1-150200.5.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_200-default-1-150200.5.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_200-default-1-150200.5.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.200.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-26558",
"url": "https://www.suse.com/security/cve/CVE-2020-26558"
},
{
"category": "external",
"summary": "SUSE Bug 1179610 for CVE-2020-26558",
"url": "https://bugzilla.suse.com/1179610"
},
{
"category": "external",
"summary": "SUSE Bug 1186463 for CVE-2020-26558",
"url": "https://bugzilla.suse.com/1186463"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_200-default-1-150200.5.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_200-default-1-150200.5.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_200-default-1-150200.5.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.200.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_200-default-1-150200.5.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_200-default-1-150200.5.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_200-default-1-150200.5.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.200.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-15T07:01:07Z",
"details": "moderate"
}
],
"title": "CVE-2020-26558"
},
{
"cve": "CVE-2021-0129",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-0129"
}
],
"notes": [
{
"category": "general",
"text": "Improper access control in BlueZ may allow an authenticated user to potentially enable information disclosure via adjacent access.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_200-default-1-150200.5.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_200-default-1-150200.5.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_200-default-1-150200.5.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.200.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-0129",
"url": "https://www.suse.com/security/cve/CVE-2021-0129"
},
{
"category": "external",
"summary": "SUSE Bug 1186463 for CVE-2021-0129",
"url": "https://bugzilla.suse.com/1186463"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_200-default-1-150200.5.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_200-default-1-150200.5.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_200-default-1-150200.5.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.200.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_200-default-1-150200.5.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_200-default-1-150200.5.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_200-default-1-150200.5.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.200.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-15T07:01:07Z",
"details": "moderate"
}
],
"title": "CVE-2021-0129"
},
{
"cve": "CVE-2021-47126",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47126"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nipv6: Fix KASAN: slab-out-of-bounds Read in fib6_nh_flush_exceptions\n\nReported by syzbot:\nHEAD commit: 90c911ad Merge tag \u0027fixes\u0027 of git://git.kernel.org/pub/scm..\ngit tree: git://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git master\ndashboard link: https://syzkaller.appspot.com/bug?extid=123aa35098fd3c000eb7\ncompiler: Debian clang version 11.0.1-2\n\n==================================================================\nBUG: KASAN: slab-out-of-bounds in fib6_nh_get_excptn_bucket net/ipv6/route.c:1604 [inline]\nBUG: KASAN: slab-out-of-bounds in fib6_nh_flush_exceptions+0xbd/0x360 net/ipv6/route.c:1732\nRead of size 8 at addr ffff8880145c78f8 by task syz-executor.4/17760\n\nCPU: 0 PID: 17760 Comm: syz-executor.4 Not tainted 5.12.0-rc8-syzkaller #0\nCall Trace:\n \u003cIRQ\u003e\n __dump_stack lib/dump_stack.c:79 [inline]\n dump_stack+0x202/0x31e lib/dump_stack.c:120\n print_address_description+0x5f/0x3b0 mm/kasan/report.c:232\n __kasan_report mm/kasan/report.c:399 [inline]\n kasan_report+0x15c/0x200 mm/kasan/report.c:416\n fib6_nh_get_excptn_bucket net/ipv6/route.c:1604 [inline]\n fib6_nh_flush_exceptions+0xbd/0x360 net/ipv6/route.c:1732\n fib6_nh_release+0x9a/0x430 net/ipv6/route.c:3536\n fib6_info_destroy_rcu+0xcb/0x1c0 net/ipv6/ip6_fib.c:174\n rcu_do_batch kernel/rcu/tree.c:2559 [inline]\n rcu_core+0x8f6/0x1450 kernel/rcu/tree.c:2794\n __do_softirq+0x372/0x7a6 kernel/softirq.c:345\n invoke_softirq kernel/softirq.c:221 [inline]\n __irq_exit_rcu+0x22c/0x260 kernel/softirq.c:422\n irq_exit_rcu+0x5/0x20 kernel/softirq.c:434\n sysvec_apic_timer_interrupt+0x91/0xb0 arch/x86/kernel/apic/apic.c:1100\n \u003c/IRQ\u003e\n asm_sysvec_apic_timer_interrupt+0x12/0x20 arch/x86/include/asm/idtentry.h:632\nRIP: 0010:lock_acquire+0x1f6/0x720 kernel/locking/lockdep.c:5515\nCode: f6 84 24 a1 00 00 00 02 0f 85 8d 02 00 00 f7 c3 00 02 00 00 49 bd 00 00 00 00 00 fc ff df 74 01 fb 48 c7 44 24 40 0e 36 e0 45 \u003c4b\u003e c7 44 3d 00 00 00 00 00 4b c7 44 3d 09 00 00 00 00 43 c7 44 3d\nRSP: 0018:ffffc90009e06560 EFLAGS: 00000206\nRAX: 1ffff920013c0cc0 RBX: 0000000000000246 RCX: dffffc0000000000\nRDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000\nRBP: ffffc90009e066e0 R08: dffffc0000000000 R09: fffffbfff1f992b1\nR10: fffffbfff1f992b1 R11: 0000000000000000 R12: 0000000000000000\nR13: dffffc0000000000 R14: 0000000000000000 R15: 1ffff920013c0cb4\n rcu_lock_acquire+0x2a/0x30 include/linux/rcupdate.h:267\n rcu_read_lock include/linux/rcupdate.h:656 [inline]\n ext4_get_group_info+0xea/0x340 fs/ext4/ext4.h:3231\n ext4_mb_prefetch+0x123/0x5d0 fs/ext4/mballoc.c:2212\n ext4_mb_regular_allocator+0x8a5/0x28f0 fs/ext4/mballoc.c:2379\n ext4_mb_new_blocks+0xc6e/0x24f0 fs/ext4/mballoc.c:4982\n ext4_ext_map_blocks+0x2be3/0x7210 fs/ext4/extents.c:4238\n ext4_map_blocks+0xab3/0x1cb0 fs/ext4/inode.c:638\n ext4_getblk+0x187/0x6c0 fs/ext4/inode.c:848\n ext4_bread+0x2a/0x1c0 fs/ext4/inode.c:900\n ext4_append+0x1a4/0x360 fs/ext4/namei.c:67\n ext4_init_new_dir+0x337/0xa10 fs/ext4/namei.c:2768\n ext4_mkdir+0x4b8/0xc00 fs/ext4/namei.c:2814\n vfs_mkdir+0x45b/0x640 fs/namei.c:3819\n ovl_do_mkdir fs/overlayfs/overlayfs.h:161 [inline]\n ovl_mkdir_real+0x53/0x1a0 fs/overlayfs/dir.c:146\n ovl_create_real+0x280/0x490 fs/overlayfs/dir.c:193\n ovl_workdir_create+0x425/0x600 fs/overlayfs/super.c:788\n ovl_make_workdir+0xed/0x1140 fs/overlayfs/super.c:1355\n ovl_get_workdir fs/overlayfs/super.c:1492 [inline]\n ovl_fill_super+0x39ee/0x5370 fs/overlayfs/super.c:2035\n mount_nodev+0x52/0xe0 fs/super.c:1413\n legacy_get_tree+0xea/0x180 fs/fs_context.c:592\n vfs_get_tree+0x86/0x270 fs/super.c:1497\n do_new_mount fs/namespace.c:2903 [inline]\n path_mount+0x196f/0x2be0 fs/namespace.c:3233\n do_mount fs/namespace.c:3246 [inline]\n __do_sys_mount fs/namespace.c:3454 [inline]\n __se_sys_mount+0x2f9/0x3b0 fs/namespace.c:3431\n do_syscall_64+0x2d/0x70 arch/x86/entry/common.c:46\n entry_SYSCALL_64_after_hwframe+0x44/0xae\nRIP: 0033:0x4665f9\nCode: ff ff c3 66 2e 0f 1f 84 \n---truncated---",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_200-default-1-150200.5.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_200-default-1-150200.5.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_200-default-1-150200.5.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.200.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47126",
"url": "https://www.suse.com/security/cve/CVE-2021-47126"
},
{
"category": "external",
"summary": "SUSE Bug 1221539 for CVE-2021-47126",
"url": "https://bugzilla.suse.com/1221539"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_200-default-1-150200.5.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_200-default-1-150200.5.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_200-default-1-150200.5.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.200.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_200-default-1-150200.5.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_200-default-1-150200.5.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_200-default-1-150200.5.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.200.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-15T07:01:07Z",
"details": "moderate"
}
],
"title": "CVE-2021-47126"
},
{
"cve": "CVE-2021-47219",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47219"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: scsi_debug: Fix out-of-bound read in resp_report_tgtpgs()\n\nThe following issue was observed running syzkaller:\n\nBUG: KASAN: slab-out-of-bounds in memcpy include/linux/string.h:377 [inline]\nBUG: KASAN: slab-out-of-bounds in sg_copy_buffer+0x150/0x1c0 lib/scatterlist.c:831\nRead of size 2132 at addr ffff8880aea95dc8 by task syz-executor.0/9815\n\nCPU: 0 PID: 9815 Comm: syz-executor.0 Not tainted 4.19.202-00874-gfc0fe04215a9 #2\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.10.2-1ubuntu1 04/01/2014\nCall Trace:\n __dump_stack lib/dump_stack.c:77 [inline]\n dump_stack+0xe4/0x14a lib/dump_stack.c:118\n print_address_description+0x73/0x280 mm/kasan/report.c:253\n kasan_report_error mm/kasan/report.c:352 [inline]\n kasan_report+0x272/0x370 mm/kasan/report.c:410\n memcpy+0x1f/0x50 mm/kasan/kasan.c:302\n memcpy include/linux/string.h:377 [inline]\n sg_copy_buffer+0x150/0x1c0 lib/scatterlist.c:831\n fill_from_dev_buffer+0x14f/0x340 drivers/scsi/scsi_debug.c:1021\n resp_report_tgtpgs+0x5aa/0x770 drivers/scsi/scsi_debug.c:1772\n schedule_resp+0x464/0x12f0 drivers/scsi/scsi_debug.c:4429\n scsi_debug_queuecommand+0x467/0x1390 drivers/scsi/scsi_debug.c:5835\n scsi_dispatch_cmd+0x3fc/0x9b0 drivers/scsi/scsi_lib.c:1896\n scsi_request_fn+0x1042/0x1810 drivers/scsi/scsi_lib.c:2034\n __blk_run_queue_uncond block/blk-core.c:464 [inline]\n __blk_run_queue+0x1a4/0x380 block/blk-core.c:484\n blk_execute_rq_nowait+0x1c2/0x2d0 block/blk-exec.c:78\n sg_common_write.isra.19+0xd74/0x1dc0 drivers/scsi/sg.c:847\n sg_write.part.23+0x6e0/0xd00 drivers/scsi/sg.c:716\n sg_write+0x64/0xa0 drivers/scsi/sg.c:622\n __vfs_write+0xed/0x690 fs/read_write.c:485\nkill_bdev:block_device:00000000e138492c\n vfs_write+0x184/0x4c0 fs/read_write.c:549\n ksys_write+0x107/0x240 fs/read_write.c:599\n do_syscall_64+0xc2/0x560 arch/x86/entry/common.c:293\n entry_SYSCALL_64_after_hwframe+0x49/0xbe\n\nWe get \u0027alen\u0027 from command its type is int. If userspace passes a large\nlength we will get a negative \u0027alen\u0027.\n\nSwitch n, alen, and rlen to u32.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_200-default-1-150200.5.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_200-default-1-150200.5.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_200-default-1-150200.5.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.200.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47219",
"url": "https://www.suse.com/security/cve/CVE-2021-47219"
},
{
"category": "external",
"summary": "SUSE Bug 1222824 for CVE-2021-47219",
"url": "https://bugzilla.suse.com/1222824"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_200-default-1-150200.5.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_200-default-1-150200.5.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_200-default-1-150200.5.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.200.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_200-default-1-150200.5.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_200-default-1-150200.5.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_200-default-1-150200.5.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.200.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-15T07:01:07Z",
"details": "moderate"
}
],
"title": "CVE-2021-47219"
},
{
"cve": "CVE-2021-47291",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47291"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nipv6: fix another slab-out-of-bounds in fib6_nh_flush_exceptions\n\nWhile running the self-tests on a KASAN enabled kernel, I observed a\nslab-out-of-bounds splat very similar to the one reported in\ncommit 821bbf79fe46 (\"ipv6: Fix KASAN: slab-out-of-bounds Read in\n fib6_nh_flush_exceptions\").\n\nWe additionally need to take care of fib6_metrics initialization\nfailure when the caller provides an nh.\n\nThe fix is similar, explicitly free the route instead of calling\nfib6_info_release on a half-initialized object.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_200-default-1-150200.5.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_200-default-1-150200.5.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_200-default-1-150200.5.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.200.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47291",
"url": "https://www.suse.com/security/cve/CVE-2021-47291"
},
{
"category": "external",
"summary": "SUSE Bug 1224918 for CVE-2021-47291",
"url": "https://bugzilla.suse.com/1224918"
},
{
"category": "external",
"summary": "SUSE Bug 1227651 for CVE-2021-47291",
"url": "https://bugzilla.suse.com/1227651"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_200-default-1-150200.5.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_200-default-1-150200.5.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_200-default-1-150200.5.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.200.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_200-default-1-150200.5.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_200-default-1-150200.5.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_200-default-1-150200.5.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.200.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-15T07:01:07Z",
"details": "important"
}
],
"title": "CVE-2021-47291"
},
{
"cve": "CVE-2021-47506",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47506"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnfsd: fix use-after-free due to delegation race\n\nA delegation break could arrive as soon as we\u0027ve called vfs_setlease. A\ndelegation break runs a callback which immediately (in\nnfsd4_cb_recall_prepare) adds the delegation to del_recall_lru. If we\nthen exit nfs4_set_delegation without hashing the delegation, it will be\nfreed as soon as the callback is done with it, without ever being\nremoved from del_recall_lru.\n\nSymptoms show up later as use-after-free or list corruption warnings,\nusually in the laundromat thread.\n\nI suspect aba2072f4523 \"nfsd: grant read delegations to clients holding\nwrites\" made this bug easier to hit, but I looked as far back as v3.0\nand it looks to me it already had the same problem. So I\u0027m not sure\nwhere the bug was introduced; it may have been there from the beginning.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_200-default-1-150200.5.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_200-default-1-150200.5.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_200-default-1-150200.5.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.200.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47506",
"url": "https://www.suse.com/security/cve/CVE-2021-47506"
},
{
"category": "external",
"summary": "SUSE Bug 1225404 for CVE-2021-47506",
"url": "https://bugzilla.suse.com/1225404"
},
{
"category": "external",
"summary": "SUSE Bug 1227497 for CVE-2021-47506",
"url": "https://bugzilla.suse.com/1227497"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_200-default-1-150200.5.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_200-default-1-150200.5.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_200-default-1-150200.5.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.200.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_200-default-1-150200.5.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_200-default-1-150200.5.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_200-default-1-150200.5.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.200.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-15T07:01:07Z",
"details": "moderate"
}
],
"title": "CVE-2021-47506"
},
{
"cve": "CVE-2021-47520",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47520"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncan: pch_can: pch_can_rx_normal: fix use after free\n\nAfter calling netif_receive_skb(skb), dereferencing skb is unsafe.\nEspecially, the can_frame cf which aliases skb memory is dereferenced\njust after the call netif_receive_skb(skb).\n\nReordering the lines solves the issue.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_200-default-1-150200.5.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_200-default-1-150200.5.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_200-default-1-150200.5.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.200.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47520",
"url": "https://www.suse.com/security/cve/CVE-2021-47520"
},
{
"category": "external",
"summary": "SUSE Bug 1225431 for CVE-2021-47520",
"url": "https://bugzilla.suse.com/1225431"
},
{
"category": "external",
"summary": "SUSE Bug 1227905 for CVE-2021-47520",
"url": "https://bugzilla.suse.com/1227905"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_200-default-1-150200.5.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_200-default-1-150200.5.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_200-default-1-150200.5.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.200.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_200-default-1-150200.5.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_200-default-1-150200.5.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_200-default-1-150200.5.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.200.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-15T07:01:07Z",
"details": "important"
}
],
"title": "CVE-2021-47520"
},
{
"cve": "CVE-2021-47580",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47580"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: scsi_debug: Fix type in min_t to avoid stack OOB\n\nChange min_t() to use type \"u32\" instead of type \"int\" to avoid stack out\nof bounds. With min_t() type \"int\" the values get sign extended and the\nlarger value gets used causing stack out of bounds.\n\nBUG: KASAN: stack-out-of-bounds in memcpy include/linux/fortify-string.h:191 [inline]\nBUG: KASAN: stack-out-of-bounds in sg_copy_buffer+0x1de/0x240 lib/scatterlist.c:976\nRead of size 127 at addr ffff888072607128 by task syz-executor.7/18707\n\nCPU: 1 PID: 18707 Comm: syz-executor.7 Not tainted 5.15.0-syzk #1\nHardware name: Red Hat KVM, BIOS 1.13.0-2\nCall Trace:\n __dump_stack lib/dump_stack.c:88 [inline]\n dump_stack_lvl+0x89/0xb5 lib/dump_stack.c:106\n print_address_description.constprop.9+0x28/0x160 mm/kasan/report.c:256\n __kasan_report mm/kasan/report.c:442 [inline]\n kasan_report.cold.14+0x7d/0x117 mm/kasan/report.c:459\n check_region_inline mm/kasan/generic.c:183 [inline]\n kasan_check_range+0x1a3/0x210 mm/kasan/generic.c:189\n memcpy+0x23/0x60 mm/kasan/shadow.c:65\n memcpy include/linux/fortify-string.h:191 [inline]\n sg_copy_buffer+0x1de/0x240 lib/scatterlist.c:976\n sg_copy_from_buffer+0x33/0x40 lib/scatterlist.c:1000\n fill_from_dev_buffer.part.34+0x82/0x130 drivers/scsi/scsi_debug.c:1162\n fill_from_dev_buffer drivers/scsi/scsi_debug.c:1888 [inline]\n resp_readcap16+0x365/0x3b0 drivers/scsi/scsi_debug.c:1887\n schedule_resp+0x4d8/0x1a70 drivers/scsi/scsi_debug.c:5478\n scsi_debug_queuecommand+0x8c9/0x1ec0 drivers/scsi/scsi_debug.c:7533\n scsi_dispatch_cmd drivers/scsi/scsi_lib.c:1520 [inline]\n scsi_queue_rq+0x16b0/0x2d40 drivers/scsi/scsi_lib.c:1699\n blk_mq_dispatch_rq_list+0xb9b/0x2700 block/blk-mq.c:1639\n __blk_mq_sched_dispatch_requests+0x28f/0x590 block/blk-mq-sched.c:325\n blk_mq_sched_dispatch_requests+0x105/0x190 block/blk-mq-sched.c:358\n __blk_mq_run_hw_queue+0xe5/0x150 block/blk-mq.c:1761\n __blk_mq_delay_run_hw_queue+0x4f8/0x5c0 block/blk-mq.c:1838\n blk_mq_run_hw_queue+0x18d/0x350 block/blk-mq.c:1891\n blk_mq_sched_insert_request+0x3db/0x4e0 block/blk-mq-sched.c:474\n blk_execute_rq_nowait+0x16b/0x1c0 block/blk-exec.c:62\n sg_common_write.isra.18+0xeb3/0x2000 drivers/scsi/sg.c:836\n sg_new_write.isra.19+0x570/0x8c0 drivers/scsi/sg.c:774\n sg_ioctl_common+0x14d6/0x2710 drivers/scsi/sg.c:939\n sg_ioctl+0xa2/0x180 drivers/scsi/sg.c:1165\n vfs_ioctl fs/ioctl.c:51 [inline]\n __do_sys_ioctl fs/ioctl.c:874 [inline]\n __se_sys_ioctl fs/ioctl.c:860 [inline]\n __x64_sys_ioctl+0x19d/0x220 fs/ioctl.c:860\n do_syscall_x64 arch/x86/entry/common.c:50 [inline]\n do_syscall_64+0x3a/0x80 arch/x86/entry/common.c:80\n entry_SYSCALL_64_after_hwframe+0x44/0xae",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_200-default-1-150200.5.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_200-default-1-150200.5.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_200-default-1-150200.5.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.200.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47580",
"url": "https://www.suse.com/security/cve/CVE-2021-47580"
},
{
"category": "external",
"summary": "SUSE Bug 1226550 for CVE-2021-47580",
"url": "https://bugzilla.suse.com/1226550"
},
{
"category": "external",
"summary": "SUSE Bug 1227611 for CVE-2021-47580",
"url": "https://bugzilla.suse.com/1227611"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_200-default-1-150200.5.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_200-default-1-150200.5.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_200-default-1-150200.5.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.200.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_200-default-1-150200.5.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_200-default-1-150200.5.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_200-default-1-150200.5.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.200.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-15T07:01:07Z",
"details": "moderate"
}
],
"title": "CVE-2021-47580"
},
{
"cve": "CVE-2021-47598",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47598"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsch_cake: do not call cake_destroy() from cake_init()\n\nqdiscs are not supposed to call their own destroy() method\nfrom init(), because core stack already does that.\n\nsyzbot was able to trigger use after free:\n\nDEBUG_LOCKS_WARN_ON(lock-\u003emagic != lock)\nWARNING: CPU: 0 PID: 21902 at kernel/locking/mutex.c:586 __mutex_lock_common kernel/locking/mutex.c:586 [inline]\nWARNING: CPU: 0 PID: 21902 at kernel/locking/mutex.c:586 __mutex_lock+0x9ec/0x12f0 kernel/locking/mutex.c:740\nModules linked in:\nCPU: 0 PID: 21902 Comm: syz-executor189 Not tainted 5.16.0-rc4-syzkaller #0\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011\nRIP: 0010:__mutex_lock_common kernel/locking/mutex.c:586 [inline]\nRIP: 0010:__mutex_lock+0x9ec/0x12f0 kernel/locking/mutex.c:740\nCode: 08 84 d2 0f 85 19 08 00 00 8b 05 97 38 4b 04 85 c0 0f 85 27 f7 ff ff 48 c7 c6 20 00 ac 89 48 c7 c7 a0 fe ab 89 e8 bf 76 ba ff \u003c0f\u003e 0b e9 0d f7 ff ff 48 8b 44 24 40 48 8d b8 c8 08 00 00 48 89 f8\nRSP: 0018:ffffc9000627f290 EFLAGS: 00010282\nRAX: 0000000000000000 RBX: 0000000000000000 RCX: 0000000000000000\nRDX: ffff88802315d700 RSI: ffffffff815f1db8 RDI: fffff52000c4fe44\nRBP: ffff88818f28e000 R08: 0000000000000000 R09: 0000000000000000\nR10: ffffffff815ebb5e R11: 0000000000000000 R12: 0000000000000000\nR13: dffffc0000000000 R14: ffffc9000627f458 R15: 0000000093c30000\nFS: 0000555556abc400(0000) GS:ffff8880b9c00000(0000) knlGS:0000000000000000\nCS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 00007fda689c3303 CR3: 000000001cfbb000 CR4: 0000000000350ef0\nCall Trace:\n \u003cTASK\u003e\n tcf_chain0_head_change_cb_del+0x2e/0x3d0 net/sched/cls_api.c:810\n tcf_block_put_ext net/sched/cls_api.c:1381 [inline]\n tcf_block_put_ext net/sched/cls_api.c:1376 [inline]\n tcf_block_put+0xbc/0x130 net/sched/cls_api.c:1394\n cake_destroy+0x3f/0x80 net/sched/sch_cake.c:2695\n qdisc_create.constprop.0+0x9da/0x10f0 net/sched/sch_api.c:1293\n tc_modify_qdisc+0x4c5/0x1980 net/sched/sch_api.c:1660\n rtnetlink_rcv_msg+0x413/0xb80 net/core/rtnetlink.c:5571\n netlink_rcv_skb+0x153/0x420 net/netlink/af_netlink.c:2496\n netlink_unicast_kernel net/netlink/af_netlink.c:1319 [inline]\n netlink_unicast+0x533/0x7d0 net/netlink/af_netlink.c:1345\n netlink_sendmsg+0x904/0xdf0 net/netlink/af_netlink.c:1921\n sock_sendmsg_nosec net/socket.c:704 [inline]\n sock_sendmsg+0xcf/0x120 net/socket.c:724\n ____sys_sendmsg+0x6e8/0x810 net/socket.c:2409\n ___sys_sendmsg+0xf3/0x170 net/socket.c:2463\n __sys_sendmsg+0xe5/0x1b0 net/socket.c:2492\n do_syscall_x64 arch/x86/entry/common.c:50 [inline]\n do_syscall_64+0x35/0xb0 arch/x86/entry/common.c:80\n entry_SYSCALL_64_after_hwframe+0x44/0xae\nRIP: 0033:0x7f1bb06badb9\nCode: Unable to access opcode bytes at RIP 0x7f1bb06bad8f.\nRSP: 002b:00007fff3012a658 EFLAGS: 00000246 ORIG_RAX: 000000000000002e\nRAX: ffffffffffffffda RBX: 0000000000000003 RCX: 00007f1bb06badb9\nRDX: 0000000000000000 RSI: 00000000200007c0 RDI: 0000000000000003\nRBP: 0000000000000000 R08: 0000000000000003 R09: 0000000000000003\nR10: 0000000000000003 R11: 0000000000000246 R12: 00007fff3012a688\nR13: 00007fff3012a6a0 R14: 00007fff3012a6e0 R15: 00000000000013c2\n \u003c/TASK\u003e",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_200-default-1-150200.5.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_200-default-1-150200.5.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_200-default-1-150200.5.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.200.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47598",
"url": "https://www.suse.com/security/cve/CVE-2021-47598"
},
{
"category": "external",
"summary": "SUSE Bug 1226574 for CVE-2021-47598",
"url": "https://bugzilla.suse.com/1226574"
},
{
"category": "external",
"summary": "SUSE Bug 1227471 for CVE-2021-47598",
"url": "https://bugzilla.suse.com/1227471"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_200-default-1-150200.5.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_200-default-1-150200.5.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_200-default-1-150200.5.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.200.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_200-default-1-150200.5.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_200-default-1-150200.5.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_200-default-1-150200.5.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.200.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-15T07:01:07Z",
"details": "important"
}
],
"title": "CVE-2021-47598"
},
{
"cve": "CVE-2021-47600",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47600"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndm btree remove: fix use after free in rebalance_children()\n\nMove dm_tm_unlock() after dm_tm_dec().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_200-default-1-150200.5.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_200-default-1-150200.5.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_200-default-1-150200.5.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.200.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47600",
"url": "https://www.suse.com/security/cve/CVE-2021-47600"
},
{
"category": "external",
"summary": "SUSE Bug 1226575 for CVE-2021-47600",
"url": "https://bugzilla.suse.com/1226575"
},
{
"category": "external",
"summary": "SUSE Bug 1227472 for CVE-2021-47600",
"url": "https://bugzilla.suse.com/1227472"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_200-default-1-150200.5.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_200-default-1-150200.5.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_200-default-1-150200.5.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.200.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_200-default-1-150200.5.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_200-default-1-150200.5.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_200-default-1-150200.5.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.200.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-15T07:01:07Z",
"details": "moderate"
}
],
"title": "CVE-2021-47600"
},
{
"cve": "CVE-2022-48792",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-48792"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: pm8001: Fix use-after-free for aborted SSP/STP sas_task\n\nCurrently a use-after-free may occur if a sas_task is aborted by the upper\nlayer before we handle the I/O completion in mpi_ssp_completion() or\nmpi_sata_completion().\n\nIn this case, the following are the two steps in handling those I/O\ncompletions:\n\n - Call complete() to inform the upper layer handler of completion of\n the I/O.\n\n - Release driver resources associated with the sas_task in\n pm8001_ccb_task_free() call.\n\nWhen complete() is called, the upper layer may free the sas_task. As such,\nwe should not touch the associated sas_task afterwards, but we do so in the\npm8001_ccb_task_free() call.\n\nFix by swapping the complete() and pm8001_ccb_task_free() calls ordering.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_200-default-1-150200.5.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_200-default-1-150200.5.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_200-default-1-150200.5.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.200.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-48792",
"url": "https://www.suse.com/security/cve/CVE-2022-48792"
},
{
"category": "external",
"summary": "SUSE Bug 1228013 for CVE-2022-48792",
"url": "https://bugzilla.suse.com/1228013"
},
{
"category": "external",
"summary": "SUSE Bug 1228017 for CVE-2022-48792",
"url": "https://bugzilla.suse.com/1228017"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_200-default-1-150200.5.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_200-default-1-150200.5.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_200-default-1-150200.5.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.200.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_200-default-1-150200.5.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_200-default-1-150200.5.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_200-default-1-150200.5.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.200.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-15T07:01:07Z",
"details": "moderate"
}
],
"title": "CVE-2022-48792"
},
{
"cve": "CVE-2022-48821",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-48821"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmisc: fastrpc: avoid double fput() on failed usercopy\n\nIf the copy back to userland fails for the FASTRPC_IOCTL_ALLOC_DMA_BUFF\nioctl(), we shouldn\u0027t assume that \u0027buf-\u003edmabuf\u0027 is still valid. In fact,\ndma_buf_fd() called fd_install() before, i.e. \"consumed\" one reference,\nleaving us with none.\n\nCalling dma_buf_put() will therefore put a reference we no longer own,\nleading to a valid file descritor table entry for an already released\n\u0027file\u0027 object which is a straight use-after-free.\n\nSimply avoid calling dma_buf_put() and rely on the process exit code to\ndo the necessary cleanup, if needed, i.e. if the file descriptor is\nstill valid.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_200-default-1-150200.5.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_200-default-1-150200.5.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_200-default-1-150200.5.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.200.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-48821",
"url": "https://www.suse.com/security/cve/CVE-2022-48821"
},
{
"category": "external",
"summary": "SUSE Bug 1227976 for CVE-2022-48821",
"url": "https://bugzilla.suse.com/1227976"
},
{
"category": "external",
"summary": "SUSE Bug 1228022 for CVE-2022-48821",
"url": "https://bugzilla.suse.com/1228022"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_200-default-1-150200.5.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_200-default-1-150200.5.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_200-default-1-150200.5.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.200.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_200-default-1-150200.5.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_200-default-1-150200.5.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_200-default-1-150200.5.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.200.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-15T07:01:07Z",
"details": "important"
}
],
"title": "CVE-2022-48821"
},
{
"cve": "CVE-2023-52686",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-52686"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\npowerpc/powernv: Add a null pointer check in opal_event_init()\n\nkasprintf() returns a pointer to dynamically allocated memory\nwhich can be NULL upon failure.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_200-default-1-150200.5.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_200-default-1-150200.5.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_200-default-1-150200.5.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.200.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-52686",
"url": "https://www.suse.com/security/cve/CVE-2023-52686"
},
{
"category": "external",
"summary": "SUSE Bug 1224682 for CVE-2023-52686",
"url": "https://bugzilla.suse.com/1224682"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_200-default-1-150200.5.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_200-default-1-150200.5.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_200-default-1-150200.5.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.200.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_200-default-1-150200.5.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_200-default-1-150200.5.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_200-default-1-150200.5.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.200.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-15T07:01:07Z",
"details": "moderate"
}
],
"title": "CVE-2023-52686"
},
{
"cve": "CVE-2023-52885",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-52885"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nSUNRPC: Fix UAF in svc_tcp_listen_data_ready()\n\nAfter the listener svc_sock is freed, and before invoking svc_tcp_accept()\nfor the established child sock, there is a window that the newsock\nretaining a freed listener svc_sock in sk_user_data which cloning from\nparent. In the race window, if data is received on the newsock, we will\nobserve use-after-free report in svc_tcp_listen_data_ready().\n\nReproduce by two tasks:\n\n1. while :; do rpc.nfsd 0 ; rpc.nfsd; done\n2. while :; do echo \"\" | ncat -4 127.0.0.1 2049 ; done\n\nKASAN report:\n\n ==================================================================\n BUG: KASAN: slab-use-after-free in svc_tcp_listen_data_ready+0x1cf/0x1f0 [sunrpc]\n Read of size 8 at addr ffff888139d96228 by task nc/102553\n CPU: 7 PID: 102553 Comm: nc Not tainted 6.3.0+ #18\n Hardware name: VMware, Inc. VMware Virtual Platform/440BX Desktop Reference Platform, BIOS 6.00 11/12/2020\n Call Trace:\n \u003cIRQ\u003e\n dump_stack_lvl+0x33/0x50\n print_address_description.constprop.0+0x27/0x310\n print_report+0x3e/0x70\n kasan_report+0xae/0xe0\n svc_tcp_listen_data_ready+0x1cf/0x1f0 [sunrpc]\n tcp_data_queue+0x9f4/0x20e0\n tcp_rcv_established+0x666/0x1f60\n tcp_v4_do_rcv+0x51c/0x850\n tcp_v4_rcv+0x23fc/0x2e80\n ip_protocol_deliver_rcu+0x62/0x300\n ip_local_deliver_finish+0x267/0x350\n ip_local_deliver+0x18b/0x2d0\n ip_rcv+0x2fb/0x370\n __netif_receive_skb_one_core+0x166/0x1b0\n process_backlog+0x24c/0x5e0\n __napi_poll+0xa2/0x500\n net_rx_action+0x854/0xc90\n __do_softirq+0x1bb/0x5de\n do_softirq+0xcb/0x100\n \u003c/IRQ\u003e\n \u003cTASK\u003e\n ...\n \u003c/TASK\u003e\n\n Allocated by task 102371:\n kasan_save_stack+0x1e/0x40\n kasan_set_track+0x21/0x30\n __kasan_kmalloc+0x7b/0x90\n svc_setup_socket+0x52/0x4f0 [sunrpc]\n svc_addsock+0x20d/0x400 [sunrpc]\n __write_ports_addfd+0x209/0x390 [nfsd]\n write_ports+0x239/0x2c0 [nfsd]\n nfsctl_transaction_write+0xac/0x110 [nfsd]\n vfs_write+0x1c3/0xae0\n ksys_write+0xed/0x1c0\n do_syscall_64+0x38/0x90\n entry_SYSCALL_64_after_hwframe+0x72/0xdc\n\n Freed by task 102551:\n kasan_save_stack+0x1e/0x40\n kasan_set_track+0x21/0x30\n kasan_save_free_info+0x2a/0x50\n __kasan_slab_free+0x106/0x190\n __kmem_cache_free+0x133/0x270\n svc_xprt_free+0x1e2/0x350 [sunrpc]\n svc_xprt_destroy_all+0x25a/0x440 [sunrpc]\n nfsd_put+0x125/0x240 [nfsd]\n nfsd_svc+0x2cb/0x3c0 [nfsd]\n write_threads+0x1ac/0x2a0 [nfsd]\n nfsctl_transaction_write+0xac/0x110 [nfsd]\n vfs_write+0x1c3/0xae0\n ksys_write+0xed/0x1c0\n do_syscall_64+0x38/0x90\n entry_SYSCALL_64_after_hwframe+0x72/0xdc\n\nFix the UAF by simply doing nothing in svc_tcp_listen_data_ready()\nif state != TCP_LISTEN, that will avoid dereferencing svsk for all\nchild socket.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_200-default-1-150200.5.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_200-default-1-150200.5.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_200-default-1-150200.5.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.200.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-52885",
"url": "https://www.suse.com/security/cve/CVE-2023-52885"
},
{
"category": "external",
"summary": "SUSE Bug 1227750 for CVE-2023-52885",
"url": "https://bugzilla.suse.com/1227750"
},
{
"category": "external",
"summary": "SUSE Bug 1227753 for CVE-2023-52885",
"url": "https://bugzilla.suse.com/1227753"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_200-default-1-150200.5.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_200-default-1-150200.5.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_200-default-1-150200.5.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.200.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_200-default-1-150200.5.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_200-default-1-150200.5.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_200-default-1-150200.5.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.200.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-15T07:01:07Z",
"details": "important"
}
],
"title": "CVE-2023-52885"
},
{
"cve": "CVE-2024-26583",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-26583"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntls: fix race between async notify and socket close\n\nThe submitting thread (one which called recvmsg/sendmsg)\nmay exit as soon as the async crypto handler calls complete()\nso any code past that point risks touching already freed data.\n\nTry to avoid the locking and extra flags altogether.\nHave the main thread hold an extra reference, this way\nwe can depend solely on the atomic ref counter for\nsynchronization.\n\nDon\u0027t futz with reiniting the completion, either, we are now\ntightly controlling when completion fires.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_200-default-1-150200.5.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_200-default-1-150200.5.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_200-default-1-150200.5.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.200.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-26583",
"url": "https://www.suse.com/security/cve/CVE-2024-26583"
},
{
"category": "external",
"summary": "SUSE Bug 1220185 for CVE-2024-26583",
"url": "https://bugzilla.suse.com/1220185"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_200-default-1-150200.5.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_200-default-1-150200.5.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_200-default-1-150200.5.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.200.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_200-default-1-150200.5.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_200-default-1-150200.5.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_200-default-1-150200.5.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.200.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-15T07:01:07Z",
"details": "moderate"
}
],
"title": "CVE-2024-26583"
},
{
"cve": "CVE-2024-26584",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-26584"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: tls: handle backlogging of crypto requests\n\nSince we\u0027re setting the CRYPTO_TFM_REQ_MAY_BACKLOG flag on our\nrequests to the crypto API, crypto_aead_{encrypt,decrypt} can return\n -EBUSY instead of -EINPROGRESS in valid situations. For example, when\nthe cryptd queue for AESNI is full (easy to trigger with an\nartificially low cryptd.cryptd_max_cpu_qlen), requests will be enqueued\nto the backlog but still processed. In that case, the async callback\nwill also be called twice: first with err == -EINPROGRESS, which it\nseems we can just ignore, then with err == 0.\n\nCompared to Sabrina\u0027s original patch this version uses the new\ntls_*crypt_async_wait() helpers and converts the EBUSY to\nEINPROGRESS to avoid having to modify all the error handling\npaths. The handling is identical.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_200-default-1-150200.5.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_200-default-1-150200.5.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_200-default-1-150200.5.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.200.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-26584",
"url": "https://www.suse.com/security/cve/CVE-2024-26584"
},
{
"category": "external",
"summary": "SUSE Bug 1220186 for CVE-2024-26584",
"url": "https://bugzilla.suse.com/1220186"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_200-default-1-150200.5.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_200-default-1-150200.5.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_200-default-1-150200.5.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.200.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_200-default-1-150200.5.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_200-default-1-150200.5.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_200-default-1-150200.5.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.200.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-15T07:01:07Z",
"details": "moderate"
}
],
"title": "CVE-2024-26584"
},
{
"cve": "CVE-2024-26585",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-26585"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntls: fix race between tx work scheduling and socket close\n\nSimilarly to previous commit, the submitting thread (recvmsg/sendmsg)\nmay exit as soon as the async crypto handler calls complete().\nReorder scheduling the work before calling complete().\nThis seems more logical in the first place, as it\u0027s\nthe inverse order of what the submitting thread will do.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_200-default-1-150200.5.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_200-default-1-150200.5.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_200-default-1-150200.5.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.200.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-26585",
"url": "https://www.suse.com/security/cve/CVE-2024-26585"
},
{
"category": "external",
"summary": "SUSE Bug 1220187 for CVE-2024-26585",
"url": "https://bugzilla.suse.com/1220187"
},
{
"category": "external",
"summary": "SUSE Bug 1220211 for CVE-2024-26585",
"url": "https://bugzilla.suse.com/1220211"
},
{
"category": "external",
"summary": "SUSE Bug 1224298 for CVE-2024-26585",
"url": "https://bugzilla.suse.com/1224298"
},
{
"category": "external",
"summary": "SUSE Bug 1224878 for CVE-2024-26585",
"url": "https://bugzilla.suse.com/1224878"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_200-default-1-150200.5.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_200-default-1-150200.5.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_200-default-1-150200.5.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.200.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_200-default-1-150200.5.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_200-default-1-150200.5.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_200-default-1-150200.5.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.200.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-15T07:01:07Z",
"details": "moderate"
}
],
"title": "CVE-2024-26585"
},
{
"cve": "CVE-2024-36974",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-36974"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/sched: taprio: always validate TCA_TAPRIO_ATTR_PRIOMAP\n\nIf one TCA_TAPRIO_ATTR_PRIOMAP attribute has been provided,\ntaprio_parse_mqprio_opt() must validate it, or userspace\ncan inject arbitrary data to the kernel, the second time\ntaprio_change() is called.\n\nFirst call (with valid attributes) sets dev-\u003enum_tc\nto a non zero value.\n\nSecond call (with arbitrary mqprio attributes)\nreturns early from taprio_parse_mqprio_opt()\nand bad things can happen.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_200-default-1-150200.5.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_200-default-1-150200.5.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_200-default-1-150200.5.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.200.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-36974",
"url": "https://www.suse.com/security/cve/CVE-2024-36974"
},
{
"category": "external",
"summary": "SUSE Bug 1226519 for CVE-2024-36974",
"url": "https://bugzilla.suse.com/1226519"
},
{
"category": "external",
"summary": "SUSE Bug 1227371 for CVE-2024-36974",
"url": "https://bugzilla.suse.com/1227371"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_200-default-1-150200.5.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_200-default-1-150200.5.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_200-default-1-150200.5.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.200.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_200-default-1-150200.5.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_200-default-1-150200.5.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_200-default-1-150200.5.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.200.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-15T07:01:07Z",
"details": "important"
}
],
"title": "CVE-2024-36974"
},
{
"cve": "CVE-2024-38559",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-38559"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: qedf: Ensure the copied buf is NUL terminated\n\nCurrently, we allocate a count-sized kernel buffer and copy count from\nuserspace to that buffer. Later, we use kstrtouint on this buffer but we\ndon\u0027t ensure that the string is terminated inside the buffer, this can\nlead to OOB read when using kstrtouint. Fix this issue by using\nmemdup_user_nul instead of memdup_user.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_200-default-1-150200.5.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_200-default-1-150200.5.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_200-default-1-150200.5.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.200.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-38559",
"url": "https://www.suse.com/security/cve/CVE-2024-38559"
},
{
"category": "external",
"summary": "SUSE Bug 1226785 for CVE-2024-38559",
"url": "https://bugzilla.suse.com/1226785"
},
{
"category": "external",
"summary": "SUSE Bug 1227495 for CVE-2024-38559",
"url": "https://bugzilla.suse.com/1227495"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_200-default-1-150200.5.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_200-default-1-150200.5.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_200-default-1-150200.5.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.200.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_200-default-1-150200.5.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_200-default-1-150200.5.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_200-default-1-150200.5.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.200.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-15T07:01:07Z",
"details": "moderate"
}
],
"title": "CVE-2024-38559"
},
{
"cve": "CVE-2024-39494",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-39494"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nima: Fix use-after-free on a dentry\u0027s dname.name\n\n-\u003ed_name.name can change on rename and the earlier value can be freed;\nthere are conditions sufficient to stabilize it (-\u003ed_lock on dentry,\n-\u003ed_lock on its parent, -\u003ei_rwsem exclusive on the parent\u0027s inode,\nrename_lock), but none of those are met at any of the sites. Take a stable\nsnapshot of the name instead.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_200-default-1-150200.5.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_200-default-1-150200.5.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_200-default-1-150200.5.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.200.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-39494",
"url": "https://www.suse.com/security/cve/CVE-2024-39494"
},
{
"category": "external",
"summary": "SUSE Bug 1227716 for CVE-2024-39494",
"url": "https://bugzilla.suse.com/1227716"
},
{
"category": "external",
"summary": "SUSE Bug 1227901 for CVE-2024-39494",
"url": "https://bugzilla.suse.com/1227901"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_200-default-1-150200.5.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_200-default-1-150200.5.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_200-default-1-150200.5.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.200.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_200-default-1-150200.5.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_200-default-1-150200.5.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_200-default-1-150200.5.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.200.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-15T07:01:07Z",
"details": "important"
}
],
"title": "CVE-2024-39494"
},
{
"cve": "CVE-2024-40937",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-40937"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ngve: Clear napi-\u003eskb before dev_kfree_skb_any()\n\ngve_rx_free_skb incorrectly leaves napi-\u003eskb referencing an skb after it\nis freed with dev_kfree_skb_any(). This can result in a subsequent call\nto napi_get_frags returning a dangling pointer.\n\nFix this by clearing napi-\u003eskb before the skb is freed.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_200-default-1-150200.5.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_200-default-1-150200.5.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_200-default-1-150200.5.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.200.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-40937",
"url": "https://www.suse.com/security/cve/CVE-2024-40937"
},
{
"category": "external",
"summary": "SUSE Bug 1227836 for CVE-2024-40937",
"url": "https://bugzilla.suse.com/1227836"
},
{
"category": "external",
"summary": "SUSE Bug 1227903 for CVE-2024-40937",
"url": "https://bugzilla.suse.com/1227903"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_200-default-1-150200.5.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_200-default-1-150200.5.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_200-default-1-150200.5.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.200.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_200-default-1-150200.5.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_200-default-1-150200.5.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_200-default-1-150200.5.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.200.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-15T07:01:07Z",
"details": "important"
}
],
"title": "CVE-2024-40937"
},
{
"cve": "CVE-2024-41011",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-41011"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amdkfd: don\u0027t allow mapping the MMIO HDP page with large pages\n\nWe don\u0027t get the right offset in that case. The GPU has\nan unused 4K area of the register BAR space into which you can\nremap registers. We remap the HDP flush registers into this\nspace to allow userspace (CPU or GPU) to flush the HDP when it\nupdates VRAM. However, on systems with \u003e4K pages, we end up\nexposing PAGE_SIZE of MMIO space.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_200-default-1-150200.5.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_200-default-1-150200.5.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_200-default-1-150200.5.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.200.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-41011",
"url": "https://www.suse.com/security/cve/CVE-2024-41011"
},
{
"category": "external",
"summary": "SUSE Bug 1228114 for CVE-2024-41011",
"url": "https://bugzilla.suse.com/1228114"
},
{
"category": "external",
"summary": "SUSE Bug 1228115 for CVE-2024-41011",
"url": "https://bugzilla.suse.com/1228115"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_200-default-1-150200.5.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_200-default-1-150200.5.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_200-default-1-150200.5.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.200.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_200-default-1-150200.5.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_200-default-1-150200.5.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_200-default-1-150200.5.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.200.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-15T07:01:07Z",
"details": "important"
}
],
"title": "CVE-2024-41011"
},
{
"cve": "CVE-2024-41059",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-41059"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nhfsplus: fix uninit-value in copy_name\n\n[syzbot reported]\nBUG: KMSAN: uninit-value in sized_strscpy+0xc4/0x160\n sized_strscpy+0xc4/0x160\n copy_name+0x2af/0x320 fs/hfsplus/xattr.c:411\n hfsplus_listxattr+0x11e9/0x1a50 fs/hfsplus/xattr.c:750\n vfs_listxattr fs/xattr.c:493 [inline]\n listxattr+0x1f3/0x6b0 fs/xattr.c:840\n path_listxattr fs/xattr.c:864 [inline]\n __do_sys_listxattr fs/xattr.c:876 [inline]\n __se_sys_listxattr fs/xattr.c:873 [inline]\n __x64_sys_listxattr+0x16b/0x2f0 fs/xattr.c:873\n x64_sys_call+0x2ba0/0x3b50 arch/x86/include/generated/asm/syscalls_64.h:195\n do_syscall_x64 arch/x86/entry/common.c:52 [inline]\n do_syscall_64+0xcf/0x1e0 arch/x86/entry/common.c:83\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\n\nUninit was created at:\n slab_post_alloc_hook mm/slub.c:3877 [inline]\n slab_alloc_node mm/slub.c:3918 [inline]\n kmalloc_trace+0x57b/0xbe0 mm/slub.c:4065\n kmalloc include/linux/slab.h:628 [inline]\n hfsplus_listxattr+0x4cc/0x1a50 fs/hfsplus/xattr.c:699\n vfs_listxattr fs/xattr.c:493 [inline]\n listxattr+0x1f3/0x6b0 fs/xattr.c:840\n path_listxattr fs/xattr.c:864 [inline]\n __do_sys_listxattr fs/xattr.c:876 [inline]\n __se_sys_listxattr fs/xattr.c:873 [inline]\n __x64_sys_listxattr+0x16b/0x2f0 fs/xattr.c:873\n x64_sys_call+0x2ba0/0x3b50 arch/x86/include/generated/asm/syscalls_64.h:195\n do_syscall_x64 arch/x86/entry/common.c:52 [inline]\n do_syscall_64+0xcf/0x1e0 arch/x86/entry/common.c:83\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\n[Fix]\nWhen allocating memory to strbuf, initialize memory to 0.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_200-default-1-150200.5.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_200-default-1-150200.5.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_200-default-1-150200.5.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.200.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-41059",
"url": "https://www.suse.com/security/cve/CVE-2024-41059"
},
{
"category": "external",
"summary": "SUSE Bug 1228561 for CVE-2024-41059",
"url": "https://bugzilla.suse.com/1228561"
},
{
"category": "external",
"summary": "SUSE Bug 1228573 for CVE-2024-41059",
"url": "https://bugzilla.suse.com/1228573"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_200-default-1-150200.5.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_200-default-1-150200.5.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_200-default-1-150200.5.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.200.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_200-default-1-150200.5.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_200-default-1-150200.5.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_200-default-1-150200.5.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.200.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-15T07:01:07Z",
"details": "important"
}
],
"title": "CVE-2024-41059"
},
{
"cve": "CVE-2024-41069",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-41069"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nASoC: topology: Fix references to freed memory\n\nMost users after parsing a topology file, release memory used by it, so\nhaving pointer references directly into topology file contents is wrong.\nUse devm_kmemdup(), to allocate memory as needed.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_200-default-1-150200.5.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_200-default-1-150200.5.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_200-default-1-150200.5.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.200.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-41069",
"url": "https://www.suse.com/security/cve/CVE-2024-41069"
},
{
"category": "external",
"summary": "SUSE Bug 1228644 for CVE-2024-41069",
"url": "https://bugzilla.suse.com/1228644"
},
{
"category": "external",
"summary": "SUSE Bug 1228645 for CVE-2024-41069",
"url": "https://bugzilla.suse.com/1228645"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_200-default-1-150200.5.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_200-default-1-150200.5.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_200-default-1-150200.5.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.200.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_200-default-1-150200.5.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_200-default-1-150200.5.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_200-default-1-150200.5.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.200.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-15T07:01:07Z",
"details": "important"
}
],
"title": "CVE-2024-41069"
},
{
"cve": "CVE-2024-41090",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-41090"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntap: add missing verification for short frame\n\nThe cited commit missed to check against the validity of the frame length\nin the tap_get_user_xdp() path, which could cause a corrupted skb to be\nsent downstack. Even before the skb is transmitted, the\ntap_get_user_xdp()--\u003eskb_set_network_header() may assume the size is more\nthan ETH_HLEN. Once transmitted, this could either cause out-of-bound\naccess beyond the actual length, or confuse the underlayer with incorrect\nor inconsistent header length in the skb metadata.\n\nIn the alternative path, tap_get_user() already prohibits short frame which\nhas the length less than Ethernet header size from being transmitted.\n\nThis is to drop any frame shorter than the Ethernet header size just like\nhow tap_get_user() does.\n\nCVE: CVE-2024-41090",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_200-default-1-150200.5.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_200-default-1-150200.5.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_200-default-1-150200.5.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.200.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-41090",
"url": "https://www.suse.com/security/cve/CVE-2024-41090"
},
{
"category": "external",
"summary": "SUSE Bug 1228328 for CVE-2024-41090",
"url": "https://bugzilla.suse.com/1228328"
},
{
"category": "external",
"summary": "SUSE Bug 1228714 for CVE-2024-41090",
"url": "https://bugzilla.suse.com/1228714"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_200-default-1-150200.5.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_200-default-1-150200.5.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_200-default-1-150200.5.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.200.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_200-default-1-150200.5.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_200-default-1-150200.5.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_200-default-1-150200.5.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.200.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-15T07:01:07Z",
"details": "important"
}
],
"title": "CVE-2024-41090"
},
{
"cve": "CVE-2024-42145",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-42145"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nIB/core: Implement a limit on UMAD receive List\n\nThe existing behavior of ib_umad, which maintains received MAD\npackets in an unbounded list, poses a risk of uncontrolled growth.\nAs user-space applications extract packets from this list, the rate\nof extraction may not match the rate of incoming packets, leading\nto potential list overflow.\n\nTo address this, we introduce a limit to the size of the list. After\nconsidering typical scenarios, such as OpenSM processing, which can\nhandle approximately 100k packets per second, and the 1-second retry\ntimeout for most packets, we set the list size limit to 200k. Packets\nreceived beyond this limit are dropped, assuming they are likely timed\nout by the time they are handled by user-space.\n\nNotably, packets queued on the receive list due to reasons like\ntimed-out sends are preserved even when the list is full.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_200-default-1-150200.5.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_200-default-1-150200.5.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_200-default-1-150200.5.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.200.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-42145",
"url": "https://www.suse.com/security/cve/CVE-2024-42145"
},
{
"category": "external",
"summary": "SUSE Bug 1223384 for CVE-2024-42145",
"url": "https://bugzilla.suse.com/1223384"
},
{
"category": "external",
"summary": "SUSE Bug 1228743 for CVE-2024-42145",
"url": "https://bugzilla.suse.com/1228743"
},
{
"category": "external",
"summary": "SUSE Bug 1228744 for CVE-2024-42145",
"url": "https://bugzilla.suse.com/1228744"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_200-default-1-150200.5.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_200-default-1-150200.5.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_200-default-1-150200.5.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.200.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_200-default-1-150200.5.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_200-default-1-150200.5.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_200-default-1-150200.5.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.200.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.200.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.200.1.150200.9.103.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.200.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.200.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.200.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.200.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-15T07:01:07Z",
"details": "important"
}
],
"title": "CVE-2024-42145"
}
]
}
suse-su-2021:2406-1
Vulnerability from csaf_suse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel",
"title": "Title of the patch"
},
{
"category": "description",
"text": "The SUSE Linux Enterprise 12 SP2 kernel was updated to receive various security and bugfixes.\n\nThe following security bugs were fixed:\n\n- CVE-2021-22555: Fixed an heap out-of-bounds write in net/netfilter/x_tables.c that could allow local provilege escalation. (bsc#1188116)\n- CVE-2021-33909: Fixed an out-of-bounds write in the filesystem layer that allows to obtain full root privileges. (bsc#1188062)\n- CVE-2021-3609: Fixed a race condition in the CAN BCM networking protocol which allows for local privilege escalation. (bsc#1187215)\n- CVE-2021-0605: Fixed an out-of-bounds read which could lead to local information disclosure in the kernel with System execution privileges needed. (bsc#1187601)\n- CVE-2021-0512: Fixed a possible out-of-bounds write which could lead to local escalation of privilege with no additional execution privileges needed. (bsc#1187595)\n- CVE-2021-34693: Fixed a bug in net/can/bcm.c which could allow local users to obtain sensitive information from kernel stack memory because parts of a data structure are uninitialized. (bsc#1187452)\n- CVE-2020-36385: Fixed a use-after-free flaw in ucma.c which allows for local privilege escalation. (bsc#1187050)\n- CVE-2021-0129: Fixed an improper access control in BlueZ that may have allowed an authenticated user to potentially enable information disclosure via adjacent access. (bsc#1186463)\n- CVE-2020-26558: Fixed a flaw in the Bluetooth LE and BR/EDR secure pairing that could permit a nearby man-in-the-middle attacker to identify the Passkey used during pairing. (bsc#1179610)\n- CVE-2020-36386: Fixed an out-of-bounds read in hci_extended_inquiry_result_evt. (bsc#1187038)\n- CVE-2020-24588: Fixed a bug that could allow an adversary to abuse devices that support receiving non-SSP A-MSDU frames to inject arbitrary network packets. (bsc#1185861)\n- CVE-2021-32399: Fixed a race condition in net/bluetooth/hci_request.c for removal of the HCI controller. (bsc#1184611)\n- CVE-2021-33034: Fixed an issue in net/bluetooth/hci_event.c where a use-after-free leads to writing an arbitrary value. (bsc#1186111)\n- CVE-2020-26139: Fixed a bug that allows an Access Point (AP) to forward EAPOL frames to other clients even though the sender has not yet successfully authenticated. This might be abused in projected Wi-Fi networks to launch denial-of-service attacks against connected clients and made it easier to exploit other vulnerabilities in connected clients. (bsc#1186062)\n- CVE-2021-23134: Fixed a use After Free vulnerability in nfc sockets which allows local attackers to elevate their privileges. (bsc#1186060)\n- CVE-2020-24586: Fixed a bug that, under the right circumstances, allows to inject arbitrary network packets and/or exfiltrate user data when another device sends fragmented frames encrypted using WEP, CCMP, or GCMP. (bsc#1185859)\n- CVE-2020-26141: Fixed a flaw that could allows an adversary to inject and possibly decrypt packets in WPA or WPA2 networks that support the TKIP data-confidentiality protocol. (bsc#1185987)\n- CVE-2020-26145: Fixed a bug in the WEP, WPA, WPA2, and WPA3 implementations that could allows an adversary to inject arbitrary network packets. (bsc#1185860)\n- CVE-2020-24587: Fixed a bug that allows an adversary to decrypt selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP encryption key is periodically renewed. (bsc#1185862)\n- CVE-2020-26147: Fixed a bug in the WEP, WPA, WPA2, and WPA3 implementations that could allows an adversary to inject packets and/or exfiltrate selected fragments when another device sends fragmented frames. (bsc#1185987)\n\nThe following non-security bugs were fixed:\n\n- kABI: Fix kABI after modifying struct __call_single_data (bsc#1180846).\n- kernel/smp: add boot parameter for controlling CSD lock debugging (bsc#1180846).\n- kernel/smp: Add source and destination CPUs to __call_single_data (bsc#1180846).\n- kernel/smp: make csdlock timeout depend on boot parameter (bsc#1180846).\n- kernel/smp: Provide CSD lock timeout diagnostics (bsc#1180846).\n- Update config files: activate CONFIG_CSD_LOCK_WAIT_DEBUG for x86 (bsc#1180846).\n- Update config files: disable CONFIG_CSD_LOCK_WAIT_DEBUG (bsc#1180846).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2021-2406,SUSE-SLE-SERVER-12-SP2-BCL-2021-2406",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2021_2406-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2021:2406-1",
"url": "https://www.suse.com/support/update/announcement/2021/suse-su-20212406-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2021:2406-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2021-July/009166.html"
},
{
"category": "self",
"summary": "SUSE Bug 1179610",
"url": "https://bugzilla.suse.com/1179610"
},
{
"category": "self",
"summary": "SUSE Bug 1180846",
"url": "https://bugzilla.suse.com/1180846"
},
{
"category": "self",
"summary": "SUSE Bug 1184611",
"url": "https://bugzilla.suse.com/1184611"
},
{
"category": "self",
"summary": "SUSE Bug 1185859",
"url": "https://bugzilla.suse.com/1185859"
},
{
"category": "self",
"summary": "SUSE Bug 1185860",
"url": "https://bugzilla.suse.com/1185860"
},
{
"category": "self",
"summary": "SUSE Bug 1185861",
"url": "https://bugzilla.suse.com/1185861"
},
{
"category": "self",
"summary": "SUSE Bug 1185862",
"url": "https://bugzilla.suse.com/1185862"
},
{
"category": "self",
"summary": "SUSE Bug 1185863",
"url": "https://bugzilla.suse.com/1185863"
},
{
"category": "self",
"summary": "SUSE Bug 1185898",
"url": "https://bugzilla.suse.com/1185898"
},
{
"category": "self",
"summary": "SUSE Bug 1185987",
"url": "https://bugzilla.suse.com/1185987"
},
{
"category": "self",
"summary": "SUSE Bug 1186060",
"url": "https://bugzilla.suse.com/1186060"
},
{
"category": "self",
"summary": "SUSE Bug 1186062",
"url": "https://bugzilla.suse.com/1186062"
},
{
"category": "self",
"summary": "SUSE Bug 1186111",
"url": "https://bugzilla.suse.com/1186111"
},
{
"category": "self",
"summary": "SUSE Bug 1186390",
"url": "https://bugzilla.suse.com/1186390"
},
{
"category": "self",
"summary": "SUSE Bug 1186463",
"url": "https://bugzilla.suse.com/1186463"
},
{
"category": "self",
"summary": "SUSE Bug 1187038",
"url": "https://bugzilla.suse.com/1187038"
},
{
"category": "self",
"summary": "SUSE Bug 1187050",
"url": "https://bugzilla.suse.com/1187050"
},
{
"category": "self",
"summary": "SUSE Bug 1187215",
"url": "https://bugzilla.suse.com/1187215"
},
{
"category": "self",
"summary": "SUSE Bug 1187452",
"url": "https://bugzilla.suse.com/1187452"
},
{
"category": "self",
"summary": "SUSE Bug 1187595",
"url": "https://bugzilla.suse.com/1187595"
},
{
"category": "self",
"summary": "SUSE Bug 1187601",
"url": "https://bugzilla.suse.com/1187601"
},
{
"category": "self",
"summary": "SUSE Bug 1187934",
"url": "https://bugzilla.suse.com/1187934"
},
{
"category": "self",
"summary": "SUSE Bug 1188062",
"url": "https://bugzilla.suse.com/1188062"
},
{
"category": "self",
"summary": "SUSE Bug 1188116",
"url": "https://bugzilla.suse.com/1188116"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-24586 page",
"url": "https://www.suse.com/security/cve/CVE-2020-24586/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-24587 page",
"url": "https://www.suse.com/security/cve/CVE-2020-24587/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-24588 page",
"url": "https://www.suse.com/security/cve/CVE-2020-24588/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-26139 page",
"url": "https://www.suse.com/security/cve/CVE-2020-26139/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-26141 page",
"url": "https://www.suse.com/security/cve/CVE-2020-26141/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-26145 page",
"url": "https://www.suse.com/security/cve/CVE-2020-26145/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-26147 page",
"url": "https://www.suse.com/security/cve/CVE-2020-26147/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-26558 page",
"url": "https://www.suse.com/security/cve/CVE-2020-26558/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-36385 page",
"url": "https://www.suse.com/security/cve/CVE-2020-36385/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-36386 page",
"url": "https://www.suse.com/security/cve/CVE-2020-36386/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-0129 page",
"url": "https://www.suse.com/security/cve/CVE-2021-0129/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-0512 page",
"url": "https://www.suse.com/security/cve/CVE-2021-0512/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-0605 page",
"url": "https://www.suse.com/security/cve/CVE-2021-0605/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-22555 page",
"url": "https://www.suse.com/security/cve/CVE-2021-22555/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-23134 page",
"url": "https://www.suse.com/security/cve/CVE-2021-23134/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-32399 page",
"url": "https://www.suse.com/security/cve/CVE-2021-32399/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-33034 page",
"url": "https://www.suse.com/security/cve/CVE-2021-33034/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-33909 page",
"url": "https://www.suse.com/security/cve/CVE-2021-33909/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-34693 page",
"url": "https://www.suse.com/security/cve/CVE-2021-34693/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3609 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3609/"
}
],
"title": "Security update for the Linux Kernel",
"tracking": {
"current_release_date": "2021-07-20T12:40:03Z",
"generator": {
"date": "2021-07-20T12:40:03Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2021:2406-1",
"initial_release_date": "2021-07-20T12:40:03Z",
"revision_history": [
{
"date": "2021-07-20T12:40:03Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-4.4.121-92.158.1.aarch64",
"product": {
"name": "cluster-md-kmp-default-4.4.121-92.158.1.aarch64",
"product_id": "cluster-md-kmp-default-4.4.121-92.158.1.aarch64"
}
},
{
"category": "product_version",
"name": "cluster-md-kmp-vanilla-4.4.121-92.158.1.aarch64",
"product": {
"name": "cluster-md-kmp-vanilla-4.4.121-92.158.1.aarch64",
"product_id": "cluster-md-kmp-vanilla-4.4.121-92.158.1.aarch64"
}
},
{
"category": "product_version",
"name": "cluster-network-kmp-default-4.4.121-92.158.1.aarch64",
"product": {
"name": "cluster-network-kmp-default-4.4.121-92.158.1.aarch64",
"product_id": "cluster-network-kmp-default-4.4.121-92.158.1.aarch64"
}
},
{
"category": "product_version",
"name": "cluster-network-kmp-vanilla-4.4.121-92.158.1.aarch64",
"product": {
"name": "cluster-network-kmp-vanilla-4.4.121-92.158.1.aarch64",
"product_id": "cluster-network-kmp-vanilla-4.4.121-92.158.1.aarch64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-4.4.121-92.158.1.aarch64",
"product": {
"name": "dlm-kmp-default-4.4.121-92.158.1.aarch64",
"product_id": "dlm-kmp-default-4.4.121-92.158.1.aarch64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-vanilla-4.4.121-92.158.1.aarch64",
"product": {
"name": "dlm-kmp-vanilla-4.4.121-92.158.1.aarch64",
"product_id": "dlm-kmp-vanilla-4.4.121-92.158.1.aarch64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-4.4.121-92.158.1.aarch64",
"product": {
"name": "gfs2-kmp-default-4.4.121-92.158.1.aarch64",
"product_id": "gfs2-kmp-default-4.4.121-92.158.1.aarch64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-vanilla-4.4.121-92.158.1.aarch64",
"product": {
"name": "gfs2-kmp-vanilla-4.4.121-92.158.1.aarch64",
"product_id": "gfs2-kmp-vanilla-4.4.121-92.158.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-4.4.121-92.158.1.aarch64",
"product": {
"name": "kernel-default-4.4.121-92.158.1.aarch64",
"product_id": "kernel-default-4.4.121-92.158.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-4.4.121-92.158.1.aarch64",
"product": {
"name": "kernel-default-base-4.4.121-92.158.1.aarch64",
"product_id": "kernel-default-base-4.4.121-92.158.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-4.4.121-92.158.1.aarch64",
"product": {
"name": "kernel-default-devel-4.4.121-92.158.1.aarch64",
"product_id": "kernel-default-devel-4.4.121-92.158.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-4.4.121-92.158.1.aarch64",
"product": {
"name": "kernel-default-extra-4.4.121-92.158.1.aarch64",
"product_id": "kernel-default-extra-4.4.121-92.158.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-kgraft-4.4.121-92.158.1.aarch64",
"product": {
"name": "kernel-default-kgraft-4.4.121-92.158.1.aarch64",
"product_id": "kernel-default-kgraft-4.4.121-92.158.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-4.4.121-92.158.1.aarch64",
"product": {
"name": "kernel-obs-build-4.4.121-92.158.1.aarch64",
"product_id": "kernel-obs-build-4.4.121-92.158.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-4.4.121-92.158.1.aarch64",
"product": {
"name": "kernel-obs-qa-4.4.121-92.158.1.aarch64",
"product_id": "kernel-obs-qa-4.4.121-92.158.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-syms-4.4.121-92.158.1.aarch64",
"product": {
"name": "kernel-syms-4.4.121-92.158.1.aarch64",
"product_id": "kernel-syms-4.4.121-92.158.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-4.4.121-92.158.1.aarch64",
"product": {
"name": "kernel-vanilla-4.4.121-92.158.1.aarch64",
"product_id": "kernel-vanilla-4.4.121-92.158.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-base-4.4.121-92.158.1.aarch64",
"product": {
"name": "kernel-vanilla-base-4.4.121-92.158.1.aarch64",
"product_id": "kernel-vanilla-base-4.4.121-92.158.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-devel-4.4.121-92.158.1.aarch64",
"product": {
"name": "kernel-vanilla-devel-4.4.121-92.158.1.aarch64",
"product_id": "kernel-vanilla-devel-4.4.121-92.158.1.aarch64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-4.4.121-92.158.1.aarch64",
"product": {
"name": "ocfs2-kmp-default-4.4.121-92.158.1.aarch64",
"product_id": "ocfs2-kmp-default-4.4.121-92.158.1.aarch64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-vanilla-4.4.121-92.158.1.aarch64",
"product": {
"name": "ocfs2-kmp-vanilla-4.4.121-92.158.1.aarch64",
"product_id": "ocfs2-kmp-vanilla-4.4.121-92.158.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-devel-4.4.121-92.158.1.noarch",
"product": {
"name": "kernel-devel-4.4.121-92.158.1.noarch",
"product_id": "kernel-devel-4.4.121-92.158.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-docs-4.4.121-92.158.1.noarch",
"product": {
"name": "kernel-docs-4.4.121-92.158.1.noarch",
"product_id": "kernel-docs-4.4.121-92.158.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-docs-html-4.4.121-92.158.1.noarch",
"product": {
"name": "kernel-docs-html-4.4.121-92.158.1.noarch",
"product_id": "kernel-docs-html-4.4.121-92.158.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-docs-pdf-4.4.121-92.158.1.noarch",
"product": {
"name": "kernel-docs-pdf-4.4.121-92.158.1.noarch",
"product_id": "kernel-docs-pdf-4.4.121-92.158.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-macros-4.4.121-92.158.1.noarch",
"product": {
"name": "kernel-macros-4.4.121-92.158.1.noarch",
"product_id": "kernel-macros-4.4.121-92.158.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-4.4.121-92.158.1.noarch",
"product": {
"name": "kernel-source-4.4.121-92.158.1.noarch",
"product_id": "kernel-source-4.4.121-92.158.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-vanilla-4.4.121-92.158.1.noarch",
"product": {
"name": "kernel-source-vanilla-4.4.121-92.158.1.noarch",
"product_id": "kernel-source-vanilla-4.4.121-92.158.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-debug-4.4.121-92.158.1.ppc64le",
"product": {
"name": "cluster-md-kmp-debug-4.4.121-92.158.1.ppc64le",
"product_id": "cluster-md-kmp-debug-4.4.121-92.158.1.ppc64le"
}
},
{
"category": "product_version",
"name": "cluster-md-kmp-default-4.4.121-92.158.1.ppc64le",
"product": {
"name": "cluster-md-kmp-default-4.4.121-92.158.1.ppc64le",
"product_id": "cluster-md-kmp-default-4.4.121-92.158.1.ppc64le"
}
},
{
"category": "product_version",
"name": "cluster-md-kmp-vanilla-4.4.121-92.158.1.ppc64le",
"product": {
"name": "cluster-md-kmp-vanilla-4.4.121-92.158.1.ppc64le",
"product_id": "cluster-md-kmp-vanilla-4.4.121-92.158.1.ppc64le"
}
},
{
"category": "product_version",
"name": "cluster-network-kmp-debug-4.4.121-92.158.1.ppc64le",
"product": {
"name": "cluster-network-kmp-debug-4.4.121-92.158.1.ppc64le",
"product_id": "cluster-network-kmp-debug-4.4.121-92.158.1.ppc64le"
}
},
{
"category": "product_version",
"name": "cluster-network-kmp-default-4.4.121-92.158.1.ppc64le",
"product": {
"name": "cluster-network-kmp-default-4.4.121-92.158.1.ppc64le",
"product_id": "cluster-network-kmp-default-4.4.121-92.158.1.ppc64le"
}
},
{
"category": "product_version",
"name": "cluster-network-kmp-vanilla-4.4.121-92.158.1.ppc64le",
"product": {
"name": "cluster-network-kmp-vanilla-4.4.121-92.158.1.ppc64le",
"product_id": "cluster-network-kmp-vanilla-4.4.121-92.158.1.ppc64le"
}
},
{
"category": "product_version",
"name": "dlm-kmp-debug-4.4.121-92.158.1.ppc64le",
"product": {
"name": "dlm-kmp-debug-4.4.121-92.158.1.ppc64le",
"product_id": "dlm-kmp-debug-4.4.121-92.158.1.ppc64le"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-4.4.121-92.158.1.ppc64le",
"product": {
"name": "dlm-kmp-default-4.4.121-92.158.1.ppc64le",
"product_id": "dlm-kmp-default-4.4.121-92.158.1.ppc64le"
}
},
{
"category": "product_version",
"name": "dlm-kmp-vanilla-4.4.121-92.158.1.ppc64le",
"product": {
"name": "dlm-kmp-vanilla-4.4.121-92.158.1.ppc64le",
"product_id": "dlm-kmp-vanilla-4.4.121-92.158.1.ppc64le"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-debug-4.4.121-92.158.1.ppc64le",
"product": {
"name": "gfs2-kmp-debug-4.4.121-92.158.1.ppc64le",
"product_id": "gfs2-kmp-debug-4.4.121-92.158.1.ppc64le"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-4.4.121-92.158.1.ppc64le",
"product": {
"name": "gfs2-kmp-default-4.4.121-92.158.1.ppc64le",
"product_id": "gfs2-kmp-default-4.4.121-92.158.1.ppc64le"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-vanilla-4.4.121-92.158.1.ppc64le",
"product": {
"name": "gfs2-kmp-vanilla-4.4.121-92.158.1.ppc64le",
"product_id": "gfs2-kmp-vanilla-4.4.121-92.158.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-4.4.121-92.158.1.ppc64le",
"product": {
"name": "kernel-debug-4.4.121-92.158.1.ppc64le",
"product_id": "kernel-debug-4.4.121-92.158.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-base-4.4.121-92.158.1.ppc64le",
"product": {
"name": "kernel-debug-base-4.4.121-92.158.1.ppc64le",
"product_id": "kernel-debug-base-4.4.121-92.158.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-4.4.121-92.158.1.ppc64le",
"product": {
"name": "kernel-debug-devel-4.4.121-92.158.1.ppc64le",
"product_id": "kernel-debug-devel-4.4.121-92.158.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-extra-4.4.121-92.158.1.ppc64le",
"product": {
"name": "kernel-debug-extra-4.4.121-92.158.1.ppc64le",
"product_id": "kernel-debug-extra-4.4.121-92.158.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-kgraft-4.4.121-92.158.1.ppc64le",
"product": {
"name": "kernel-debug-kgraft-4.4.121-92.158.1.ppc64le",
"product_id": "kernel-debug-kgraft-4.4.121-92.158.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-4.4.121-92.158.1.ppc64le",
"product": {
"name": "kernel-default-4.4.121-92.158.1.ppc64le",
"product_id": "kernel-default-4.4.121-92.158.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-base-4.4.121-92.158.1.ppc64le",
"product": {
"name": "kernel-default-base-4.4.121-92.158.1.ppc64le",
"product_id": "kernel-default-base-4.4.121-92.158.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-4.4.121-92.158.1.ppc64le",
"product": {
"name": "kernel-default-devel-4.4.121-92.158.1.ppc64le",
"product_id": "kernel-default-devel-4.4.121-92.158.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-4.4.121-92.158.1.ppc64le",
"product": {
"name": "kernel-default-extra-4.4.121-92.158.1.ppc64le",
"product_id": "kernel-default-extra-4.4.121-92.158.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-kgraft-4.4.121-92.158.1.ppc64le",
"product": {
"name": "kernel-default-kgraft-4.4.121-92.158.1.ppc64le",
"product_id": "kernel-default-kgraft-4.4.121-92.158.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-4.4.121-92.158.1.ppc64le",
"product": {
"name": "kernel-obs-build-4.4.121-92.158.1.ppc64le",
"product_id": "kernel-obs-build-4.4.121-92.158.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-4.4.121-92.158.1.ppc64le",
"product": {
"name": "kernel-obs-qa-4.4.121-92.158.1.ppc64le",
"product_id": "kernel-obs-qa-4.4.121-92.158.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-syms-4.4.121-92.158.1.ppc64le",
"product": {
"name": "kernel-syms-4.4.121-92.158.1.ppc64le",
"product_id": "kernel-syms-4.4.121-92.158.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-4.4.121-92.158.1.ppc64le",
"product": {
"name": "kernel-vanilla-4.4.121-92.158.1.ppc64le",
"product_id": "kernel-vanilla-4.4.121-92.158.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-base-4.4.121-92.158.1.ppc64le",
"product": {
"name": "kernel-vanilla-base-4.4.121-92.158.1.ppc64le",
"product_id": "kernel-vanilla-base-4.4.121-92.158.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-devel-4.4.121-92.158.1.ppc64le",
"product": {
"name": "kernel-vanilla-devel-4.4.121-92.158.1.ppc64le",
"product_id": "kernel-vanilla-devel-4.4.121-92.158.1.ppc64le"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-debug-4.4.121-92.158.1.ppc64le",
"product": {
"name": "ocfs2-kmp-debug-4.4.121-92.158.1.ppc64le",
"product_id": "ocfs2-kmp-debug-4.4.121-92.158.1.ppc64le"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-4.4.121-92.158.1.ppc64le",
"product": {
"name": "ocfs2-kmp-default-4.4.121-92.158.1.ppc64le",
"product_id": "ocfs2-kmp-default-4.4.121-92.158.1.ppc64le"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-vanilla-4.4.121-92.158.1.ppc64le",
"product": {
"name": "ocfs2-kmp-vanilla-4.4.121-92.158.1.ppc64le",
"product_id": "ocfs2-kmp-vanilla-4.4.121-92.158.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-4.4.121-92.158.1.s390x",
"product": {
"name": "cluster-md-kmp-default-4.4.121-92.158.1.s390x",
"product_id": "cluster-md-kmp-default-4.4.121-92.158.1.s390x"
}
},
{
"category": "product_version",
"name": "cluster-md-kmp-vanilla-4.4.121-92.158.1.s390x",
"product": {
"name": "cluster-md-kmp-vanilla-4.4.121-92.158.1.s390x",
"product_id": "cluster-md-kmp-vanilla-4.4.121-92.158.1.s390x"
}
},
{
"category": "product_version",
"name": "cluster-network-kmp-default-4.4.121-92.158.1.s390x",
"product": {
"name": "cluster-network-kmp-default-4.4.121-92.158.1.s390x",
"product_id": "cluster-network-kmp-default-4.4.121-92.158.1.s390x"
}
},
{
"category": "product_version",
"name": "cluster-network-kmp-vanilla-4.4.121-92.158.1.s390x",
"product": {
"name": "cluster-network-kmp-vanilla-4.4.121-92.158.1.s390x",
"product_id": "cluster-network-kmp-vanilla-4.4.121-92.158.1.s390x"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-4.4.121-92.158.1.s390x",
"product": {
"name": "dlm-kmp-default-4.4.121-92.158.1.s390x",
"product_id": "dlm-kmp-default-4.4.121-92.158.1.s390x"
}
},
{
"category": "product_version",
"name": "dlm-kmp-vanilla-4.4.121-92.158.1.s390x",
"product": {
"name": "dlm-kmp-vanilla-4.4.121-92.158.1.s390x",
"product_id": "dlm-kmp-vanilla-4.4.121-92.158.1.s390x"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-4.4.121-92.158.1.s390x",
"product": {
"name": "gfs2-kmp-default-4.4.121-92.158.1.s390x",
"product_id": "gfs2-kmp-default-4.4.121-92.158.1.s390x"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-vanilla-4.4.121-92.158.1.s390x",
"product": {
"name": "gfs2-kmp-vanilla-4.4.121-92.158.1.s390x",
"product_id": "gfs2-kmp-vanilla-4.4.121-92.158.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-4.4.121-92.158.1.s390x",
"product": {
"name": "kernel-default-4.4.121-92.158.1.s390x",
"product_id": "kernel-default-4.4.121-92.158.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-base-4.4.121-92.158.1.s390x",
"product": {
"name": "kernel-default-base-4.4.121-92.158.1.s390x",
"product_id": "kernel-default-base-4.4.121-92.158.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-4.4.121-92.158.1.s390x",
"product": {
"name": "kernel-default-devel-4.4.121-92.158.1.s390x",
"product_id": "kernel-default-devel-4.4.121-92.158.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-4.4.121-92.158.1.s390x",
"product": {
"name": "kernel-default-extra-4.4.121-92.158.1.s390x",
"product_id": "kernel-default-extra-4.4.121-92.158.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-kgraft-4.4.121-92.158.1.s390x",
"product": {
"name": "kernel-default-kgraft-4.4.121-92.158.1.s390x",
"product_id": "kernel-default-kgraft-4.4.121-92.158.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-man-4.4.121-92.158.1.s390x",
"product": {
"name": "kernel-default-man-4.4.121-92.158.1.s390x",
"product_id": "kernel-default-man-4.4.121-92.158.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-4.4.121-92.158.1.s390x",
"product": {
"name": "kernel-obs-build-4.4.121-92.158.1.s390x",
"product_id": "kernel-obs-build-4.4.121-92.158.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-4.4.121-92.158.1.s390x",
"product": {
"name": "kernel-obs-qa-4.4.121-92.158.1.s390x",
"product_id": "kernel-obs-qa-4.4.121-92.158.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-syms-4.4.121-92.158.1.s390x",
"product": {
"name": "kernel-syms-4.4.121-92.158.1.s390x",
"product_id": "kernel-syms-4.4.121-92.158.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-4.4.121-92.158.1.s390x",
"product": {
"name": "kernel-vanilla-4.4.121-92.158.1.s390x",
"product_id": "kernel-vanilla-4.4.121-92.158.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-base-4.4.121-92.158.1.s390x",
"product": {
"name": "kernel-vanilla-base-4.4.121-92.158.1.s390x",
"product_id": "kernel-vanilla-base-4.4.121-92.158.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-devel-4.4.121-92.158.1.s390x",
"product": {
"name": "kernel-vanilla-devel-4.4.121-92.158.1.s390x",
"product_id": "kernel-vanilla-devel-4.4.121-92.158.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-4.4.121-92.158.1.s390x",
"product": {
"name": "kernel-zfcpdump-4.4.121-92.158.1.s390x",
"product_id": "kernel-zfcpdump-4.4.121-92.158.1.s390x"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-4.4.121-92.158.1.s390x",
"product": {
"name": "ocfs2-kmp-default-4.4.121-92.158.1.s390x",
"product_id": "ocfs2-kmp-default-4.4.121-92.158.1.s390x"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-vanilla-4.4.121-92.158.1.s390x",
"product": {
"name": "ocfs2-kmp-vanilla-4.4.121-92.158.1.s390x",
"product_id": "ocfs2-kmp-vanilla-4.4.121-92.158.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-debug-4.4.121-92.158.1.x86_64",
"product": {
"name": "cluster-md-kmp-debug-4.4.121-92.158.1.x86_64",
"product_id": "cluster-md-kmp-debug-4.4.121-92.158.1.x86_64"
}
},
{
"category": "product_version",
"name": "cluster-md-kmp-default-4.4.121-92.158.1.x86_64",
"product": {
"name": "cluster-md-kmp-default-4.4.121-92.158.1.x86_64",
"product_id": "cluster-md-kmp-default-4.4.121-92.158.1.x86_64"
}
},
{
"category": "product_version",
"name": "cluster-md-kmp-vanilla-4.4.121-92.158.1.x86_64",
"product": {
"name": "cluster-md-kmp-vanilla-4.4.121-92.158.1.x86_64",
"product_id": "cluster-md-kmp-vanilla-4.4.121-92.158.1.x86_64"
}
},
{
"category": "product_version",
"name": "cluster-network-kmp-debug-4.4.121-92.158.1.x86_64",
"product": {
"name": "cluster-network-kmp-debug-4.4.121-92.158.1.x86_64",
"product_id": "cluster-network-kmp-debug-4.4.121-92.158.1.x86_64"
}
},
{
"category": "product_version",
"name": "cluster-network-kmp-default-4.4.121-92.158.1.x86_64",
"product": {
"name": "cluster-network-kmp-default-4.4.121-92.158.1.x86_64",
"product_id": "cluster-network-kmp-default-4.4.121-92.158.1.x86_64"
}
},
{
"category": "product_version",
"name": "cluster-network-kmp-vanilla-4.4.121-92.158.1.x86_64",
"product": {
"name": "cluster-network-kmp-vanilla-4.4.121-92.158.1.x86_64",
"product_id": "cluster-network-kmp-vanilla-4.4.121-92.158.1.x86_64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-debug-4.4.121-92.158.1.x86_64",
"product": {
"name": "dlm-kmp-debug-4.4.121-92.158.1.x86_64",
"product_id": "dlm-kmp-debug-4.4.121-92.158.1.x86_64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-4.4.121-92.158.1.x86_64",
"product": {
"name": "dlm-kmp-default-4.4.121-92.158.1.x86_64",
"product_id": "dlm-kmp-default-4.4.121-92.158.1.x86_64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-vanilla-4.4.121-92.158.1.x86_64",
"product": {
"name": "dlm-kmp-vanilla-4.4.121-92.158.1.x86_64",
"product_id": "dlm-kmp-vanilla-4.4.121-92.158.1.x86_64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-debug-4.4.121-92.158.1.x86_64",
"product": {
"name": "gfs2-kmp-debug-4.4.121-92.158.1.x86_64",
"product_id": "gfs2-kmp-debug-4.4.121-92.158.1.x86_64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-4.4.121-92.158.1.x86_64",
"product": {
"name": "gfs2-kmp-default-4.4.121-92.158.1.x86_64",
"product_id": "gfs2-kmp-default-4.4.121-92.158.1.x86_64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-vanilla-4.4.121-92.158.1.x86_64",
"product": {
"name": "gfs2-kmp-vanilla-4.4.121-92.158.1.x86_64",
"product_id": "gfs2-kmp-vanilla-4.4.121-92.158.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-4.4.121-92.158.1.x86_64",
"product": {
"name": "kernel-debug-4.4.121-92.158.1.x86_64",
"product_id": "kernel-debug-4.4.121-92.158.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-base-4.4.121-92.158.1.x86_64",
"product": {
"name": "kernel-debug-base-4.4.121-92.158.1.x86_64",
"product_id": "kernel-debug-base-4.4.121-92.158.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-4.4.121-92.158.1.x86_64",
"product": {
"name": "kernel-debug-devel-4.4.121-92.158.1.x86_64",
"product_id": "kernel-debug-devel-4.4.121-92.158.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-extra-4.4.121-92.158.1.x86_64",
"product": {
"name": "kernel-debug-extra-4.4.121-92.158.1.x86_64",
"product_id": "kernel-debug-extra-4.4.121-92.158.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-kgraft-4.4.121-92.158.1.x86_64",
"product": {
"name": "kernel-debug-kgraft-4.4.121-92.158.1.x86_64",
"product_id": "kernel-debug-kgraft-4.4.121-92.158.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-4.4.121-92.158.1.x86_64",
"product": {
"name": "kernel-default-4.4.121-92.158.1.x86_64",
"product_id": "kernel-default-4.4.121-92.158.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-4.4.121-92.158.1.x86_64",
"product": {
"name": "kernel-default-base-4.4.121-92.158.1.x86_64",
"product_id": "kernel-default-base-4.4.121-92.158.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-4.4.121-92.158.1.x86_64",
"product": {
"name": "kernel-default-devel-4.4.121-92.158.1.x86_64",
"product_id": "kernel-default-devel-4.4.121-92.158.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-4.4.121-92.158.1.x86_64",
"product": {
"name": "kernel-default-extra-4.4.121-92.158.1.x86_64",
"product_id": "kernel-default-extra-4.4.121-92.158.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-kgraft-4.4.121-92.158.1.x86_64",
"product": {
"name": "kernel-default-kgraft-4.4.121-92.158.1.x86_64",
"product_id": "kernel-default-kgraft-4.4.121-92.158.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-4.4.121-92.158.1.x86_64",
"product": {
"name": "kernel-obs-build-4.4.121-92.158.1.x86_64",
"product_id": "kernel-obs-build-4.4.121-92.158.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-4.4.121-92.158.1.x86_64",
"product": {
"name": "kernel-obs-qa-4.4.121-92.158.1.x86_64",
"product_id": "kernel-obs-qa-4.4.121-92.158.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-syms-4.4.121-92.158.1.x86_64",
"product": {
"name": "kernel-syms-4.4.121-92.158.1.x86_64",
"product_id": "kernel-syms-4.4.121-92.158.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-4.4.121-92.158.1.x86_64",
"product": {
"name": "kernel-vanilla-4.4.121-92.158.1.x86_64",
"product_id": "kernel-vanilla-4.4.121-92.158.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-base-4.4.121-92.158.1.x86_64",
"product": {
"name": "kernel-vanilla-base-4.4.121-92.158.1.x86_64",
"product_id": "kernel-vanilla-base-4.4.121-92.158.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-devel-4.4.121-92.158.1.x86_64",
"product": {
"name": "kernel-vanilla-devel-4.4.121-92.158.1.x86_64",
"product_id": "kernel-vanilla-devel-4.4.121-92.158.1.x86_64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-debug-4.4.121-92.158.1.x86_64",
"product": {
"name": "ocfs2-kmp-debug-4.4.121-92.158.1.x86_64",
"product_id": "ocfs2-kmp-debug-4.4.121-92.158.1.x86_64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-4.4.121-92.158.1.x86_64",
"product": {
"name": "ocfs2-kmp-default-4.4.121-92.158.1.x86_64",
"product_id": "ocfs2-kmp-default-4.4.121-92.158.1.x86_64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-vanilla-4.4.121-92.158.1.x86_64",
"product": {
"name": "ocfs2-kmp-vanilla-4.4.121-92.158.1.x86_64",
"product_id": "ocfs2-kmp-vanilla-4.4.121-92.158.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 12 SP2-BCL",
"product": {
"name": "SUSE Linux Enterprise Server 12 SP2-BCL",
"product_id": "SUSE Linux Enterprise Server 12 SP2-BCL",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-bcl:12:sp2"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.4.121-92.158.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL",
"product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.158.1.x86_64"
},
"product_reference": "kernel-default-4.4.121-92.158.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.4.121-92.158.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL",
"product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.158.1.x86_64"
},
"product_reference": "kernel-default-base-4.4.121-92.158.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.4.121-92.158.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL",
"product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.158.1.x86_64"
},
"product_reference": "kernel-default-devel-4.4.121-92.158.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-4.4.121-92.158.1.noarch as component of SUSE Linux Enterprise Server 12 SP2-BCL",
"product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.158.1.noarch"
},
"product_reference": "kernel-devel-4.4.121-92.158.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-4.4.121-92.158.1.noarch as component of SUSE Linux Enterprise Server 12 SP2-BCL",
"product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.158.1.noarch"
},
"product_reference": "kernel-macros-4.4.121-92.158.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-4.4.121-92.158.1.noarch as component of SUSE Linux Enterprise Server 12 SP2-BCL",
"product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.158.1.noarch"
},
"product_reference": "kernel-source-4.4.121-92.158.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.4.121-92.158.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL",
"product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.158.1.x86_64"
},
"product_reference": "kernel-syms-4.4.121-92.158.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2020-24586",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-24586"
}
],
"notes": [
{
"category": "general",
"text": "The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn\u0027t require that received fragments be cleared from memory after (re)connecting to a network. Under the right circumstances, when another device sends fragmented frames encrypted using WEP, CCMP, or GCMP, this can be abused to inject arbitrary network packets and/or exfiltrate user data.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.158.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-24586",
"url": "https://www.suse.com/security/cve/CVE-2020-24586"
},
{
"category": "external",
"summary": "SUSE Bug 1185859 for CVE-2020-24586",
"url": "https://bugzilla.suse.com/1185859"
},
{
"category": "external",
"summary": "SUSE Bug 1192868 for CVE-2020-24586",
"url": "https://bugzilla.suse.com/1192868"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.158.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.158.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-20T12:40:03Z",
"details": "moderate"
}
],
"title": "CVE-2020-24586"
},
{
"cve": "CVE-2020-24587",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-24587"
}
],
"notes": [
{
"category": "general",
"text": "The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn\u0027t require that all fragments of a frame are encrypted under the same key. An adversary can abuse this to decrypt selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP encryption key is periodically renewed.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.158.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-24587",
"url": "https://www.suse.com/security/cve/CVE-2020-24587"
},
{
"category": "external",
"summary": "SUSE Bug 1185859 for CVE-2020-24587",
"url": "https://bugzilla.suse.com/1185859"
},
{
"category": "external",
"summary": "SUSE Bug 1185862 for CVE-2020-24587",
"url": "https://bugzilla.suse.com/1185862"
},
{
"category": "external",
"summary": "SUSE Bug 1192868 for CVE-2020-24587",
"url": "https://bugzilla.suse.com/1192868"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.158.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.158.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-20T12:40:03Z",
"details": "moderate"
}
],
"title": "CVE-2020-24587"
},
{
"cve": "CVE-2020-24588",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-24588"
}
],
"notes": [
{
"category": "general",
"text": "The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn\u0027t require that the A-MSDU flag in the plaintext QoS header field is authenticated. Against devices that support receiving non-SSP A-MSDU frames (which is mandatory as part of 802.11n), an adversary can abuse this to inject arbitrary network packets.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.158.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-24588",
"url": "https://www.suse.com/security/cve/CVE-2020-24588"
},
{
"category": "external",
"summary": "SUSE Bug 1185861 for CVE-2020-24588",
"url": "https://bugzilla.suse.com/1185861"
},
{
"category": "external",
"summary": "SUSE Bug 1192868 for CVE-2020-24588",
"url": "https://bugzilla.suse.com/1192868"
},
{
"category": "external",
"summary": "SUSE Bug 1199701 for CVE-2020-24588",
"url": "https://bugzilla.suse.com/1199701"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.158.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.158.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-20T12:40:03Z",
"details": "moderate"
}
],
"title": "CVE-2020-24588"
},
{
"cve": "CVE-2020-26139",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-26139"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the kernel in NetBSD 7.1. An Access Point (AP) forwards EAPOL frames to other clients even though the sender has not yet successfully authenticated to the AP. This might be abused in projected Wi-Fi networks to launch denial-of-service attacks against connected clients and makes it easier to exploit other vulnerabilities in connected clients.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.158.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-26139",
"url": "https://www.suse.com/security/cve/CVE-2020-26139"
},
{
"category": "external",
"summary": "SUSE Bug 1186062 for CVE-2020-26139",
"url": "https://bugzilla.suse.com/1186062"
},
{
"category": "external",
"summary": "SUSE Bug 1192868 for CVE-2020-26139",
"url": "https://bugzilla.suse.com/1192868"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.158.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.158.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-20T12:40:03Z",
"details": "moderate"
}
],
"title": "CVE-2020-26139"
},
{
"cve": "CVE-2020-26141",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-26141"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the ALFA Windows 10 driver 6.1316.1209 for AWUS036H. The Wi-Fi implementation does not verify the Message Integrity Check (authenticity) of fragmented TKIP frames. An adversary can abuse this to inject and possibly decrypt packets in WPA or WPA2 networks that support the TKIP data-confidentiality protocol.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.158.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-26141",
"url": "https://www.suse.com/security/cve/CVE-2020-26141"
},
{
"category": "external",
"summary": "SUSE Bug 1185987 for CVE-2020-26141",
"url": "https://bugzilla.suse.com/1185987"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.158.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.158.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-20T12:40:03Z",
"details": "moderate"
}
],
"title": "CVE-2020-26141"
},
{
"cve": "CVE-2020-26145",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-26145"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered on Samsung Galaxy S3 i9305 4.4.4 devices. The WEP, WPA, WPA2, and WPA3 implementations accept second (or subsequent) broadcast fragments even when sent in plaintext and process them as full unfragmented frames. An adversary can abuse this to inject arbitrary network packets independent of the network configuration.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.158.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-26145",
"url": "https://www.suse.com/security/cve/CVE-2020-26145"
},
{
"category": "external",
"summary": "SUSE Bug 1185860 for CVE-2020-26145",
"url": "https://bugzilla.suse.com/1185860"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.158.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.158.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-20T12:40:03Z",
"details": "moderate"
}
],
"title": "CVE-2020-26145"
},
{
"cve": "CVE-2020-26147",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-26147"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel 5.8.9. The WEP, WPA, WPA2, and WPA3 implementations reassemble fragments even though some of them were sent in plaintext. This vulnerability can be abused to inject packets and/or exfiltrate selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP data-confidentiality protocol is used.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.158.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-26147",
"url": "https://www.suse.com/security/cve/CVE-2020-26147"
},
{
"category": "external",
"summary": "SUSE Bug 1233723 for CVE-2020-26147",
"url": "https://bugzilla.suse.com/1233723"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.158.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:L/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.158.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-20T12:40:03Z",
"details": "moderate"
}
],
"title": "CVE-2020-26147"
},
{
"cve": "CVE-2020-26558",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-26558"
}
],
"notes": [
{
"category": "general",
"text": "Bluetooth LE and BR/EDR secure pairing in Bluetooth Core Specification 2.1 through 5.2 may permit a nearby man-in-the-middle attacker to identify the Passkey used during pairing (in the Passkey authentication procedure) by reflection of the public key and the authentication evidence of the initiating device, potentially permitting this attacker to complete authenticated pairing with the responding device using the correct Passkey for the pairing session. The attack methodology determines the Passkey value one bit at a time.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.158.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-26558",
"url": "https://www.suse.com/security/cve/CVE-2020-26558"
},
{
"category": "external",
"summary": "SUSE Bug 1179610 for CVE-2020-26558",
"url": "https://bugzilla.suse.com/1179610"
},
{
"category": "external",
"summary": "SUSE Bug 1186463 for CVE-2020-26558",
"url": "https://bugzilla.suse.com/1186463"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.158.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.158.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-20T12:40:03Z",
"details": "moderate"
}
],
"title": "CVE-2020-26558"
},
{
"cve": "CVE-2020-36385",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-36385"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel before 5.10. drivers/infiniband/core/ucma.c has a use-after-free because the ctx is reached via the ctx_list in some ucma_migrate_id situations where ucma_close is called, aka CID-f5449e74802c.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.158.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-36385",
"url": "https://www.suse.com/security/cve/CVE-2020-36385"
},
{
"category": "external",
"summary": "SUSE Bug 1187050 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1187050"
},
{
"category": "external",
"summary": "SUSE Bug 1187052 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1187052"
},
{
"category": "external",
"summary": "SUSE Bug 1189302 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1189302"
},
{
"category": "external",
"summary": "SUSE Bug 1196174 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1196174"
},
{
"category": "external",
"summary": "SUSE Bug 1196810 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1196810"
},
{
"category": "external",
"summary": "SUSE Bug 1196914 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1196914"
},
{
"category": "external",
"summary": "SUSE Bug 1200084 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1200084"
},
{
"category": "external",
"summary": "SUSE Bug 1201734 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1201734"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.158.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.158.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-20T12:40:03Z",
"details": "important"
}
],
"title": "CVE-2020-36385"
},
{
"cve": "CVE-2020-36386",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-36386"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel before 5.8.1. net/bluetooth/hci_event.c has a slab out-of-bounds read in hci_extended_inquiry_result_evt, aka CID-51c19bf3d5cf.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.158.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-36386",
"url": "https://www.suse.com/security/cve/CVE-2020-36386"
},
{
"category": "external",
"summary": "SUSE Bug 1187038 for CVE-2020-36386",
"url": "https://bugzilla.suse.com/1187038"
},
{
"category": "external",
"summary": "SUSE Bug 1192868 for CVE-2020-36386",
"url": "https://bugzilla.suse.com/1192868"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.158.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.158.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-20T12:40:03Z",
"details": "moderate"
}
],
"title": "CVE-2020-36386"
},
{
"cve": "CVE-2021-0129",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-0129"
}
],
"notes": [
{
"category": "general",
"text": "Improper access control in BlueZ may allow an authenticated user to potentially enable information disclosure via adjacent access.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.158.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-0129",
"url": "https://www.suse.com/security/cve/CVE-2021-0129"
},
{
"category": "external",
"summary": "SUSE Bug 1186463 for CVE-2021-0129",
"url": "https://bugzilla.suse.com/1186463"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.158.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.158.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-20T12:40:03Z",
"details": "moderate"
}
],
"title": "CVE-2021-0129"
},
{
"cve": "CVE-2021-0512",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-0512"
}
],
"notes": [
{
"category": "general",
"text": "In __hidinput_change_resolution_multipliers of hid-input.c, there is a possible out of bounds write due to a heap buffer overflow. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-173843328References: Upstream kernel",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.158.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-0512",
"url": "https://www.suse.com/security/cve/CVE-2021-0512"
},
{
"category": "external",
"summary": "SUSE Bug 1187595 for CVE-2021-0512",
"url": "https://bugzilla.suse.com/1187595"
},
{
"category": "external",
"summary": "SUSE Bug 1187597 for CVE-2021-0512",
"url": "https://bugzilla.suse.com/1187597"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.158.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.158.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-20T12:40:03Z",
"details": "important"
}
],
"title": "CVE-2021-0512"
},
{
"cve": "CVE-2021-0605",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-0605"
}
],
"notes": [
{
"category": "general",
"text": "In pfkey_dump of af_key.c, there is a possible out-of-bounds read due to a missing bounds check. This could lead to local information disclosure in the kernel with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-110373476",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.158.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-0605",
"url": "https://www.suse.com/security/cve/CVE-2021-0605"
},
{
"category": "external",
"summary": "SUSE Bug 1187601 for CVE-2021-0605",
"url": "https://bugzilla.suse.com/1187601"
},
{
"category": "external",
"summary": "SUSE Bug 1187687 for CVE-2021-0605",
"url": "https://bugzilla.suse.com/1187687"
},
{
"category": "external",
"summary": "SUSE Bug 1188381 for CVE-2021-0605",
"url": "https://bugzilla.suse.com/1188381"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.158.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.158.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-20T12:40:03Z",
"details": "important"
}
],
"title": "CVE-2021-0605"
},
{
"cve": "CVE-2021-22555",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-22555"
}
],
"notes": [
{
"category": "general",
"text": "A heap out-of-bounds write affecting Linux since v2.6.19-rc1 was discovered in net/netfilter/x_tables.c. This allows an attacker to gain privileges or cause a DoS (via heap memory corruption) through user name space",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.158.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-22555",
"url": "https://www.suse.com/security/cve/CVE-2021-22555"
},
{
"category": "external",
"summary": "SUSE Bug 1188116 for CVE-2021-22555",
"url": "https://bugzilla.suse.com/1188116"
},
{
"category": "external",
"summary": "SUSE Bug 1188117 for CVE-2021-22555",
"url": "https://bugzilla.suse.com/1188117"
},
{
"category": "external",
"summary": "SUSE Bug 1188411 for CVE-2021-22555",
"url": "https://bugzilla.suse.com/1188411"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.158.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.158.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-20T12:40:03Z",
"details": "important"
}
],
"title": "CVE-2021-22555"
},
{
"cve": "CVE-2021-23134",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-23134"
}
],
"notes": [
{
"category": "general",
"text": "Use After Free vulnerability in nfc sockets in the Linux Kernel before 5.12.4 allows local attackers to elevate their privileges. In typical configurations, the issue can only be triggered by a privileged local user with the CAP_NET_RAW capability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.158.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-23134",
"url": "https://www.suse.com/security/cve/CVE-2021-23134"
},
{
"category": "external",
"summary": "SUSE Bug 1186060 for CVE-2021-23134",
"url": "https://bugzilla.suse.com/1186060"
},
{
"category": "external",
"summary": "SUSE Bug 1186061 for CVE-2021-23134",
"url": "https://bugzilla.suse.com/1186061"
},
{
"category": "external",
"summary": "SUSE Bug 1220739 for CVE-2021-23134",
"url": "https://bugzilla.suse.com/1220739"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.158.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.158.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-20T12:40:03Z",
"details": "important"
}
],
"title": "CVE-2021-23134"
},
{
"cve": "CVE-2021-32399",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-32399"
}
],
"notes": [
{
"category": "general",
"text": "net/bluetooth/hci_request.c in the Linux kernel through 5.12.2 has a race condition for removal of the HCI controller.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.158.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-32399",
"url": "https://www.suse.com/security/cve/CVE-2021-32399"
},
{
"category": "external",
"summary": "SUSE Bug 1184611 for CVE-2021-32399",
"url": "https://bugzilla.suse.com/1184611"
},
{
"category": "external",
"summary": "SUSE Bug 1185898 for CVE-2021-32399",
"url": "https://bugzilla.suse.com/1185898"
},
{
"category": "external",
"summary": "SUSE Bug 1185899 for CVE-2021-32399",
"url": "https://bugzilla.suse.com/1185899"
},
{
"category": "external",
"summary": "SUSE Bug 1196174 for CVE-2021-32399",
"url": "https://bugzilla.suse.com/1196174"
},
{
"category": "external",
"summary": "SUSE Bug 1200084 for CVE-2021-32399",
"url": "https://bugzilla.suse.com/1200084"
},
{
"category": "external",
"summary": "SUSE Bug 1201734 for CVE-2021-32399",
"url": "https://bugzilla.suse.com/1201734"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.158.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.158.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-20T12:40:03Z",
"details": "important"
}
],
"title": "CVE-2021-32399"
},
{
"cve": "CVE-2021-33034",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-33034"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel before 5.12.4, net/bluetooth/hci_event.c has a use-after-free when destroying an hci_chan, aka CID-5c4c8c954409. This leads to writing an arbitrary value.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.158.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-33034",
"url": "https://www.suse.com/security/cve/CVE-2021-33034"
},
{
"category": "external",
"summary": "SUSE Bug 1186111 for CVE-2021-33034",
"url": "https://bugzilla.suse.com/1186111"
},
{
"category": "external",
"summary": "SUSE Bug 1186285 for CVE-2021-33034",
"url": "https://bugzilla.suse.com/1186285"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.158.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.158.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-20T12:40:03Z",
"details": "important"
}
],
"title": "CVE-2021-33034"
},
{
"cve": "CVE-2021-33909",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-33909"
}
],
"notes": [
{
"category": "general",
"text": "fs/seq_file.c in the Linux kernel 3.16 through 5.13.x before 5.13.4 does not properly restrict seq buffer allocations, leading to an integer overflow, an Out-of-bounds Write, and escalation to root by an unprivileged user, aka CID-8cae8cd89f05.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.158.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-33909",
"url": "https://www.suse.com/security/cve/CVE-2021-33909"
},
{
"category": "external",
"summary": "SUSE Bug 1188062 for CVE-2021-33909",
"url": "https://bugzilla.suse.com/1188062"
},
{
"category": "external",
"summary": "SUSE Bug 1188063 for CVE-2021-33909",
"url": "https://bugzilla.suse.com/1188063"
},
{
"category": "external",
"summary": "SUSE Bug 1188257 for CVE-2021-33909",
"url": "https://bugzilla.suse.com/1188257"
},
{
"category": "external",
"summary": "SUSE Bug 1189302 for CVE-2021-33909",
"url": "https://bugzilla.suse.com/1189302"
},
{
"category": "external",
"summary": "SUSE Bug 1190859 for CVE-2021-33909",
"url": "https://bugzilla.suse.com/1190859"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.158.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.158.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-20T12:40:03Z",
"details": "important"
}
],
"title": "CVE-2021-33909"
},
{
"cve": "CVE-2021-34693",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-34693"
}
],
"notes": [
{
"category": "general",
"text": "net/can/bcm.c in the Linux kernel through 5.12.10 allows local users to obtain sensitive information from kernel stack memory because parts of a data structure are uninitialized.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.158.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-34693",
"url": "https://www.suse.com/security/cve/CVE-2021-34693"
},
{
"category": "external",
"summary": "SUSE Bug 1187452 for CVE-2021-34693",
"url": "https://bugzilla.suse.com/1187452"
},
{
"category": "external",
"summary": "SUSE Bug 1192868 for CVE-2021-34693",
"url": "https://bugzilla.suse.com/1192868"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.158.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.158.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-20T12:40:03Z",
"details": "moderate"
}
],
"title": "CVE-2021-34693"
},
{
"cve": "CVE-2021-3609",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3609"
}
],
"notes": [
{
"category": "general",
"text": ".A flaw was found in the CAN BCM networking protocol in the Linux kernel, where a local attacker can abuse a flaw in the CAN subsystem to corrupt memory, crash the system or escalate privileges. This race condition in net/can/bcm.c in the Linux kernel allows for local privilege escalation to root.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.158.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3609",
"url": "https://www.suse.com/security/cve/CVE-2021-3609"
},
{
"category": "external",
"summary": "SUSE Bug 1187215 for CVE-2021-3609",
"url": "https://bugzilla.suse.com/1187215"
},
{
"category": "external",
"summary": "SUSE Bug 1188323 for CVE-2021-3609",
"url": "https://bugzilla.suse.com/1188323"
},
{
"category": "external",
"summary": "SUSE Bug 1188720 for CVE-2021-3609",
"url": "https://bugzilla.suse.com/1188720"
},
{
"category": "external",
"summary": "SUSE Bug 1190276 for CVE-2021-3609",
"url": "https://bugzilla.suse.com/1190276"
},
{
"category": "external",
"summary": "SUSE Bug 1196810 for CVE-2021-3609",
"url": "https://bugzilla.suse.com/1196810"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.158.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.158.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-20T12:40:03Z",
"details": "moderate"
}
],
"title": "CVE-2021-3609"
}
]
}
suse-su-2021:2325-1
Vulnerability from csaf_suse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel",
"title": "Title of the patch"
},
{
"category": "description",
"text": "The SUSE Linux Enterprise 15 SP2 kernel was updated to receive various security and bugfixes.\n\n\nThe following security bugs were fixed:\n\n- CVE-2021-3573: Fixed an UAF vulnerability in function that can allow attackers to corrupt kernel heaps and adopt further exploitations. (bsc#1186666)\n- CVE-2021-0605: Fixed an out-of-bounds read which could lead to local information disclosure in the kernel with System execution privileges needed. (bsc#1187601)\n- CVE-2021-0512: Fixed a possible out-of-bounds write which could lead to local escalation of privilege with no additional execution privileges needed. (bsc#1187595)\n- CVE-2021-33624: Fixed a bug which allows unprivileged BPF program to leak the contents of arbitrary kernel memory (and therefore, of all physical memory) via a side-channel. (bsc#1187554)\n- CVE-2021-34693: Fixed a bug in net/can/bcm.c which could allow local users to obtain sensitive information from kernel stack memory because parts of a data structure are uninitialized. (bsc#1187452)\n- CVE-2021-0129: Fixed improper access control in BlueZ that may have allowed an authenticated user to potentially enable information disclosure via adjacent access (bnc#1186463).\n- CVE-2020-36385: Fixed a use-after-free via the ctx_list in some ucma_migrate_id situations where ucma_close is called (bnc#1187050).\n- CVE-2020-26558: Fixed Bluetooth LE and BR/EDR secure pairing in Bluetooth Core Specification 2.1 (bnc#1179610, bnc#1186463).\n- CVE-2020-36386: Fixed an out-of-bounds read issue in hci_extended_inquiry_result_evt (bnc#1187038).\n\nThe following non-security bugs were fixed:\n\n- acpica: Clean up context mutex during object deletion (git-fixes).\n- alsa: hda/cirrus: Set Initial DMIC volume to -26 dB (git-fixes).\n- alsa: hda: Fix for mute key LED for HP Pavilion 15-CK0xx (git-fixes).\n- alsa: timer: Fix master timer notification (git-fixes).\n- alx: Fix an error handling path in \u0027alx_probe()\u0027 (git-fixes).\n- arch: Add arch-dependent support markers in supported.conf (bsc#1186672)\n- arch: Add the support for kernel-FLAVOR-optional subpackage (jsc#SLE-11796)\n- ASoC: Intel: bytcr_rt5640: Add quirk for the Glavey TM800A550L tablet (git-fixes).\n- ASoC: Intel: bytcr_rt5640: Add quirk for the Lenovo Miix 3-830 tablet (git-fixes).\n- ASoC: max98088: fix ni clock divider calculation (git-fixes).\n- ASoC: rt5659: Fix the lost powers for the HDA header (git-fixes).\n- ASoC: sti-sas: add missing MODULE_DEVICE_TABLE (git-fixes).\n- ath6kl: return error code in ath6kl_wmi_set_roam_lrssi_cmd() (git-fixes).\n- batman-adv: Avoid WARN_ON timing related checks (git-fixes).\n- be2net: Fix an error handling path in \u0027be_probe()\u0027 (git-fixes).\n- blk-settings: align max_sectors on \u0027logical_block_size\u0027 boundary (bsc#1185195).\n- block: Discard page cache of zone reset target range (bsc#1187402).\n- block: return the correct bvec when checking for gaps (bsc#1187143).\n- block: return the correct bvec when checking for gaps (bsc#1187144).\n- bluetooth: fix the erroneous flush_work() order (git-fixes).\n- bluetooth: use correct lock to prevent UAF of hdev object (git-fixes).\n- bnxt_en: Call bnxt_ethtool_free() in bnxt_init_one() error path (jsc#SLE-8371 bsc#1153274).\n- bnxt_en: Fix TQM fastpath ring backing store computation (jsc#SLE-8371 bsc#1153274).\n- bnxt_en: Rediscover PHY capabilities after firmware reset (jsc#SLE-8371 bsc#1153274).\n- bpfilter: Specify the log level for the kmsg message (bsc#1155518).\n- brcmfmac: properly check for bus register errors (git-fixes).\n- btrfs: open device without device_list_mutex (bsc#1176771).\n- bus: ti-sysc: Fix flakey idling of uarts and stop using swsup_sidle_act (git-fixes).\n- can: mcba_usb: fix memory leak in mcba_usb (git-fixes).\n- ceph: must hold snap_rwsem when filling inode for async create (bsc#1187927).\n- cfg80211: avoid double free of PMSR request (git-fixes).\n- cfg80211: make certificate generation more robust (git-fixes).\n- cgroup1: do not allow \u0027\\n\u0027 in renaming (bsc#1187972).\n- char: hpet: add checks after calling ioremap (git-fixes).\n- CPU: Startup failed when SNC (sub-numa cluster) is enabled with 3 NIC add-on cards installed (bsc#1187263).\n- cxgb4: avoid accessing registers when clearing filters (git-fixes).\n- cxgb4: avoid link re-train during TC-MQPRIO configuration (jsc#SLE-8389).\n- cxgb4: fix wrong shift (git-fixes).\n- dax: Add a wakeup mode parameter to put_unlocked_entry() (bsc#1187411).\n- dax: Add an enum for specifying dax wakup mode (bsc#1187411).\n- dax: fix ENOMEM handling in grab_mapping_entry() (bsc#1184212).\n- dax: Wake up all waiters after invalidating dax entry (bsc#1187411).\n- dmaengine: ALTERA_MSGDMA depends on HAS_IOMEM (git-fixes).\n- dmaengine: pl330: fix wrong usage of spinlock flags in dma_cyclc (git-fixes).\n- dmaengine: qcom_hidma: comment platform_driver_register call (git-fixes).\n- dmaengine: QCOM_HIDMA_MGMT depends on HAS_IOMEM (git-fixes).\n- dmaengine: stedma40: add missing iounmap() on error in d40_probe() (git-fixes).\n- drm/amd/amdgpu: fix a potential deadlock in gpu reset (git-fixes).\n- drm/amd/amdgpu: fix refcount leak (git-fixes).\n- drm/amd/display: Allow bandwidth validation for 0 streams (git-fixes).\n- drm/amd/display: Disconnect non-DP with no EDID (git-fixes).\n- drm/amdgpu: Fix a use-after-free (git-fixes).\n- drm/amdgpu: make sure we unpin the UVD BO (git-fixes).\n- drm/tegra: sor: Do not leak runtime PM reference (git-fixes).\n- drm: Fix use-after-free read in drm_getunique() (git-fixes).\n- drm: Lock pointer access in drm_master_release() (git-fixes).\n- dt-bindings: reset: meson8b: fix duplicate reset IDs (git-fixes).\n- efi: Allow EFI_MEMORY_XP and EFI_MEMORY_RO both to be cleared (git-fixes).\n- efi: cper: fix snprintf() use in cper_dimm_err_location() (git-fixes).\n- ext4: fix bug on in ext4_es_cache_extent as ext4_split_extent_at failed (bsc#1187408).\n- ext4: fix check to prevent false positive report of incorrect used inodes (bsc#1187404).\n- ext4: fix error code in ext4_commit_super (bsc#1187407).\n- ext4: fix memory leak in ext4_fill_super (bsc#1187409).\n- FCOE: fcoe_wwn_from_mac kABI fix (bsc#1187886).\n- fs/nfs: Use fatal_signal_pending instead of signal_pending (git-fixes).\n- fs: fix reporting supported extra file attributes for statx() (bsc#1187410).\n- ftrace: Do not blindly read the ip address in ftrace_bug() (git-fixes).\n- ftrace: Free the trampoline when ftrace_startup() fails (git-fixes).\n- fuse: BUG_ON correction in fuse_dev_splice_write() (bsc#1187356).\n- gpio: cadence: Add missing MODULE_DEVICE_TABLE (git-fixes).\n- gpu: Enable CONFIG_PCI_PF_STUB for Nvidia Ampere vGPU support (jsc#SLE-17882 jsc#ECO-3691)\n- gve: Add NULL pointer checks when freeing irqs (git-fixes).\n- gve: Correct SKB queue index validation (git-fixes).\n- gve: Upgrade memory barrier in poll routine (git-fixes).\n- HID: Add BUS_VIRTUAL to hid_connect logging (git-fixes).\n- HID: gt683r: add missing MODULE_DEVICE_TABLE (git-fixes).\n- HID: hid-input: add mapping for emoji picker key (git-fixes).\n- HID: hid-sensor-hub: Return error for hid_set_field() failure (git-fixes).\n- HID: i2c-hid: fix format string mismatch (git-fixes).\n- HID: i2c-hid: Skip ELAN power-on command after reset (git-fixes).\n- HID: magicmouse: fix NULL-deref on disconnect (git-fixes).\n- HID: multitouch: require Finger field to mark Win8 reports as MT (git-fixes).\n- HID: pidff: fix error return code in hid_pidff_init() (git-fixes).\n- HID: quirks: Set INCREMENT_USAGE_ON_DUPLICATE for Saitek X65 (git-fixes).\n- HID: usbhid: fix info leak in hid_submit_ctrl (git-fixes).\n- HID: usbhid: Fix race between usbhid_close() and usbhid_stop() (git-fixes).\n- hwmon: (dell-smm-hwmon) Fix index values (git-fixes).\n- hwmon: (scpi-hwmon) shows the negative temperature properly (git-fixes).\n- i2c: mpc: Make use of i2c_recover_bus() (git-fixes).\n- i2c: qcom-geni: Suspend and resume the bus during SYSTEM_SLEEP_PM ops (git-fixes).\n- ice: add ndo_bpf callback for safe mode netdev ops (jsc#SLE-7926).\n- ice: Allow all LLDP packets from PF to Tx (jsc#SLE-7926).\n- ice: Fix VFR issues for AVF drivers that expect ATQLEN cleared (git-fixes).\n- isdn: mISDN: correctly handle ph_info allocation failure in hfcsusb_ph_info (git-fixes).\n- isdn: mISDN: netjet: Fix crash in nj_probe: (git-fixes).\n- isdn: mISDNinfineon: check/cleanup ioremap failure correctly in setup_io (git-fixes).\n- ixgbe: fix large MTU request from VF (git-fixes).\n- kABI workaround for struct lis3lv02d change (git-fixes).\n- kernel-binary.spec.in: Add Supplements: for -extra package on Leap kernel-$flavor-extra should supplement kernel-$flavor on Leap, like it does on SLED, and like the kernel-$flavor-optional package does.\n- kernel-binary.spec.in: build-id check requires elfutils.\n- kernel-binary.spec.in: Regenerate makefile when not using mkmakefile.\n- kernel-binary.spec: Only use mkmakefile when it exists Linux 5.13 no longer had a mkmakefile script\n- kernel: kexec_file: fix error return code of kexec_calculate_store_digests() (git-fixes).\n- kthread: prevent deadlock when kthread_mod_delayed_work() races with kthread_cancel_delayed_work_sync() (bsc#1187867).\n- kthread_worker: split code for canceling the delayed work timer (bsc#1187867).\n- kyber: fix out of bounds access when preempted (bsc#1187403).\n- lib: vdso: Remove CROSS_COMPILE_COMPAT_VDSO (bsc#1164648,jsc#SLE-11493).\n- libertas: register sysfs groups properly (git-fixes).\n- locking/mutex: clear MUTEX_FLAGS if wait_list is empty due to signal (git-fixes).\n- md: Fix missing unused status line of /proc/mdstat (git-fixes).\n- media: dvb: Add check on sp8870_readreg return (git-fixes).\n- media: dvb: Add check on sp8870_readreg return (git-fixes).\n- media: gspca: mt9m111: Check write_bridge for timeout (git-fixes).\n- media: gspca: mt9m111: Check write_bridge for timeout (git-fixes).\n- media: gspca: properly check for errors in po1030_probe() (git-fixes).\n- media: gspca: properly check for errors in po1030_probe() (git-fixes).\n- media: mtk-mdp: Check return value of of_clk_get (git-fixes).\n- media: mtk-mdp: Fix a refcounting bug on error in init (git-fixes).\n- media: s5p-g2d: Fix a memory leak in an error handling path in \u0027g2d_probe()\u0027 (git-fixes).\n- mei: request autosuspend after sending rx flow control (git-fixes).\n- mmc: meson-gx: use memcpy_to/fromio for dram-access-quirk (git-fixes).\n- module: limit enabling module.sig_enforce (git-fixes).\n- net/mlx4: Fix EEPROM dump support (git-fixes).\n- net/mlx5: Consider RoCE cap before init RDMA resources (git-fixes).\n- net/mlx5: DR, Create multi-destination flow table with level less than 64 (jsc#SLE-8464).\n- net/mlx5: Fix PBMC register mapping (git-fixes).\n- net/mlx5: Fix placement of log_max_flow_counter (git-fixes).\n- net/mlx5: Fix sleep while atomic in mlx5_eswitch_get_vepa (git-fixes).\n- net/mlx5e: Block offload of outer header csum for UDP tunnels (git-fixes).\n- net/mlx5e: Fix multipath lag activation (git-fixes).\n- net/mlx5e: Fix nullptr in add_vlan_push_action() (git-fixes).\n- net/mlx5e: Fix page reclaim for dead peer hairpin (git-fixes).\n- net/mlx5e: Remove dependency in IPsec initialization flows (git-fixes).\n- net/nfc/rawsock.c: fix a permission check bug (git-fixes).\n- net/sched: act_ct: handle DNAT tuple collision (bsc#1154353).\n- net/x25: Return the correct errno code (git-fixes).\n- net: bnx2: Fix error return code in bnx2_init_board() (git-fixes).\n- net: fix iteration for sctp transport seq_files (git-fixes).\n- net: hns3: Limiting the scope of vector_ring_chain variable (git-fixes).\n- net: hns3: put off calling register_netdev() until client initialize complete (bsc#1154353).\n- net: mvpp2: add mvpp2_phylink_to_port() helper (bsc#1187171).\n- netxen_nic: Fix an error handling path in \u0027netxen_nic_probe()\u0027 (git-fixes).\n- nfc: fix NULL ptr dereference in llcp_sock_getname() after failed connect (git-fixes).\n- NFC: SUSE specific brutal fix for runtime PM (bsc#1185589).\n- NFS: Deal correctly with attribute generation counter overflow (git-fixes).\n- NFS: Do not corrupt the value of pg_bytes_written in nfs_do_recoalesce() (git-fixes).\n- NFS: Do not discard pNFS layout segments that are marked for return (git-fixes).\n- NFS: Do not gratuitously clear the inode cache when lookup failed (git-fixes).\n- NFS: Do not revalidate the directory permissions on a lookup failure (git-fixes).\n- NFS: Fix a potential NULL dereference in nfs_get_client() (git-fixes).\n- NFS: fix an incorrect limit in filelayout_decode_layout() (git-fixes).\n- NFS: Fix an Oopsable condition in __nfs_pageio_add_request() (git-fixes).\n- NFS: Fix use-after-free in nfs4_init_client() (git-fixes).\n- nfsd: register pernet ops last, unregister first (git-fixes).\n- NFSD: Repair misuse of sv_lock in 5.10.16-rt30 (git-fixes).\n- NFSv4.2 fix handling of sr_eof in SEEK\u0027s reply (git-fixes).\n- NFSv4.2: Always flush out writes in nfs42_proc_fallocate() (git-fixes).\n- NFSv4.2: fix return value of _nfs4_get_security_label() (git-fixes).\n- NFSv4: Do not discard segments marked for return in _pnfs_return_layout() (git-fixes).\n- NFSv4: Fix a NULL pointer dereference in pnfs_mark_matching_lsegs_return() (git-fixes).\n- NFSv4: Fix deadlock between nfs4_evict_inode() and nfs4_opendata_get_inode() (git-fixes).\n- NFSv4: Fix v4.0/v4.1 SEEK_DATA return -ENOTSUPP when set NFS_V4_2 config (git-fixes).\n- ocfs2: fix data corruption by fallocate (bsc#1187412).\n- PCI/LINK: Remove bandwidth notification (bsc#1183712).\n- PCI: aardvark: Do not rely on jiffies while holding spinlock (git-fixes).\n- PCI: aardvark: Fix kernel panic during PIO transfer (git-fixes).\n- PCI: Add ACS quirk for Broadcom BCM57414 NIC (git-fixes).\n- PCI: Mark some NVIDIA GPUs to avoid bus reset (git-fixes).\n- PCI: Mark TI C667X to avoid bus reset (git-fixes).\n- PCI: Work around Huawei Intelligent NIC VF FLR erratum (git-fixes).\n- perf/x86/intel/uncore: Remove uncore extra PCI dev HSWEP_PCI_PCU_3 (bsc#1184685).\n- pid: take a reference when initializing `cad_pid` (bsc#1152489).\n- platform/x86: hp-wireless: add AMD\u0027s hardware id to the supported list (git-fixes).\n- platform/x86: hp_accel: Avoid invoking _INI to speed up resume (git-fixes).\n- platform/x86: intel_punit_ipc: Append MODULE_DEVICE_TABLE for ACPI (git-fixes).\n- platform/x86: touchscreen_dmi: Add info for the Mediacom Winpad 7.0 W700 tablet (git-fixes).\n- PM: sleep: Add pm_debug_messages kernel command line option (bsc#1186752).\n- pNFS/flexfiles: fix incorrect size check in decode_nfs_fh() (git-fixes).\n- pNFS/NFSv4: Fix a layout segment leak in pnfs_layout_process() (git-fixes).\n- qla2xxx: synchronize rport dev_loss_tmo setting (bsc#1182470 bsc#1185486).\n- qlcnic: Fix an error handling path in \u0027qlcnic_probe()\u0027 (git-fixes).\n- radeon: use memcpy_to/fromio for UVD fw upload (git-fixes).\n- regulator: bd70528: Fix off-by-one for buck123 .n_voltages setting (git-fixes).\n- regulator: core: resolve supply for boot-on/always-on regulators (git-fixes).\n- regulator: max77620: Use device_set_of_node_from_dev() (git-fixes).\n- Revert \u0027ath6kl: return error code in ath6kl_wmi_set_roam_lrssi_cmd()\u0027 (git-fixes).\n- Revert \u0027brcmfmac: add a check for the status of usb_register\u0027 (git-fixes).\n- Revert \u0027char: hpet: fix a missing check of ioremap\u0027 (git-fixes).\n- Revert \u0027char: hpet: fix a missing check of ioremap\u0027 (git-fixes).\n- Revert \u0027dmaengine: qcom_hidma: Check for driver register failure\u0027 (git-fixes).\n- Revert \u0027ecryptfs: replace BUG_ON with error handling code\u0027 (bsc#1187413).\n- Revert \u0027ibmvnic: simplify reset_long_term_buff function\u0027 (bsc#1186206 ltc#191041).\n- Revert \u0027isdn: mISDN: Fix potential NULL pointer dereference of kzalloc\u0027 (git-fixes).\n- Revert \u0027isdn: mISDNinfineon: fix potential NULL pointer dereference\u0027 (git-fixes).\n- Revert \u0027libertas: add checks for the return value of sysfs_create_group\u0027 (git-fixes).\n- Revert \u0027media: dvb: Add check on sp8870_readreg\u0027 (git-fixes).\n- Revert \u0027media: dvb: Add check on sp8870_readreg\u0027 (git-fixes).\n- Revert \u0027media: gspca: Check the return value of write_bridge for timeout\u0027 (git-fixes).\n- Revert \u0027media: gspca: Check the return value of write_bridge for timeout\u0027 (git-fixes).\n- Revert \u0027media: gspca: mt9m111: Check write_bridge for timeout\u0027 (git-fixes).\n- Revert \u0027media: gspca: mt9m111: Check write_bridge for timeout\u0027 (git-fixes).\n- Revert \u0027media: usb: gspca: add a missed check for goto_low_power\u0027 (git-fixes).\n- Revert \u0027net: liquidio: fix a NULL pointer dereference\u0027 (git-fixes).\n- Revert \u0027PCI: PM: Do not read power state in pci_enable_device_flags()\u0027 (git-fixes).\n- Revert \u0027qlcnic: Avoid potential NULL pointer dereference\u0027 (git-fixes).\n- Revert \u0027scsi: core: run queue if SCSI device queue isn\u0027t ready and queue is idle\u0027 (bsc#1186949).\n- Revert \u0027serial: max310x: pass return value of spi_register_driver\u0027 (git-fixes).\n- Revert \u0027video: hgafb: fix potential NULL pointer dereference\u0027 (git-fixes).\n- Revert \u0027video: imsttfb: fix potential NULL pointer dereferences\u0027 (bsc#1152489)\n- rpm/kernel-binary.spec.in: Correct Supplements in optional subpkg (jsc#SLE-11796)\n- rpm/kernel-binary.spec.in: Fix handling of +arch marker (bsc#1186672)\n- rpm/split-modules: Avoid errors even if Module.* are not present\n- s390/stack: fix possible register corruption with stack switch helper (bsc#1185677).\n- sched/debug: Fix cgroup_path[] serialization (git-fixes)\n- sched/fair: Keep load_avg and load_sum synced (git-fixes)\n- scsi: aacraid: Fix an oops in error handling (bsc#1187072).\n- scsi: aacraid: Remove erroneous fallthrough annotation (bsc#1186950).\n- scsi: aacraid: Use memdup_user() as a cleanup (bsc#1186951).\n- scsi: acornscsi: Fix an error handling path in acornscsi_probe() (bsc#1186952).\n- scsi: be2iscsi: Fix a theoretical leak in beiscsi_create_eqs() (bsc#1186953).\n- scsi: be2iscsi: Revert \u0027Fix a theoretical leak in beiscsi_create_eqs()\u0027 (bsc#1187067).\n- scsi: bfa: Fix error return in bfad_pci_init() (bsc#1186954).\n- scsi: bnx2fc: Fix Kconfig warning and CNIC build errors (bsc#1186955).\n- scsi: bnx2i: Requires MMU (bsc#1186956).\n- scsi: core: Fix race between handling STS_RESOURCE and completion (bsc#1187883).\n- scsi: csiostor: Fix wrong return value in csio_hw_prep_fw() (bsc#1186957).\n- scsi: cumana_2: Fix different dev_id between request_irq() and free_irq() (bsc#1186958).\n- scsi: cxgb3i: Fix some leaks in init_act_open() (bsc#1186959).\n- scsi: cxgb4i: Fix TLS dependency (bsc#1186960).\n- scsi: eesox: Fix different dev_id between request_irq() and free_irq() (bsc#1186961).\n- scsi: fcoe: Fix mismatched fcoe_wwn_from_mac declaration (bsc#1187886).\n- scsi: fnic: Fix error return code in fnic_probe() (bsc#1186962).\n- scsi: hisi_sas: Fix IRQ checks (bsc#1186963).\n- scsi: hisi_sas: Remove preemptible() (bsc#1186964).\n- scsi: jazz_esp: Add IRQ check (bsc#1186965).\n- scsi: libfc: Fix enum-conversion warning (bsc#1186966).\n- scsi: libsas: Fix error path in sas_notify_lldd_dev_found() (bsc#1186967).\n- scsi: libsas: Reset num_scatter if libata marks qc as NODATA (bsc#1187068).\n- scsi: libsas: Set data_dir as DMA_NONE if libata marks qc as NODATA (bsc#1186968).\n- scsi: lpfc: Fix ancient double free (bsc#1186969).\n- scsi: lpfc: Fix failure to transmit ABTS on FC link (git-fixes).\n- scsi: megaraid_sas: Check user-provided offsets (bsc#1186970).\n- scsi: megaraid_sas: Clear affinity hint (bsc#1186971).\n- scsi: megaraid_sas: Do not call disable_irq from process IRQ poll (bsc#1186972).\n- scsi: megaraid_sas: Fix MEGASAS_IOC_FIRMWARE regression (bsc#1186973).\n- scsi: megaraid_sas: Remove undefined ENABLE_IRQ_POLL macro (bsc#1186974).\n- scsi: mesh: Fix panic after host or bus reset (bsc#1186976).\n- scsi: mpt3sas: Do not use GFP_KERNEL in atomic context (bsc#1186977).\n- scsi: mpt3sas: Fix error return code of mpt3sas_base_attach() (bsc#1186978).\n- scsi: mpt3sas: Fix ioctl timeout (bsc#1186979).\n- scsi: myrs: Fix a double free in myrs_cleanup() (bsc#1186980).\n- scsi: pm80xx: Fix error return in pm8001_pci_probe() (bsc#1186981).\n- scsi: powertec: Fix different dev_id between request_irq() and free_irq() (bsc#1186982).\n- scsi: qedi: Check for buffer overflow in qedi_set_path() (bsc#1186983).\n- scsi: qedi: Fix error return code of qedi_alloc_global_queues() (bsc#1186984).\n- scsi: qedi: Fix missing destroy_workqueue() on error in __qedi_probe (bsc#1186985).\n- scsi: qla2xxx: Prevent PRLI in target mode (git-fixes).\n- scsi: qla4xxx: Fix an error handling path in \u0027qla4xxx_get_host_stats()\u0027 (bsc#1186986).\n- scsi: qla4xxx: Remove in_interrupt() (bsc#1186987).\n- scsi: scsi_debug: Add check for sdebug_max_queue during module init (bsc#1186988).\n- scsi: scsi_dh_alua: Retry RTPG on a different path after failure (bsc#1174978 bsc#1185701).\n- scsi: sd: Fix Opal support (bsc#1186989).\n- scsi: sni_53c710: Add IRQ check (bsc#1186990).\n- scsi: sun3x_esp: Add IRQ check (bsc#1186991).\n- scsi: ufs-qcom: Fix scheduling while atomic issue (bsc#1187002).\n- scsi: ufs: Add quirk to disallow reset of interrupt aggregation (bsc#1186992).\n- scsi: ufs: Add quirk to enable host controller without hce (bsc#1186993).\n- scsi: ufs: Add quirk to fix abnormal ocs fatal error (bsc#1186994).\n- scsi: ufs: Add quirk to fix mishandling utrlclr/utmrlclr (bsc#1186995).\n- scsi: ufs: core: Narrow down fast path in system suspend path (bsc#1186996).\n- scsi: ufs: Do not update urgent bkops level when toggling auto bkops (bsc#1186997).\n- scsi: ufs: Fix imprecise load calculation in devfreq window (bsc#1187795).\n- SCSI: ufs: fix ktime_t kabi change (bsc#1187795).\n- scsi: ufs: Fix race between shutdown and runtime resume flow (bsc#1186998).\n- scsi: ufs: Introduce UFSHCD_QUIRK_PRDT_BYTE_GRAN quirk (bsc#1187000).\n- scsi: ufs: Make ufshcd_print_trs() consider UFSHCD_QUIRK_PRDT_BYTE_GRAN (bsc#1187069).\n- scsi: ufs: Properly release resources if a task is aborted successfully (bsc#1187001).\n- scsi: ufs: ufshcd-pltfrm depends on HAS_IOMEM (bsc#1187980).\n- scsi: ufs: ufshcd-pltfrm: Fix deferred probing (bsc#1187003).\n- scsi: ufshcd: use an enum for quirks (bsc#1186999).\n- serial: max310x: unregister uart driver in case of failure and abort (git-fixes).\n- serial: rp2: use \u0027request_firmware\u0027 instead of \u0027request_firmware_nowait\u0027 (git-fixes).\n- spi: spi-nxp-fspi: move the register operation after the clock enable (git-fixes).\n- spi: sprd: Add missing MODULE_DEVICE_TABLE (git-fixes).\n- spi: stm32-qspi: Always wait BUSY bit to be cleared in stm32_qspi_wait_cmd() (git-fixes).\n- staging: rtl8723bs: Fix uninitialized variables (git-fixes).\n- sunrpc: fix refcount leak for rpc auth modules (git-fixes).\n- SUNRPC: Handle major timeout in xprt_adjust_timeout() (git-fixes).\n- SUNRPC: Move fault injection call sites (git-fixes).\n- SUNRPC: Set memalloc_nofs_save() for sync tasks (git-fixes).\n- svcrdma: disable timeouts on rdma backchannel (git-fixes).\n- thermal/drivers/intel: Initialize RW trip to THERMAL_TEMP_INVALID (git-fixes).\n- tpm: fix error return code in tpm2_get_cc_attrs_tbl() (git-fixes).\n- tracing: Correct the length check which causes memory corruption (git-fixes).\n- tracing: Do no increment trace_clock_global() by one (git-fixes).\n- tracing: Do not stop recording cmdlines when tracing is off (git-fixes).\n- tracing: Do not stop recording comms if the trace file is being read (git-fixes).\n- tracing: Restructure trace_clock_global() to never block (git-fixes).\n- ttyprintk: Add TTY hangup callback (git-fixes).\n- usb: core: hub: Disable autosuspend for Cypress CY7C65632 (git-fixes).\n- usb: core: reduce power-on-good delay time of root hub (git-fixes).\n- usb: dwc3: core: fix kernel panic when do reboot (git-fixes).\n- usb: dwc3: core: fix kernel panic when do reboot (git-fixes).\n- usb: dwc3: debugfs: Add and remove endpoint dirs dynamically (git-fixes).\n- usb: dwc3: ep0: fix NULL pointer exception (git-fixes).\n- USB: f_ncm: ncm_bitrate (speed) is unsigned (git-fixes).\n- usb: f_ncm: only first packet of aggregate needs to start timer (git-fixes).\n- usb: f_ncm: only first packet of aggregate needs to start timer (git-fixes).\n- usb: fix various gadget panics on 10gbps cabling (git-fixes).\n- usb: fix various gadget panics on 10gbps cabling (git-fixes).\n- usb: fix various gadgets null ptr deref on 10gbps cabling (git-fixes).\n- usb: gadget: eem: fix wrong eem header operation (git-fixes).\n- usb: gadget: eem: fix wrong eem header operation (git-fixes).\n- usb: gadget: f_fs: Ensure io_completion_wq is idle during unbind (git-fixes).\n- usb: gadget: f_fs: Ensure io_completion_wq is idle during unbind (git-fixes).\n- usb: musb: fix MUSB_QUIRK_B_DISCONNECT_99 handling (git-fixes).\n- usb: pd: Set PD_T_SINK_WAIT_CAP to 310ms (git-fixes).\n- USB: serial: cp210x: fix alternate function for CP2102N QFN20 (git-fixes).\n- USB: serial: ftdi_sio: add IDs for IDS GmbH Products (git-fixes).\n- USB: serial: ftdi_sio: add NovaTech OrionMX product ID (git-fixes).\n- USB: serial: ftdi_sio: add NovaTech OrionMX product ID (git-fixes).\n- USB: serial: omninet: add device id for Zyxel Omni 56K Plus (git-fixes).\n- USB: serial: omninet: add device id for Zyxel Omni 56K Plus (git-fixes).\n- USB: serial: option: add Telit LE910-S1 compositions 0x7010, 0x7011 (git-fixes).\n- USB: serial: pl2303: add device id for ADLINK ND-6530 GC (git-fixes).\n- USB: serial: quatech2: fix control-request directions (git-fixes).\n- USB: serial: ti_usb_3410_5052: add startech.com device id (git-fixes).\n- usb: typec: mux: Fix copy-paste mistake in typec_mux_match (git-fixes).\n- usb: typec: mux: Fix matching with typec_altmode_desc (git-fixes).\n- usb: typec: tcpm: Use LE to CPU conversion when accessing msg-\u003eheader (git-fixes).\n- usb: typec: ucsi: Clear PPM capability data in ucsi_init() error path (git-fixes).\n- usb: typec: wcove: Use LE to CPU conversion when accessing msg-\u003eheader (git-fixes).\n- USB: usbfs: Do not WARN about excessively large memory allocations (git-fixes).\n- vfio/pci: Fix error return code in vfio_ecap_init() (git-fixes).\n- vfio/pci: zap_vma_ptes() needs MMU (git-fixes).\n- vfio/platform: fix module_put call in error flow (git-fixes).\n- video: hgafb: correctly handle card detect failure during probe (git-fixes).\n- video: hgafb: fix potential NULL pointer dereference (git-fixes).\n- vmlinux.lds.h: Avoid orphan section with !SMP (git-fixes).\n- vrf: fix maximum MTU (git-fixes).\n- vsock/vmci: log once the failed queue pair allocation (git-fixes).\n- wireguard: allowedips: initialize list head in selftest (git-fixes).\n- wireguard: do not use -O3 (git-fixes).\n- wireguard: peer: allocate in kmem_cache (git-fixes).\n- wireguard: peer: put frequently used members above cache lines (git-fixes).\n- wireguard: queueing: get rid of per-peer ring buffers (git-fixes).\n- wireguard: selftests: make sure rp_filter is disabled on vethc (git-fixes).\n- wireguard: selftests: remove old conntrack kconfig value (git-fixes).\n- wireguard: use synchronize_net rather than synchronize_rcu (git-fixes).\n- x86/apic: Mark _all_ legacy interrupts when IO/APIC is missing (bsc#1152489).\n- x86/fault: Do not send SIGSEGV twice on SEGV_PKUERR (bsc#1152489).\n- x86/pkru: Write hardware init value to PKRU when xstate is init (bsc#1152489).\n- x86/process: Check PF_KTHREAD and not current-\u003emm for kernel threads (bsc#1152489).\n- x86: fix seq_file iteration for pat.c (git-fixes).\n- xen-blkback: fix compatibility bug with single page rings (git-fixes).\n- xen-pciback: reconfigure also from backend watch handler (git-fixes).\n- xen-pciback: redo VF placement in the virtual topology (git-fixes).\n- xen/evtchn: Change irq_info lock to raw_spinlock_t (git-fixes).\n- xfrm: policy: Read seqcount outside of rcu-read side in xfrm_policy_lookup_bytype (bsc#1185675).\n- xprtrdma: Avoid Receive Queue wrapping (git-fixes).\n- xprtrdma: rpcrdma_mr_pop() already does list_del_init() (git-fixes).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2021-2325,SUSE-SLE-Module-Basesystem-15-SP2-2021-2325,SUSE-SLE-Module-Development-Tools-15-SP2-2021-2325,SUSE-SLE-Module-Legacy-15-SP2-2021-2325,SUSE-SLE-Module-Live-Patching-15-SP2-2021-2325,SUSE-SLE-Product-HA-15-SP2-2021-2325,SUSE-SLE-Product-WE-15-SP2-2021-2325,SUSE-SUSE-MicroOS-5.0-2021-2325",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2021_2325-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2021:2325-1",
"url": "https://www.suse.com/support/update/announcement/2021/suse-su-20212325-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2021:2325-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2021-July/009131.html"
},
{
"category": "self",
"summary": "SUSE Bug 1152489",
"url": "https://bugzilla.suse.com/1152489"
},
{
"category": "self",
"summary": "SUSE Bug 1153274",
"url": "https://bugzilla.suse.com/1153274"
},
{
"category": "self",
"summary": "SUSE Bug 1154353",
"url": "https://bugzilla.suse.com/1154353"
},
{
"category": "self",
"summary": "SUSE Bug 1155518",
"url": "https://bugzilla.suse.com/1155518"
},
{
"category": "self",
"summary": "SUSE Bug 1164648",
"url": "https://bugzilla.suse.com/1164648"
},
{
"category": "self",
"summary": "SUSE Bug 1174978",
"url": "https://bugzilla.suse.com/1174978"
},
{
"category": "self",
"summary": "SUSE Bug 1176771",
"url": "https://bugzilla.suse.com/1176771"
},
{
"category": "self",
"summary": "SUSE Bug 1179610",
"url": "https://bugzilla.suse.com/1179610"
},
{
"category": "self",
"summary": "SUSE Bug 1182470",
"url": "https://bugzilla.suse.com/1182470"
},
{
"category": "self",
"summary": "SUSE Bug 1183712",
"url": "https://bugzilla.suse.com/1183712"
},
{
"category": "self",
"summary": "SUSE Bug 1184212",
"url": "https://bugzilla.suse.com/1184212"
},
{
"category": "self",
"summary": "SUSE Bug 1184685",
"url": "https://bugzilla.suse.com/1184685"
},
{
"category": "self",
"summary": "SUSE Bug 1185195",
"url": "https://bugzilla.suse.com/1185195"
},
{
"category": "self",
"summary": "SUSE Bug 1185486",
"url": "https://bugzilla.suse.com/1185486"
},
{
"category": "self",
"summary": "SUSE Bug 1185589",
"url": "https://bugzilla.suse.com/1185589"
},
{
"category": "self",
"summary": "SUSE Bug 1185675",
"url": "https://bugzilla.suse.com/1185675"
},
{
"category": "self",
"summary": "SUSE Bug 1185677",
"url": "https://bugzilla.suse.com/1185677"
},
{
"category": "self",
"summary": "SUSE Bug 1185701",
"url": "https://bugzilla.suse.com/1185701"
},
{
"category": "self",
"summary": "SUSE Bug 1186206",
"url": "https://bugzilla.suse.com/1186206"
},
{
"category": "self",
"summary": "SUSE Bug 1186463",
"url": "https://bugzilla.suse.com/1186463"
},
{
"category": "self",
"summary": "SUSE Bug 1186666",
"url": "https://bugzilla.suse.com/1186666"
},
{
"category": "self",
"summary": "SUSE Bug 1186672",
"url": "https://bugzilla.suse.com/1186672"
},
{
"category": "self",
"summary": "SUSE Bug 1186752",
"url": "https://bugzilla.suse.com/1186752"
},
{
"category": "self",
"summary": "SUSE Bug 1186949",
"url": "https://bugzilla.suse.com/1186949"
},
{
"category": "self",
"summary": "SUSE Bug 1186950",
"url": "https://bugzilla.suse.com/1186950"
},
{
"category": "self",
"summary": "SUSE Bug 1186951",
"url": "https://bugzilla.suse.com/1186951"
},
{
"category": "self",
"summary": "SUSE Bug 1186952",
"url": "https://bugzilla.suse.com/1186952"
},
{
"category": "self",
"summary": "SUSE Bug 1186953",
"url": "https://bugzilla.suse.com/1186953"
},
{
"category": "self",
"summary": "SUSE Bug 1186954",
"url": "https://bugzilla.suse.com/1186954"
},
{
"category": "self",
"summary": "SUSE Bug 1186955",
"url": "https://bugzilla.suse.com/1186955"
},
{
"category": "self",
"summary": "SUSE Bug 1186956",
"url": "https://bugzilla.suse.com/1186956"
},
{
"category": "self",
"summary": "SUSE Bug 1186957",
"url": "https://bugzilla.suse.com/1186957"
},
{
"category": "self",
"summary": "SUSE Bug 1186958",
"url": "https://bugzilla.suse.com/1186958"
},
{
"category": "self",
"summary": "SUSE Bug 1186959",
"url": "https://bugzilla.suse.com/1186959"
},
{
"category": "self",
"summary": "SUSE Bug 1186960",
"url": "https://bugzilla.suse.com/1186960"
},
{
"category": "self",
"summary": "SUSE Bug 1186961",
"url": "https://bugzilla.suse.com/1186961"
},
{
"category": "self",
"summary": "SUSE Bug 1186962",
"url": "https://bugzilla.suse.com/1186962"
},
{
"category": "self",
"summary": "SUSE Bug 1186963",
"url": "https://bugzilla.suse.com/1186963"
},
{
"category": "self",
"summary": "SUSE Bug 1186964",
"url": "https://bugzilla.suse.com/1186964"
},
{
"category": "self",
"summary": "SUSE Bug 1186965",
"url": "https://bugzilla.suse.com/1186965"
},
{
"category": "self",
"summary": "SUSE Bug 1186966",
"url": "https://bugzilla.suse.com/1186966"
},
{
"category": "self",
"summary": "SUSE Bug 1186967",
"url": "https://bugzilla.suse.com/1186967"
},
{
"category": "self",
"summary": "SUSE Bug 1186968",
"url": "https://bugzilla.suse.com/1186968"
},
{
"category": "self",
"summary": "SUSE Bug 1186969",
"url": "https://bugzilla.suse.com/1186969"
},
{
"category": "self",
"summary": "SUSE Bug 1186970",
"url": "https://bugzilla.suse.com/1186970"
},
{
"category": "self",
"summary": "SUSE Bug 1186971",
"url": "https://bugzilla.suse.com/1186971"
},
{
"category": "self",
"summary": "SUSE Bug 1186972",
"url": "https://bugzilla.suse.com/1186972"
},
{
"category": "self",
"summary": "SUSE Bug 1186973",
"url": "https://bugzilla.suse.com/1186973"
},
{
"category": "self",
"summary": "SUSE Bug 1186974",
"url": "https://bugzilla.suse.com/1186974"
},
{
"category": "self",
"summary": "SUSE Bug 1186976",
"url": "https://bugzilla.suse.com/1186976"
},
{
"category": "self",
"summary": "SUSE Bug 1186977",
"url": "https://bugzilla.suse.com/1186977"
},
{
"category": "self",
"summary": "SUSE Bug 1186978",
"url": "https://bugzilla.suse.com/1186978"
},
{
"category": "self",
"summary": "SUSE Bug 1186979",
"url": "https://bugzilla.suse.com/1186979"
},
{
"category": "self",
"summary": "SUSE Bug 1186980",
"url": "https://bugzilla.suse.com/1186980"
},
{
"category": "self",
"summary": "SUSE Bug 1186981",
"url": "https://bugzilla.suse.com/1186981"
},
{
"category": "self",
"summary": "SUSE Bug 1186982",
"url": "https://bugzilla.suse.com/1186982"
},
{
"category": "self",
"summary": "SUSE Bug 1186983",
"url": "https://bugzilla.suse.com/1186983"
},
{
"category": "self",
"summary": "SUSE Bug 1186984",
"url": "https://bugzilla.suse.com/1186984"
},
{
"category": "self",
"summary": "SUSE Bug 1186985",
"url": "https://bugzilla.suse.com/1186985"
},
{
"category": "self",
"summary": "SUSE Bug 1186986",
"url": "https://bugzilla.suse.com/1186986"
},
{
"category": "self",
"summary": "SUSE Bug 1186987",
"url": "https://bugzilla.suse.com/1186987"
},
{
"category": "self",
"summary": "SUSE Bug 1186988",
"url": "https://bugzilla.suse.com/1186988"
},
{
"category": "self",
"summary": "SUSE Bug 1186989",
"url": "https://bugzilla.suse.com/1186989"
},
{
"category": "self",
"summary": "SUSE Bug 1186990",
"url": "https://bugzilla.suse.com/1186990"
},
{
"category": "self",
"summary": "SUSE Bug 1186991",
"url": "https://bugzilla.suse.com/1186991"
},
{
"category": "self",
"summary": "SUSE Bug 1186992",
"url": "https://bugzilla.suse.com/1186992"
},
{
"category": "self",
"summary": "SUSE Bug 1186993",
"url": "https://bugzilla.suse.com/1186993"
},
{
"category": "self",
"summary": "SUSE Bug 1186994",
"url": "https://bugzilla.suse.com/1186994"
},
{
"category": "self",
"summary": "SUSE Bug 1186995",
"url": "https://bugzilla.suse.com/1186995"
},
{
"category": "self",
"summary": "SUSE Bug 1186996",
"url": "https://bugzilla.suse.com/1186996"
},
{
"category": "self",
"summary": "SUSE Bug 1186997",
"url": "https://bugzilla.suse.com/1186997"
},
{
"category": "self",
"summary": "SUSE Bug 1186998",
"url": "https://bugzilla.suse.com/1186998"
},
{
"category": "self",
"summary": "SUSE Bug 1186999",
"url": "https://bugzilla.suse.com/1186999"
},
{
"category": "self",
"summary": "SUSE Bug 1187000",
"url": "https://bugzilla.suse.com/1187000"
},
{
"category": "self",
"summary": "SUSE Bug 1187001",
"url": "https://bugzilla.suse.com/1187001"
},
{
"category": "self",
"summary": "SUSE Bug 1187002",
"url": "https://bugzilla.suse.com/1187002"
},
{
"category": "self",
"summary": "SUSE Bug 1187003",
"url": "https://bugzilla.suse.com/1187003"
},
{
"category": "self",
"summary": "SUSE Bug 1187038",
"url": "https://bugzilla.suse.com/1187038"
},
{
"category": "self",
"summary": "SUSE Bug 1187050",
"url": "https://bugzilla.suse.com/1187050"
},
{
"category": "self",
"summary": "SUSE Bug 1187067",
"url": "https://bugzilla.suse.com/1187067"
},
{
"category": "self",
"summary": "SUSE Bug 1187068",
"url": "https://bugzilla.suse.com/1187068"
},
{
"category": "self",
"summary": "SUSE Bug 1187069",
"url": "https://bugzilla.suse.com/1187069"
},
{
"category": "self",
"summary": "SUSE Bug 1187072",
"url": "https://bugzilla.suse.com/1187072"
},
{
"category": "self",
"summary": "SUSE Bug 1187143",
"url": "https://bugzilla.suse.com/1187143"
},
{
"category": "self",
"summary": "SUSE Bug 1187144",
"url": "https://bugzilla.suse.com/1187144"
},
{
"category": "self",
"summary": "SUSE Bug 1187171",
"url": "https://bugzilla.suse.com/1187171"
},
{
"category": "self",
"summary": "SUSE Bug 1187263",
"url": "https://bugzilla.suse.com/1187263"
},
{
"category": "self",
"summary": "SUSE Bug 1187356",
"url": "https://bugzilla.suse.com/1187356"
},
{
"category": "self",
"summary": "SUSE Bug 1187402",
"url": "https://bugzilla.suse.com/1187402"
},
{
"category": "self",
"summary": "SUSE Bug 1187403",
"url": "https://bugzilla.suse.com/1187403"
},
{
"category": "self",
"summary": "SUSE Bug 1187404",
"url": "https://bugzilla.suse.com/1187404"
},
{
"category": "self",
"summary": "SUSE Bug 1187407",
"url": "https://bugzilla.suse.com/1187407"
},
{
"category": "self",
"summary": "SUSE Bug 1187408",
"url": "https://bugzilla.suse.com/1187408"
},
{
"category": "self",
"summary": "SUSE Bug 1187409",
"url": "https://bugzilla.suse.com/1187409"
},
{
"category": "self",
"summary": "SUSE Bug 1187410",
"url": "https://bugzilla.suse.com/1187410"
},
{
"category": "self",
"summary": "SUSE Bug 1187411",
"url": "https://bugzilla.suse.com/1187411"
},
{
"category": "self",
"summary": "SUSE Bug 1187412",
"url": "https://bugzilla.suse.com/1187412"
},
{
"category": "self",
"summary": "SUSE Bug 1187413",
"url": "https://bugzilla.suse.com/1187413"
},
{
"category": "self",
"summary": "SUSE Bug 1187452",
"url": "https://bugzilla.suse.com/1187452"
},
{
"category": "self",
"summary": "SUSE Bug 1187554",
"url": "https://bugzilla.suse.com/1187554"
},
{
"category": "self",
"summary": "SUSE Bug 1187595",
"url": "https://bugzilla.suse.com/1187595"
},
{
"category": "self",
"summary": "SUSE Bug 1187601",
"url": "https://bugzilla.suse.com/1187601"
},
{
"category": "self",
"summary": "SUSE Bug 1187795",
"url": "https://bugzilla.suse.com/1187795"
},
{
"category": "self",
"summary": "SUSE Bug 1187867",
"url": "https://bugzilla.suse.com/1187867"
},
{
"category": "self",
"summary": "SUSE Bug 1187883",
"url": "https://bugzilla.suse.com/1187883"
},
{
"category": "self",
"summary": "SUSE Bug 1187886",
"url": "https://bugzilla.suse.com/1187886"
},
{
"category": "self",
"summary": "SUSE Bug 1187927",
"url": "https://bugzilla.suse.com/1187927"
},
{
"category": "self",
"summary": "SUSE Bug 1187972",
"url": "https://bugzilla.suse.com/1187972"
},
{
"category": "self",
"summary": "SUSE Bug 1187980",
"url": "https://bugzilla.suse.com/1187980"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-26558 page",
"url": "https://www.suse.com/security/cve/CVE-2020-26558/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-36385 page",
"url": "https://www.suse.com/security/cve/CVE-2020-36385/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-36386 page",
"url": "https://www.suse.com/security/cve/CVE-2020-36386/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-0129 page",
"url": "https://www.suse.com/security/cve/CVE-2021-0129/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-0512 page",
"url": "https://www.suse.com/security/cve/CVE-2021-0512/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-0605 page",
"url": "https://www.suse.com/security/cve/CVE-2021-0605/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-33624 page",
"url": "https://www.suse.com/security/cve/CVE-2021-33624/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-34693 page",
"url": "https://www.suse.com/security/cve/CVE-2021-34693/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3573 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3573/"
}
],
"title": "Security update for the Linux Kernel",
"tracking": {
"current_release_date": "2021-07-14T15:07:41Z",
"generator": {
"date": "2021-07-14T15:07:41Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2021:2325-1",
"initial_release_date": "2021-07-14T15:07:41Z",
"revision_history": [
{
"date": "2021-07-14T15:07:41Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-5.3.18-24.70.1.aarch64",
"product": {
"name": "cluster-md-kmp-default-5.3.18-24.70.1.aarch64",
"product_id": "cluster-md-kmp-default-5.3.18-24.70.1.aarch64"
}
},
{
"category": "product_version",
"name": "cluster-md-kmp-preempt-5.3.18-24.70.1.aarch64",
"product": {
"name": "cluster-md-kmp-preempt-5.3.18-24.70.1.aarch64",
"product_id": "cluster-md-kmp-preempt-5.3.18-24.70.1.aarch64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-5.3.18-24.70.1.aarch64",
"product": {
"name": "dlm-kmp-default-5.3.18-24.70.1.aarch64",
"product_id": "dlm-kmp-default-5.3.18-24.70.1.aarch64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-preempt-5.3.18-24.70.1.aarch64",
"product": {
"name": "dlm-kmp-preempt-5.3.18-24.70.1.aarch64",
"product_id": "dlm-kmp-preempt-5.3.18-24.70.1.aarch64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-5.3.18-24.70.1.aarch64",
"product": {
"name": "gfs2-kmp-default-5.3.18-24.70.1.aarch64",
"product_id": "gfs2-kmp-default-5.3.18-24.70.1.aarch64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-preempt-5.3.18-24.70.1.aarch64",
"product": {
"name": "gfs2-kmp-preempt-5.3.18-24.70.1.aarch64",
"product_id": "gfs2-kmp-preempt-5.3.18-24.70.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-5.3.18-24.70.1.aarch64",
"product": {
"name": "kernel-default-5.3.18-24.70.1.aarch64",
"product_id": "kernel-default-5.3.18-24.70.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-5.3.18-24.70.1.9.32.1.aarch64",
"product": {
"name": "kernel-default-base-5.3.18-24.70.1.9.32.1.aarch64",
"product_id": "kernel-default-base-5.3.18-24.70.1.9.32.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-rebuild-5.3.18-24.70.1.9.32.1.aarch64",
"product": {
"name": "kernel-default-base-rebuild-5.3.18-24.70.1.9.32.1.aarch64",
"product_id": "kernel-default-base-rebuild-5.3.18-24.70.1.9.32.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-5.3.18-24.70.1.aarch64",
"product": {
"name": "kernel-default-devel-5.3.18-24.70.1.aarch64",
"product_id": "kernel-default-devel-5.3.18-24.70.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-5.3.18-24.70.1.aarch64",
"product": {
"name": "kernel-default-extra-5.3.18-24.70.1.aarch64",
"product_id": "kernel-default-extra-5.3.18-24.70.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-5.3.18-24.70.1.aarch64",
"product": {
"name": "kernel-default-livepatch-5.3.18-24.70.1.aarch64",
"product_id": "kernel-default-livepatch-5.3.18-24.70.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-devel-5.3.18-24.70.1.aarch64",
"product": {
"name": "kernel-default-livepatch-devel-5.3.18-24.70.1.aarch64",
"product_id": "kernel-default-livepatch-devel-5.3.18-24.70.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-5.3.18-24.70.1.aarch64",
"product": {
"name": "kernel-obs-build-5.3.18-24.70.1.aarch64",
"product_id": "kernel-obs-build-5.3.18-24.70.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-5.3.18-24.70.1.aarch64",
"product": {
"name": "kernel-obs-qa-5.3.18-24.70.1.aarch64",
"product_id": "kernel-obs-qa-5.3.18-24.70.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-preempt-5.3.18-24.70.1.aarch64",
"product": {
"name": "kernel-preempt-5.3.18-24.70.1.aarch64",
"product_id": "kernel-preempt-5.3.18-24.70.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-preempt-devel-5.3.18-24.70.1.aarch64",
"product": {
"name": "kernel-preempt-devel-5.3.18-24.70.1.aarch64",
"product_id": "kernel-preempt-devel-5.3.18-24.70.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-preempt-extra-5.3.18-24.70.1.aarch64",
"product": {
"name": "kernel-preempt-extra-5.3.18-24.70.1.aarch64",
"product_id": "kernel-preempt-extra-5.3.18-24.70.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-preempt-livepatch-devel-5.3.18-24.70.1.aarch64",
"product": {
"name": "kernel-preempt-livepatch-devel-5.3.18-24.70.1.aarch64",
"product_id": "kernel-preempt-livepatch-devel-5.3.18-24.70.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-syms-5.3.18-24.70.1.aarch64",
"product": {
"name": "kernel-syms-5.3.18-24.70.1.aarch64",
"product_id": "kernel-syms-5.3.18-24.70.1.aarch64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-5.3.18-24.70.1.aarch64",
"product": {
"name": "kselftests-kmp-default-5.3.18-24.70.1.aarch64",
"product_id": "kselftests-kmp-default-5.3.18-24.70.1.aarch64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-preempt-5.3.18-24.70.1.aarch64",
"product": {
"name": "kselftests-kmp-preempt-5.3.18-24.70.1.aarch64",
"product_id": "kselftests-kmp-preempt-5.3.18-24.70.1.aarch64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-5.3.18-24.70.1.aarch64",
"product": {
"name": "ocfs2-kmp-default-5.3.18-24.70.1.aarch64",
"product_id": "ocfs2-kmp-default-5.3.18-24.70.1.aarch64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-preempt-5.3.18-24.70.1.aarch64",
"product": {
"name": "ocfs2-kmp-preempt-5.3.18-24.70.1.aarch64",
"product_id": "ocfs2-kmp-preempt-5.3.18-24.70.1.aarch64"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-default-5.3.18-24.70.1.aarch64",
"product": {
"name": "reiserfs-kmp-default-5.3.18-24.70.1.aarch64",
"product_id": "reiserfs-kmp-default-5.3.18-24.70.1.aarch64"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-preempt-5.3.18-24.70.1.aarch64",
"product": {
"name": "reiserfs-kmp-preempt-5.3.18-24.70.1.aarch64",
"product_id": "reiserfs-kmp-preempt-5.3.18-24.70.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-devel-5.3.18-24.70.1.noarch",
"product": {
"name": "kernel-devel-5.3.18-24.70.1.noarch",
"product_id": "kernel-devel-5.3.18-24.70.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-docs-5.3.18-24.70.1.noarch",
"product": {
"name": "kernel-docs-5.3.18-24.70.1.noarch",
"product_id": "kernel-docs-5.3.18-24.70.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-docs-html-5.3.18-24.70.1.noarch",
"product": {
"name": "kernel-docs-html-5.3.18-24.70.1.noarch",
"product_id": "kernel-docs-html-5.3.18-24.70.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-macros-5.3.18-24.70.1.noarch",
"product": {
"name": "kernel-macros-5.3.18-24.70.1.noarch",
"product_id": "kernel-macros-5.3.18-24.70.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-5.3.18-24.70.1.noarch",
"product": {
"name": "kernel-source-5.3.18-24.70.1.noarch",
"product_id": "kernel-source-5.3.18-24.70.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-vanilla-5.3.18-24.70.1.noarch",
"product": {
"name": "kernel-source-vanilla-5.3.18-24.70.1.noarch",
"product_id": "kernel-source-vanilla-5.3.18-24.70.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-5.3.18-24.70.1.ppc64le",
"product": {
"name": "cluster-md-kmp-default-5.3.18-24.70.1.ppc64le",
"product_id": "cluster-md-kmp-default-5.3.18-24.70.1.ppc64le"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-5.3.18-24.70.1.ppc64le",
"product": {
"name": "dlm-kmp-default-5.3.18-24.70.1.ppc64le",
"product_id": "dlm-kmp-default-5.3.18-24.70.1.ppc64le"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-5.3.18-24.70.1.ppc64le",
"product": {
"name": "gfs2-kmp-default-5.3.18-24.70.1.ppc64le",
"product_id": "gfs2-kmp-default-5.3.18-24.70.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-5.3.18-24.70.1.ppc64le",
"product": {
"name": "kernel-debug-5.3.18-24.70.1.ppc64le",
"product_id": "kernel-debug-5.3.18-24.70.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-5.3.18-24.70.1.ppc64le",
"product": {
"name": "kernel-debug-devel-5.3.18-24.70.1.ppc64le",
"product_id": "kernel-debug-devel-5.3.18-24.70.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-livepatch-devel-5.3.18-24.70.1.ppc64le",
"product": {
"name": "kernel-debug-livepatch-devel-5.3.18-24.70.1.ppc64le",
"product_id": "kernel-debug-livepatch-devel-5.3.18-24.70.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-5.3.18-24.70.1.ppc64le",
"product": {
"name": "kernel-default-5.3.18-24.70.1.ppc64le",
"product_id": "kernel-default-5.3.18-24.70.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-base-5.3.18-24.70.1.9.32.1.ppc64le",
"product": {
"name": "kernel-default-base-5.3.18-24.70.1.9.32.1.ppc64le",
"product_id": "kernel-default-base-5.3.18-24.70.1.9.32.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-base-rebuild-5.3.18-24.70.1.9.32.1.ppc64le",
"product": {
"name": "kernel-default-base-rebuild-5.3.18-24.70.1.9.32.1.ppc64le",
"product_id": "kernel-default-base-rebuild-5.3.18-24.70.1.9.32.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-5.3.18-24.70.1.ppc64le",
"product": {
"name": "kernel-default-devel-5.3.18-24.70.1.ppc64le",
"product_id": "kernel-default-devel-5.3.18-24.70.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-5.3.18-24.70.1.ppc64le",
"product": {
"name": "kernel-default-extra-5.3.18-24.70.1.ppc64le",
"product_id": "kernel-default-extra-5.3.18-24.70.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-5.3.18-24.70.1.ppc64le",
"product": {
"name": "kernel-default-livepatch-5.3.18-24.70.1.ppc64le",
"product_id": "kernel-default-livepatch-5.3.18-24.70.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-devel-5.3.18-24.70.1.ppc64le",
"product": {
"name": "kernel-default-livepatch-devel-5.3.18-24.70.1.ppc64le",
"product_id": "kernel-default-livepatch-devel-5.3.18-24.70.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-5.3.18-24.70.1.ppc64le",
"product": {
"name": "kernel-kvmsmall-5.3.18-24.70.1.ppc64le",
"product_id": "kernel-kvmsmall-5.3.18-24.70.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-devel-5.3.18-24.70.1.ppc64le",
"product": {
"name": "kernel-kvmsmall-devel-5.3.18-24.70.1.ppc64le",
"product_id": "kernel-kvmsmall-devel-5.3.18-24.70.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-livepatch-devel-5.3.18-24.70.1.ppc64le",
"product": {
"name": "kernel-kvmsmall-livepatch-devel-5.3.18-24.70.1.ppc64le",
"product_id": "kernel-kvmsmall-livepatch-devel-5.3.18-24.70.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-24_70-default-1-5.3.1.ppc64le",
"product": {
"name": "kernel-livepatch-5_3_18-24_70-default-1-5.3.1.ppc64le",
"product_id": "kernel-livepatch-5_3_18-24_70-default-1-5.3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-5.3.18-24.70.1.ppc64le",
"product": {
"name": "kernel-obs-build-5.3.18-24.70.1.ppc64le",
"product_id": "kernel-obs-build-5.3.18-24.70.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-5.3.18-24.70.1.ppc64le",
"product": {
"name": "kernel-obs-qa-5.3.18-24.70.1.ppc64le",
"product_id": "kernel-obs-qa-5.3.18-24.70.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-syms-5.3.18-24.70.1.ppc64le",
"product": {
"name": "kernel-syms-5.3.18-24.70.1.ppc64le",
"product_id": "kernel-syms-5.3.18-24.70.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-5.3.18-24.70.1.ppc64le",
"product": {
"name": "kselftests-kmp-default-5.3.18-24.70.1.ppc64le",
"product_id": "kselftests-kmp-default-5.3.18-24.70.1.ppc64le"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-5.3.18-24.70.1.ppc64le",
"product": {
"name": "ocfs2-kmp-default-5.3.18-24.70.1.ppc64le",
"product_id": "ocfs2-kmp-default-5.3.18-24.70.1.ppc64le"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-default-5.3.18-24.70.1.ppc64le",
"product": {
"name": "reiserfs-kmp-default-5.3.18-24.70.1.ppc64le",
"product_id": "reiserfs-kmp-default-5.3.18-24.70.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-5.3.18-24.70.1.s390x",
"product": {
"name": "cluster-md-kmp-default-5.3.18-24.70.1.s390x",
"product_id": "cluster-md-kmp-default-5.3.18-24.70.1.s390x"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-5.3.18-24.70.1.s390x",
"product": {
"name": "dlm-kmp-default-5.3.18-24.70.1.s390x",
"product_id": "dlm-kmp-default-5.3.18-24.70.1.s390x"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-5.3.18-24.70.1.s390x",
"product": {
"name": "gfs2-kmp-default-5.3.18-24.70.1.s390x",
"product_id": "gfs2-kmp-default-5.3.18-24.70.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-5.3.18-24.70.1.s390x",
"product": {
"name": "kernel-default-5.3.18-24.70.1.s390x",
"product_id": "kernel-default-5.3.18-24.70.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-base-5.3.18-24.70.1.9.32.1.s390x",
"product": {
"name": "kernel-default-base-5.3.18-24.70.1.9.32.1.s390x",
"product_id": "kernel-default-base-5.3.18-24.70.1.9.32.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-base-rebuild-5.3.18-24.70.1.9.32.1.s390x",
"product": {
"name": "kernel-default-base-rebuild-5.3.18-24.70.1.9.32.1.s390x",
"product_id": "kernel-default-base-rebuild-5.3.18-24.70.1.9.32.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-5.3.18-24.70.1.s390x",
"product": {
"name": "kernel-default-devel-5.3.18-24.70.1.s390x",
"product_id": "kernel-default-devel-5.3.18-24.70.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-5.3.18-24.70.1.s390x",
"product": {
"name": "kernel-default-extra-5.3.18-24.70.1.s390x",
"product_id": "kernel-default-extra-5.3.18-24.70.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-5.3.18-24.70.1.s390x",
"product": {
"name": "kernel-default-livepatch-5.3.18-24.70.1.s390x",
"product_id": "kernel-default-livepatch-5.3.18-24.70.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-devel-5.3.18-24.70.1.s390x",
"product": {
"name": "kernel-default-livepatch-devel-5.3.18-24.70.1.s390x",
"product_id": "kernel-default-livepatch-devel-5.3.18-24.70.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-24_70-default-1-5.3.1.s390x",
"product": {
"name": "kernel-livepatch-5_3_18-24_70-default-1-5.3.1.s390x",
"product_id": "kernel-livepatch-5_3_18-24_70-default-1-5.3.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-5.3.18-24.70.1.s390x",
"product": {
"name": "kernel-obs-build-5.3.18-24.70.1.s390x",
"product_id": "kernel-obs-build-5.3.18-24.70.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-5.3.18-24.70.1.s390x",
"product": {
"name": "kernel-obs-qa-5.3.18-24.70.1.s390x",
"product_id": "kernel-obs-qa-5.3.18-24.70.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-syms-5.3.18-24.70.1.s390x",
"product": {
"name": "kernel-syms-5.3.18-24.70.1.s390x",
"product_id": "kernel-syms-5.3.18-24.70.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-5.3.18-24.70.1.s390x",
"product": {
"name": "kernel-zfcpdump-5.3.18-24.70.1.s390x",
"product_id": "kernel-zfcpdump-5.3.18-24.70.1.s390x"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-5.3.18-24.70.1.s390x",
"product": {
"name": "kselftests-kmp-default-5.3.18-24.70.1.s390x",
"product_id": "kselftests-kmp-default-5.3.18-24.70.1.s390x"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-5.3.18-24.70.1.s390x",
"product": {
"name": "ocfs2-kmp-default-5.3.18-24.70.1.s390x",
"product_id": "ocfs2-kmp-default-5.3.18-24.70.1.s390x"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-default-5.3.18-24.70.1.s390x",
"product": {
"name": "reiserfs-kmp-default-5.3.18-24.70.1.s390x",
"product_id": "reiserfs-kmp-default-5.3.18-24.70.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-5.3.18-24.70.1.x86_64",
"product": {
"name": "cluster-md-kmp-default-5.3.18-24.70.1.x86_64",
"product_id": "cluster-md-kmp-default-5.3.18-24.70.1.x86_64"
}
},
{
"category": "product_version",
"name": "cluster-md-kmp-preempt-5.3.18-24.70.1.x86_64",
"product": {
"name": "cluster-md-kmp-preempt-5.3.18-24.70.1.x86_64",
"product_id": "cluster-md-kmp-preempt-5.3.18-24.70.1.x86_64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-5.3.18-24.70.1.x86_64",
"product": {
"name": "dlm-kmp-default-5.3.18-24.70.1.x86_64",
"product_id": "dlm-kmp-default-5.3.18-24.70.1.x86_64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-preempt-5.3.18-24.70.1.x86_64",
"product": {
"name": "dlm-kmp-preempt-5.3.18-24.70.1.x86_64",
"product_id": "dlm-kmp-preempt-5.3.18-24.70.1.x86_64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-5.3.18-24.70.1.x86_64",
"product": {
"name": "gfs2-kmp-default-5.3.18-24.70.1.x86_64",
"product_id": "gfs2-kmp-default-5.3.18-24.70.1.x86_64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-preempt-5.3.18-24.70.1.x86_64",
"product": {
"name": "gfs2-kmp-preempt-5.3.18-24.70.1.x86_64",
"product_id": "gfs2-kmp-preempt-5.3.18-24.70.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-5.3.18-24.70.1.x86_64",
"product": {
"name": "kernel-debug-5.3.18-24.70.1.x86_64",
"product_id": "kernel-debug-5.3.18-24.70.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-5.3.18-24.70.1.x86_64",
"product": {
"name": "kernel-debug-devel-5.3.18-24.70.1.x86_64",
"product_id": "kernel-debug-devel-5.3.18-24.70.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-livepatch-devel-5.3.18-24.70.1.x86_64",
"product": {
"name": "kernel-debug-livepatch-devel-5.3.18-24.70.1.x86_64",
"product_id": "kernel-debug-livepatch-devel-5.3.18-24.70.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-5.3.18-24.70.1.x86_64",
"product": {
"name": "kernel-default-5.3.18-24.70.1.x86_64",
"product_id": "kernel-default-5.3.18-24.70.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-5.3.18-24.70.1.9.32.1.x86_64",
"product": {
"name": "kernel-default-base-5.3.18-24.70.1.9.32.1.x86_64",
"product_id": "kernel-default-base-5.3.18-24.70.1.9.32.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-rebuild-5.3.18-24.70.1.9.32.1.x86_64",
"product": {
"name": "kernel-default-base-rebuild-5.3.18-24.70.1.9.32.1.x86_64",
"product_id": "kernel-default-base-rebuild-5.3.18-24.70.1.9.32.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-5.3.18-24.70.1.x86_64",
"product": {
"name": "kernel-default-devel-5.3.18-24.70.1.x86_64",
"product_id": "kernel-default-devel-5.3.18-24.70.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-5.3.18-24.70.1.x86_64",
"product": {
"name": "kernel-default-extra-5.3.18-24.70.1.x86_64",
"product_id": "kernel-default-extra-5.3.18-24.70.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-5.3.18-24.70.1.x86_64",
"product": {
"name": "kernel-default-livepatch-5.3.18-24.70.1.x86_64",
"product_id": "kernel-default-livepatch-5.3.18-24.70.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-devel-5.3.18-24.70.1.x86_64",
"product": {
"name": "kernel-default-livepatch-devel-5.3.18-24.70.1.x86_64",
"product_id": "kernel-default-livepatch-devel-5.3.18-24.70.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-5.3.18-24.70.1.x86_64",
"product": {
"name": "kernel-kvmsmall-5.3.18-24.70.1.x86_64",
"product_id": "kernel-kvmsmall-5.3.18-24.70.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-devel-5.3.18-24.70.1.x86_64",
"product": {
"name": "kernel-kvmsmall-devel-5.3.18-24.70.1.x86_64",
"product_id": "kernel-kvmsmall-devel-5.3.18-24.70.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-livepatch-devel-5.3.18-24.70.1.x86_64",
"product": {
"name": "kernel-kvmsmall-livepatch-devel-5.3.18-24.70.1.x86_64",
"product_id": "kernel-kvmsmall-livepatch-devel-5.3.18-24.70.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-24_70-default-1-5.3.1.x86_64",
"product": {
"name": "kernel-livepatch-5_3_18-24_70-default-1-5.3.1.x86_64",
"product_id": "kernel-livepatch-5_3_18-24_70-default-1-5.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-24_70-preempt-1-5.3.1.x86_64",
"product": {
"name": "kernel-livepatch-5_3_18-24_70-preempt-1-5.3.1.x86_64",
"product_id": "kernel-livepatch-5_3_18-24_70-preempt-1-5.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-5.3.18-24.70.1.x86_64",
"product": {
"name": "kernel-obs-build-5.3.18-24.70.1.x86_64",
"product_id": "kernel-obs-build-5.3.18-24.70.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-5.3.18-24.70.1.x86_64",
"product": {
"name": "kernel-obs-qa-5.3.18-24.70.1.x86_64",
"product_id": "kernel-obs-qa-5.3.18-24.70.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-preempt-5.3.18-24.70.1.x86_64",
"product": {
"name": "kernel-preempt-5.3.18-24.70.1.x86_64",
"product_id": "kernel-preempt-5.3.18-24.70.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-preempt-devel-5.3.18-24.70.1.x86_64",
"product": {
"name": "kernel-preempt-devel-5.3.18-24.70.1.x86_64",
"product_id": "kernel-preempt-devel-5.3.18-24.70.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-preempt-extra-5.3.18-24.70.1.x86_64",
"product": {
"name": "kernel-preempt-extra-5.3.18-24.70.1.x86_64",
"product_id": "kernel-preempt-extra-5.3.18-24.70.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-preempt-livepatch-devel-5.3.18-24.70.1.x86_64",
"product": {
"name": "kernel-preempt-livepatch-devel-5.3.18-24.70.1.x86_64",
"product_id": "kernel-preempt-livepatch-devel-5.3.18-24.70.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-syms-5.3.18-24.70.1.x86_64",
"product": {
"name": "kernel-syms-5.3.18-24.70.1.x86_64",
"product_id": "kernel-syms-5.3.18-24.70.1.x86_64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-5.3.18-24.70.1.x86_64",
"product": {
"name": "kselftests-kmp-default-5.3.18-24.70.1.x86_64",
"product_id": "kselftests-kmp-default-5.3.18-24.70.1.x86_64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-preempt-5.3.18-24.70.1.x86_64",
"product": {
"name": "kselftests-kmp-preempt-5.3.18-24.70.1.x86_64",
"product_id": "kselftests-kmp-preempt-5.3.18-24.70.1.x86_64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-5.3.18-24.70.1.x86_64",
"product": {
"name": "ocfs2-kmp-default-5.3.18-24.70.1.x86_64",
"product_id": "ocfs2-kmp-default-5.3.18-24.70.1.x86_64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-preempt-5.3.18-24.70.1.x86_64",
"product": {
"name": "ocfs2-kmp-preempt-5.3.18-24.70.1.x86_64",
"product_id": "ocfs2-kmp-preempt-5.3.18-24.70.1.x86_64"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-default-5.3.18-24.70.1.x86_64",
"product": {
"name": "reiserfs-kmp-default-5.3.18-24.70.1.x86_64",
"product_id": "reiserfs-kmp-default-5.3.18-24.70.1.x86_64"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-preempt-5.3.18-24.70.1.x86_64",
"product": {
"name": "reiserfs-kmp-preempt-5.3.18-24.70.1.x86_64",
"product_id": "reiserfs-kmp-preempt-5.3.18-24.70.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Basesystem 15 SP2",
"product": {
"name": "SUSE Linux Enterprise Module for Basesystem 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP2",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-basesystem:15:sp2"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Development Tools 15 SP2",
"product": {
"name": "SUSE Linux Enterprise Module for Development Tools 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP2",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-development-tools:15:sp2"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Legacy 15 SP2",
"product": {
"name": "SUSE Linux Enterprise Module for Legacy 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Legacy 15 SP2",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-legacy:15:sp2"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 15 SP2",
"product": {
"name": "SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-live-patching:15:sp2"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Availability Extension 15 SP2",
"product": {
"name": "SUSE Linux Enterprise High Availability Extension 15 SP2",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-ha:15:sp2"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Workstation Extension 15 SP2",
"product": {
"name": "SUSE Linux Enterprise Workstation Extension 15 SP2",
"product_id": "SUSE Linux Enterprise Workstation Extension 15 SP2",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-we:15:sp2"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Micro 5.0",
"product": {
"name": "SUSE Linux Enterprise Micro 5.0",
"product_id": "SUSE Linux Enterprise Micro 5.0",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse-microos:5.0"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.3.18-24.70.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.70.1.aarch64"
},
"product_reference": "kernel-default-5.3.18-24.70.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.3.18-24.70.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.70.1.ppc64le"
},
"product_reference": "kernel-default-5.3.18-24.70.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.3.18-24.70.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.70.1.s390x"
},
"product_reference": "kernel-default-5.3.18-24.70.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.3.18-24.70.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.70.1.x86_64"
},
"product_reference": "kernel-default-5.3.18-24.70.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-5.3.18-24.70.1.9.32.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.70.1.9.32.1.aarch64"
},
"product_reference": "kernel-default-base-5.3.18-24.70.1.9.32.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-5.3.18-24.70.1.9.32.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.70.1.9.32.1.ppc64le"
},
"product_reference": "kernel-default-base-5.3.18-24.70.1.9.32.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-5.3.18-24.70.1.9.32.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.70.1.9.32.1.s390x"
},
"product_reference": "kernel-default-base-5.3.18-24.70.1.9.32.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-5.3.18-24.70.1.9.32.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.70.1.9.32.1.x86_64"
},
"product_reference": "kernel-default-base-5.3.18-24.70.1.9.32.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-5.3.18-24.70.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.70.1.aarch64"
},
"product_reference": "kernel-default-devel-5.3.18-24.70.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-5.3.18-24.70.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.70.1.ppc64le"
},
"product_reference": "kernel-default-devel-5.3.18-24.70.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-5.3.18-24.70.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.70.1.s390x"
},
"product_reference": "kernel-default-devel-5.3.18-24.70.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-5.3.18-24.70.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.70.1.x86_64"
},
"product_reference": "kernel-default-devel-5.3.18-24.70.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-5.3.18-24.70.1.noarch as component of SUSE Linux Enterprise Module for Basesystem 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.70.1.noarch"
},
"product_reference": "kernel-devel-5.3.18-24.70.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-5.3.18-24.70.1.noarch as component of SUSE Linux Enterprise Module for Basesystem 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.70.1.noarch"
},
"product_reference": "kernel-macros-5.3.18-24.70.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-preempt-5.3.18-24.70.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.70.1.aarch64"
},
"product_reference": "kernel-preempt-5.3.18-24.70.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-preempt-5.3.18-24.70.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.70.1.x86_64"
},
"product_reference": "kernel-preempt-5.3.18-24.70.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-docs-5.3.18-24.70.1.noarch as component of SUSE Linux Enterprise Module for Development Tools 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.70.1.noarch"
},
"product_reference": "kernel-docs-5.3.18-24.70.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-5.3.18-24.70.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.70.1.aarch64"
},
"product_reference": "kernel-obs-build-5.3.18-24.70.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-5.3.18-24.70.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.70.1.ppc64le"
},
"product_reference": "kernel-obs-build-5.3.18-24.70.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-5.3.18-24.70.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.70.1.s390x"
},
"product_reference": "kernel-obs-build-5.3.18-24.70.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-5.3.18-24.70.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.70.1.x86_64"
},
"product_reference": "kernel-obs-build-5.3.18-24.70.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-preempt-devel-5.3.18-24.70.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.70.1.aarch64"
},
"product_reference": "kernel-preempt-devel-5.3.18-24.70.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-preempt-devel-5.3.18-24.70.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.70.1.x86_64"
},
"product_reference": "kernel-preempt-devel-5.3.18-24.70.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-5.3.18-24.70.1.noarch as component of SUSE Linux Enterprise Module for Development Tools 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.70.1.noarch"
},
"product_reference": "kernel-source-5.3.18-24.70.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-5.3.18-24.70.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.70.1.aarch64"
},
"product_reference": "kernel-syms-5.3.18-24.70.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-5.3.18-24.70.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.70.1.ppc64le"
},
"product_reference": "kernel-syms-5.3.18-24.70.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-5.3.18-24.70.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.70.1.s390x"
},
"product_reference": "kernel-syms-5.3.18-24.70.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-5.3.18-24.70.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.70.1.x86_64"
},
"product_reference": "kernel-syms-5.3.18-24.70.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-5.3.18-24.70.1.aarch64 as component of SUSE Linux Enterprise Module for Legacy 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.70.1.aarch64"
},
"product_reference": "reiserfs-kmp-default-5.3.18-24.70.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-5.3.18-24.70.1.ppc64le as component of SUSE Linux Enterprise Module for Legacy 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.70.1.ppc64le"
},
"product_reference": "reiserfs-kmp-default-5.3.18-24.70.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-5.3.18-24.70.1.s390x as component of SUSE Linux Enterprise Module for Legacy 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.70.1.s390x"
},
"product_reference": "reiserfs-kmp-default-5.3.18-24.70.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-5.3.18-24.70.1.x86_64 as component of SUSE Linux Enterprise Module for Legacy 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.70.1.x86_64"
},
"product_reference": "reiserfs-kmp-default-5.3.18-24.70.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-5.3.18-24.70.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.70.1.ppc64le"
},
"product_reference": "kernel-default-livepatch-5.3.18-24.70.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-5.3.18-24.70.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.70.1.s390x"
},
"product_reference": "kernel-default-livepatch-5.3.18-24.70.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-5.3.18-24.70.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.70.1.x86_64"
},
"product_reference": "kernel-default-livepatch-5.3.18-24.70.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-devel-5.3.18-24.70.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.70.1.ppc64le"
},
"product_reference": "kernel-default-livepatch-devel-5.3.18-24.70.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-devel-5.3.18-24.70.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.70.1.s390x"
},
"product_reference": "kernel-default-livepatch-devel-5.3.18-24.70.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-devel-5.3.18-24.70.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.70.1.x86_64"
},
"product_reference": "kernel-default-livepatch-devel-5.3.18-24.70.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_70-default-1-5.3.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_70-default-1-5.3.1.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_70-default-1-5.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_70-default-1-5.3.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_70-default-1-5.3.1.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_70-default-1-5.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_70-default-1-5.3.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_70-default-1-5.3.1.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_70-default-1-5.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-5.3.18-24.70.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP2",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.70.1.aarch64"
},
"product_reference": "cluster-md-kmp-default-5.3.18-24.70.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-5.3.18-24.70.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP2",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.70.1.ppc64le"
},
"product_reference": "cluster-md-kmp-default-5.3.18-24.70.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-5.3.18-24.70.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP2",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.70.1.s390x"
},
"product_reference": "cluster-md-kmp-default-5.3.18-24.70.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-5.3.18-24.70.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP2",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.70.1.x86_64"
},
"product_reference": "cluster-md-kmp-default-5.3.18-24.70.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-5.3.18-24.70.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP2",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.70.1.aarch64"
},
"product_reference": "dlm-kmp-default-5.3.18-24.70.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-5.3.18-24.70.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP2",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.70.1.ppc64le"
},
"product_reference": "dlm-kmp-default-5.3.18-24.70.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-5.3.18-24.70.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP2",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.70.1.s390x"
},
"product_reference": "dlm-kmp-default-5.3.18-24.70.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-5.3.18-24.70.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP2",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.70.1.x86_64"
},
"product_reference": "dlm-kmp-default-5.3.18-24.70.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-5.3.18-24.70.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP2",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.70.1.aarch64"
},
"product_reference": "gfs2-kmp-default-5.3.18-24.70.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-5.3.18-24.70.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP2",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.70.1.ppc64le"
},
"product_reference": "gfs2-kmp-default-5.3.18-24.70.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-5.3.18-24.70.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP2",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.70.1.s390x"
},
"product_reference": "gfs2-kmp-default-5.3.18-24.70.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-5.3.18-24.70.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP2",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.70.1.x86_64"
},
"product_reference": "gfs2-kmp-default-5.3.18-24.70.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-5.3.18-24.70.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP2",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.70.1.aarch64"
},
"product_reference": "ocfs2-kmp-default-5.3.18-24.70.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-5.3.18-24.70.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP2",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.70.1.ppc64le"
},
"product_reference": "ocfs2-kmp-default-5.3.18-24.70.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-5.3.18-24.70.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP2",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.70.1.s390x"
},
"product_reference": "ocfs2-kmp-default-5.3.18-24.70.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-5.3.18-24.70.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP2",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.70.1.x86_64"
},
"product_reference": "ocfs2-kmp-default-5.3.18-24.70.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-extra-5.3.18-24.70.1.x86_64 as component of SUSE Linux Enterprise Workstation Extension 15 SP2",
"product_id": "SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.70.1.x86_64"
},
"product_reference": "kernel-default-extra-5.3.18-24.70.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Workstation Extension 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-preempt-extra-5.3.18-24.70.1.x86_64 as component of SUSE Linux Enterprise Workstation Extension 15 SP2",
"product_id": "SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-preempt-extra-5.3.18-24.70.1.x86_64"
},
"product_reference": "kernel-preempt-extra-5.3.18-24.70.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Workstation Extension 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.3.18-24.70.1.aarch64 as component of SUSE Linux Enterprise Micro 5.0",
"product_id": "SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.70.1.aarch64"
},
"product_reference": "kernel-default-5.3.18-24.70.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.3.18-24.70.1.x86_64 as component of SUSE Linux Enterprise Micro 5.0",
"product_id": "SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.70.1.x86_64"
},
"product_reference": "kernel-default-5.3.18-24.70.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-5.3.18-24.70.1.9.32.1.aarch64 as component of SUSE Linux Enterprise Micro 5.0",
"product_id": "SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.70.1.9.32.1.aarch64"
},
"product_reference": "kernel-default-base-5.3.18-24.70.1.9.32.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-5.3.18-24.70.1.9.32.1.x86_64 as component of SUSE Linux Enterprise Micro 5.0",
"product_id": "SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.70.1.9.32.1.x86_64"
},
"product_reference": "kernel-default-base-5.3.18-24.70.1.9.32.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.0"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2020-26558",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-26558"
}
],
"notes": [
{
"category": "general",
"text": "Bluetooth LE and BR/EDR secure pairing in Bluetooth Core Specification 2.1 through 5.2 may permit a nearby man-in-the-middle attacker to identify the Passkey used during pairing (in the Passkey authentication procedure) by reflection of the public key and the authentication evidence of the initiating device, potentially permitting this attacker to complete authenticated pairing with the responding device using the correct Passkey for the pairing session. The attack methodology determines the Passkey value one bit at a time.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.70.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.70.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.70.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.70.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.70.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.70.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.70.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.70.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.70.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.70.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.70.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.70.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.70.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.70.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.70.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.70.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_70-default-1-5.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_70-default-1-5.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_70-default-1-5.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.70.1.aarch64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.70.1.9.32.1.aarch64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.70.1.9.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.70.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.70.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.70.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.70.1.9.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.70.1.9.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.70.1.9.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.70.1.9.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.70.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.70.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.70.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.70.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.70.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.70.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.70.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.70.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.70.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.70.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.70.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.70.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.70.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.70.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.70.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.70.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.70.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.70.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-preempt-extra-5.3.18-24.70.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-26558",
"url": "https://www.suse.com/security/cve/CVE-2020-26558"
},
{
"category": "external",
"summary": "SUSE Bug 1179610 for CVE-2020-26558",
"url": "https://bugzilla.suse.com/1179610"
},
{
"category": "external",
"summary": "SUSE Bug 1186463 for CVE-2020-26558",
"url": "https://bugzilla.suse.com/1186463"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.70.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.70.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.70.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.70.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.70.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.70.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.70.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.70.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.70.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.70.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.70.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.70.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.70.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.70.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.70.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.70.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_70-default-1-5.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_70-default-1-5.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_70-default-1-5.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.70.1.aarch64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.70.1.9.32.1.aarch64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.70.1.9.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.70.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.70.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.70.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.70.1.9.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.70.1.9.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.70.1.9.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.70.1.9.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.70.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.70.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.70.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.70.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.70.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.70.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.70.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.70.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.70.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.70.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.70.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.70.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.70.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.70.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.70.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.70.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.70.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.70.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-preempt-extra-5.3.18-24.70.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.70.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.70.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.70.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.70.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.70.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.70.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.70.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.70.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.70.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.70.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.70.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.70.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.70.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.70.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.70.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.70.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_70-default-1-5.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_70-default-1-5.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_70-default-1-5.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.70.1.aarch64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.70.1.9.32.1.aarch64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.70.1.9.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.70.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.70.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.70.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.70.1.9.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.70.1.9.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.70.1.9.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.70.1.9.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.70.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.70.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.70.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.70.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.70.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.70.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.70.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.70.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.70.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.70.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.70.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.70.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.70.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.70.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.70.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.70.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.70.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.70.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-preempt-extra-5.3.18-24.70.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-14T15:07:41Z",
"details": "moderate"
}
],
"title": "CVE-2020-26558"
},
{
"cve": "CVE-2020-36385",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-36385"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel before 5.10. drivers/infiniband/core/ucma.c has a use-after-free because the ctx is reached via the ctx_list in some ucma_migrate_id situations where ucma_close is called, aka CID-f5449e74802c.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.70.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.70.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.70.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.70.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.70.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.70.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.70.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.70.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.70.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.70.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.70.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.70.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.70.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.70.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.70.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.70.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_70-default-1-5.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_70-default-1-5.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_70-default-1-5.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.70.1.aarch64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.70.1.9.32.1.aarch64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.70.1.9.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.70.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.70.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.70.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.70.1.9.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.70.1.9.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.70.1.9.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.70.1.9.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.70.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.70.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.70.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.70.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.70.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.70.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.70.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.70.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.70.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.70.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.70.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.70.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.70.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.70.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.70.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.70.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.70.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.70.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-preempt-extra-5.3.18-24.70.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-36385",
"url": "https://www.suse.com/security/cve/CVE-2020-36385"
},
{
"category": "external",
"summary": "SUSE Bug 1187050 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1187050"
},
{
"category": "external",
"summary": "SUSE Bug 1187052 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1187052"
},
{
"category": "external",
"summary": "SUSE Bug 1189302 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1189302"
},
{
"category": "external",
"summary": "SUSE Bug 1196174 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1196174"
},
{
"category": "external",
"summary": "SUSE Bug 1196810 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1196810"
},
{
"category": "external",
"summary": "SUSE Bug 1196914 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1196914"
},
{
"category": "external",
"summary": "SUSE Bug 1200084 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1200084"
},
{
"category": "external",
"summary": "SUSE Bug 1201734 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1201734"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.70.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.70.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.70.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.70.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.70.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.70.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.70.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.70.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.70.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.70.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.70.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.70.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.70.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.70.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.70.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.70.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_70-default-1-5.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_70-default-1-5.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_70-default-1-5.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.70.1.aarch64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.70.1.9.32.1.aarch64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.70.1.9.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.70.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.70.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.70.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.70.1.9.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.70.1.9.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.70.1.9.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.70.1.9.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.70.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.70.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.70.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.70.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.70.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.70.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.70.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.70.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.70.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.70.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.70.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.70.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.70.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.70.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.70.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.70.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.70.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.70.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-preempt-extra-5.3.18-24.70.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.70.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.70.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.70.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.70.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.70.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.70.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.70.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.70.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.70.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.70.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.70.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.70.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.70.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.70.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.70.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.70.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_70-default-1-5.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_70-default-1-5.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_70-default-1-5.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.70.1.aarch64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.70.1.9.32.1.aarch64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.70.1.9.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.70.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.70.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.70.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.70.1.9.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.70.1.9.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.70.1.9.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.70.1.9.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.70.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.70.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.70.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.70.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.70.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.70.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.70.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.70.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.70.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.70.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.70.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.70.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.70.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.70.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.70.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.70.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.70.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.70.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-preempt-extra-5.3.18-24.70.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-14T15:07:41Z",
"details": "important"
}
],
"title": "CVE-2020-36385"
},
{
"cve": "CVE-2020-36386",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-36386"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel before 5.8.1. net/bluetooth/hci_event.c has a slab out-of-bounds read in hci_extended_inquiry_result_evt, aka CID-51c19bf3d5cf.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.70.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.70.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.70.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.70.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.70.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.70.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.70.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.70.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.70.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.70.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.70.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.70.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.70.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.70.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.70.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.70.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_70-default-1-5.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_70-default-1-5.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_70-default-1-5.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.70.1.aarch64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.70.1.9.32.1.aarch64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.70.1.9.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.70.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.70.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.70.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.70.1.9.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.70.1.9.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.70.1.9.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.70.1.9.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.70.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.70.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.70.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.70.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.70.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.70.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.70.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.70.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.70.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.70.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.70.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.70.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.70.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.70.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.70.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.70.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.70.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.70.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-preempt-extra-5.3.18-24.70.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-36386",
"url": "https://www.suse.com/security/cve/CVE-2020-36386"
},
{
"category": "external",
"summary": "SUSE Bug 1187038 for CVE-2020-36386",
"url": "https://bugzilla.suse.com/1187038"
},
{
"category": "external",
"summary": "SUSE Bug 1192868 for CVE-2020-36386",
"url": "https://bugzilla.suse.com/1192868"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.70.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.70.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.70.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.70.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.70.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.70.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.70.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.70.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.70.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.70.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.70.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.70.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.70.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.70.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.70.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.70.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_70-default-1-5.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_70-default-1-5.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_70-default-1-5.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.70.1.aarch64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.70.1.9.32.1.aarch64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.70.1.9.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.70.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.70.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.70.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.70.1.9.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.70.1.9.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.70.1.9.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.70.1.9.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.70.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.70.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.70.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.70.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.70.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.70.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.70.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.70.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.70.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.70.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.70.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.70.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.70.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.70.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.70.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.70.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.70.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.70.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-preempt-extra-5.3.18-24.70.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.70.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.70.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.70.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.70.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.70.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.70.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.70.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.70.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.70.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.70.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.70.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.70.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.70.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.70.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.70.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.70.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_70-default-1-5.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_70-default-1-5.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_70-default-1-5.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.70.1.aarch64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.70.1.9.32.1.aarch64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.70.1.9.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.70.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.70.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.70.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.70.1.9.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.70.1.9.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.70.1.9.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.70.1.9.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.70.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.70.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.70.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.70.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.70.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.70.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.70.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.70.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.70.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.70.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.70.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.70.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.70.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.70.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.70.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.70.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.70.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.70.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-preempt-extra-5.3.18-24.70.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-14T15:07:41Z",
"details": "moderate"
}
],
"title": "CVE-2020-36386"
},
{
"cve": "CVE-2021-0129",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-0129"
}
],
"notes": [
{
"category": "general",
"text": "Improper access control in BlueZ may allow an authenticated user to potentially enable information disclosure via adjacent access.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.70.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.70.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.70.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.70.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.70.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.70.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.70.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.70.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.70.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.70.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.70.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.70.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.70.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.70.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.70.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.70.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_70-default-1-5.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_70-default-1-5.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_70-default-1-5.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.70.1.aarch64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.70.1.9.32.1.aarch64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.70.1.9.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.70.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.70.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.70.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.70.1.9.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.70.1.9.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.70.1.9.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.70.1.9.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.70.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.70.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.70.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.70.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.70.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.70.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.70.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.70.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.70.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.70.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.70.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.70.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.70.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.70.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.70.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.70.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.70.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.70.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-preempt-extra-5.3.18-24.70.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-0129",
"url": "https://www.suse.com/security/cve/CVE-2021-0129"
},
{
"category": "external",
"summary": "SUSE Bug 1186463 for CVE-2021-0129",
"url": "https://bugzilla.suse.com/1186463"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.70.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.70.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.70.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.70.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.70.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.70.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.70.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.70.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.70.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.70.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.70.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.70.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.70.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.70.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.70.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.70.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_70-default-1-5.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_70-default-1-5.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_70-default-1-5.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.70.1.aarch64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.70.1.9.32.1.aarch64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.70.1.9.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.70.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.70.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.70.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.70.1.9.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.70.1.9.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.70.1.9.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.70.1.9.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.70.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.70.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.70.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.70.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.70.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.70.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.70.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.70.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.70.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.70.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.70.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.70.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.70.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.70.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.70.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.70.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.70.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.70.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-preempt-extra-5.3.18-24.70.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.70.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.70.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.70.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.70.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.70.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.70.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.70.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.70.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.70.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.70.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.70.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.70.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.70.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.70.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.70.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.70.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_70-default-1-5.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_70-default-1-5.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_70-default-1-5.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.70.1.aarch64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.70.1.9.32.1.aarch64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.70.1.9.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.70.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.70.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.70.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.70.1.9.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.70.1.9.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.70.1.9.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.70.1.9.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.70.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.70.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.70.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.70.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.70.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.70.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.70.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.70.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.70.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.70.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.70.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.70.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.70.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.70.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.70.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.70.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.70.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.70.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-preempt-extra-5.3.18-24.70.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-14T15:07:41Z",
"details": "moderate"
}
],
"title": "CVE-2021-0129"
},
{
"cve": "CVE-2021-0512",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-0512"
}
],
"notes": [
{
"category": "general",
"text": "In __hidinput_change_resolution_multipliers of hid-input.c, there is a possible out of bounds write due to a heap buffer overflow. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-173843328References: Upstream kernel",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.70.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.70.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.70.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.70.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.70.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.70.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.70.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.70.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.70.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.70.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.70.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.70.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.70.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.70.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.70.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.70.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_70-default-1-5.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_70-default-1-5.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_70-default-1-5.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.70.1.aarch64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.70.1.9.32.1.aarch64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.70.1.9.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.70.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.70.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.70.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.70.1.9.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.70.1.9.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.70.1.9.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.70.1.9.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.70.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.70.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.70.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.70.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.70.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.70.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.70.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.70.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.70.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.70.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.70.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.70.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.70.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.70.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.70.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.70.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.70.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.70.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-preempt-extra-5.3.18-24.70.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-0512",
"url": "https://www.suse.com/security/cve/CVE-2021-0512"
},
{
"category": "external",
"summary": "SUSE Bug 1187595 for CVE-2021-0512",
"url": "https://bugzilla.suse.com/1187595"
},
{
"category": "external",
"summary": "SUSE Bug 1187597 for CVE-2021-0512",
"url": "https://bugzilla.suse.com/1187597"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.70.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.70.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.70.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.70.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.70.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.70.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.70.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.70.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.70.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.70.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.70.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.70.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.70.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.70.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.70.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.70.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_70-default-1-5.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_70-default-1-5.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_70-default-1-5.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.70.1.aarch64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.70.1.9.32.1.aarch64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.70.1.9.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.70.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.70.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.70.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.70.1.9.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.70.1.9.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.70.1.9.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.70.1.9.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.70.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.70.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.70.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.70.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.70.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.70.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.70.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.70.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.70.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.70.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.70.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.70.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.70.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.70.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.70.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.70.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.70.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.70.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-preempt-extra-5.3.18-24.70.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.70.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.70.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.70.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.70.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.70.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.70.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.70.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.70.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.70.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.70.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.70.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.70.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.70.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.70.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.70.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.70.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_70-default-1-5.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_70-default-1-5.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_70-default-1-5.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.70.1.aarch64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.70.1.9.32.1.aarch64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.70.1.9.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.70.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.70.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.70.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.70.1.9.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.70.1.9.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.70.1.9.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.70.1.9.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.70.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.70.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.70.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.70.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.70.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.70.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.70.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.70.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.70.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.70.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.70.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.70.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.70.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.70.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.70.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.70.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.70.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.70.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-preempt-extra-5.3.18-24.70.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-14T15:07:41Z",
"details": "important"
}
],
"title": "CVE-2021-0512"
},
{
"cve": "CVE-2021-0605",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-0605"
}
],
"notes": [
{
"category": "general",
"text": "In pfkey_dump of af_key.c, there is a possible out-of-bounds read due to a missing bounds check. This could lead to local information disclosure in the kernel with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-110373476",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.70.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.70.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.70.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.70.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.70.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.70.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.70.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.70.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.70.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.70.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.70.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.70.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.70.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.70.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.70.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.70.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_70-default-1-5.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_70-default-1-5.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_70-default-1-5.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.70.1.aarch64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.70.1.9.32.1.aarch64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.70.1.9.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.70.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.70.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.70.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.70.1.9.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.70.1.9.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.70.1.9.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.70.1.9.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.70.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.70.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.70.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.70.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.70.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.70.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.70.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.70.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.70.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.70.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.70.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.70.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.70.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.70.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.70.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.70.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.70.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.70.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-preempt-extra-5.3.18-24.70.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-0605",
"url": "https://www.suse.com/security/cve/CVE-2021-0605"
},
{
"category": "external",
"summary": "SUSE Bug 1187601 for CVE-2021-0605",
"url": "https://bugzilla.suse.com/1187601"
},
{
"category": "external",
"summary": "SUSE Bug 1187687 for CVE-2021-0605",
"url": "https://bugzilla.suse.com/1187687"
},
{
"category": "external",
"summary": "SUSE Bug 1188381 for CVE-2021-0605",
"url": "https://bugzilla.suse.com/1188381"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.70.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.70.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.70.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.70.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.70.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.70.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.70.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.70.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.70.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.70.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.70.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.70.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.70.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.70.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.70.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.70.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_70-default-1-5.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_70-default-1-5.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_70-default-1-5.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.70.1.aarch64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.70.1.9.32.1.aarch64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.70.1.9.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.70.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.70.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.70.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.70.1.9.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.70.1.9.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.70.1.9.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.70.1.9.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.70.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.70.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.70.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.70.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.70.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.70.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.70.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.70.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.70.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.70.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.70.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.70.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.70.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.70.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.70.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.70.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.70.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.70.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-preempt-extra-5.3.18-24.70.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.70.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.70.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.70.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.70.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.70.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.70.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.70.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.70.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.70.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.70.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.70.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.70.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.70.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.70.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.70.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.70.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_70-default-1-5.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_70-default-1-5.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_70-default-1-5.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.70.1.aarch64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.70.1.9.32.1.aarch64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.70.1.9.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.70.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.70.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.70.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.70.1.9.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.70.1.9.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.70.1.9.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.70.1.9.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.70.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.70.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.70.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.70.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.70.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.70.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.70.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.70.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.70.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.70.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.70.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.70.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.70.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.70.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.70.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.70.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.70.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.70.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-preempt-extra-5.3.18-24.70.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-14T15:07:41Z",
"details": "important"
}
],
"title": "CVE-2021-0605"
},
{
"cve": "CVE-2021-33624",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-33624"
}
],
"notes": [
{
"category": "general",
"text": "In kernel/bpf/verifier.c in the Linux kernel before 5.12.13, a branch can be mispredicted (e.g., because of type confusion) and consequently an unprivileged BPF program can read arbitrary memory locations via a side-channel attack, aka CID-9183671af6db.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.70.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.70.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.70.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.70.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.70.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.70.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.70.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.70.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.70.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.70.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.70.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.70.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.70.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.70.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.70.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.70.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_70-default-1-5.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_70-default-1-5.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_70-default-1-5.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.70.1.aarch64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.70.1.9.32.1.aarch64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.70.1.9.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.70.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.70.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.70.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.70.1.9.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.70.1.9.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.70.1.9.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.70.1.9.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.70.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.70.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.70.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.70.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.70.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.70.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.70.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.70.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.70.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.70.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.70.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.70.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.70.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.70.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.70.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.70.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.70.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.70.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-preempt-extra-5.3.18-24.70.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-33624",
"url": "https://www.suse.com/security/cve/CVE-2021-33624"
},
{
"category": "external",
"summary": "SUSE Bug 1187554 for CVE-2021-33624",
"url": "https://bugzilla.suse.com/1187554"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.70.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.70.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.70.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.70.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.70.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.70.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.70.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.70.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.70.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.70.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.70.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.70.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.70.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.70.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.70.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.70.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_70-default-1-5.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_70-default-1-5.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_70-default-1-5.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.70.1.aarch64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.70.1.9.32.1.aarch64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.70.1.9.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.70.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.70.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.70.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.70.1.9.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.70.1.9.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.70.1.9.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.70.1.9.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.70.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.70.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.70.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.70.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.70.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.70.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.70.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.70.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.70.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.70.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.70.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.70.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.70.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.70.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.70.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.70.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.70.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.70.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-preempt-extra-5.3.18-24.70.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.70.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.70.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.70.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.70.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.70.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.70.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.70.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.70.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.70.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.70.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.70.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.70.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.70.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.70.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.70.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.70.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_70-default-1-5.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_70-default-1-5.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_70-default-1-5.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.70.1.aarch64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.70.1.9.32.1.aarch64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.70.1.9.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.70.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.70.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.70.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.70.1.9.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.70.1.9.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.70.1.9.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.70.1.9.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.70.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.70.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.70.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.70.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.70.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.70.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.70.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.70.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.70.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.70.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.70.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.70.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.70.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.70.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.70.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.70.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.70.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.70.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-preempt-extra-5.3.18-24.70.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-14T15:07:41Z",
"details": "moderate"
}
],
"title": "CVE-2021-33624"
},
{
"cve": "CVE-2021-34693",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-34693"
}
],
"notes": [
{
"category": "general",
"text": "net/can/bcm.c in the Linux kernel through 5.12.10 allows local users to obtain sensitive information from kernel stack memory because parts of a data structure are uninitialized.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.70.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.70.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.70.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.70.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.70.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.70.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.70.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.70.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.70.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.70.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.70.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.70.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.70.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.70.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.70.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.70.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_70-default-1-5.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_70-default-1-5.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_70-default-1-5.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.70.1.aarch64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.70.1.9.32.1.aarch64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.70.1.9.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.70.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.70.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.70.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.70.1.9.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.70.1.9.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.70.1.9.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.70.1.9.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.70.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.70.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.70.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.70.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.70.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.70.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.70.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.70.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.70.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.70.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.70.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.70.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.70.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.70.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.70.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.70.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.70.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.70.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-preempt-extra-5.3.18-24.70.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-34693",
"url": "https://www.suse.com/security/cve/CVE-2021-34693"
},
{
"category": "external",
"summary": "SUSE Bug 1187452 for CVE-2021-34693",
"url": "https://bugzilla.suse.com/1187452"
},
{
"category": "external",
"summary": "SUSE Bug 1192868 for CVE-2021-34693",
"url": "https://bugzilla.suse.com/1192868"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.70.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.70.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.70.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.70.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.70.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.70.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.70.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.70.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.70.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.70.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.70.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.70.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.70.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.70.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.70.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.70.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_70-default-1-5.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_70-default-1-5.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_70-default-1-5.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.70.1.aarch64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.70.1.9.32.1.aarch64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.70.1.9.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.70.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.70.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.70.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.70.1.9.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.70.1.9.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.70.1.9.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.70.1.9.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.70.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.70.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.70.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.70.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.70.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.70.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.70.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.70.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.70.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.70.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.70.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.70.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.70.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.70.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.70.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.70.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.70.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.70.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-preempt-extra-5.3.18-24.70.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.70.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.70.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.70.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.70.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.70.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.70.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.70.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.70.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.70.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.70.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.70.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.70.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.70.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.70.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.70.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.70.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_70-default-1-5.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_70-default-1-5.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_70-default-1-5.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.70.1.aarch64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.70.1.9.32.1.aarch64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.70.1.9.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.70.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.70.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.70.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.70.1.9.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.70.1.9.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.70.1.9.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.70.1.9.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.70.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.70.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.70.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.70.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.70.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.70.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.70.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.70.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.70.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.70.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.70.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.70.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.70.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.70.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.70.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.70.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.70.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.70.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-preempt-extra-5.3.18-24.70.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-14T15:07:41Z",
"details": "moderate"
}
],
"title": "CVE-2021-34693"
},
{
"cve": "CVE-2021-3573",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3573"
}
],
"notes": [
{
"category": "general",
"text": "A use-after-free in function hci_sock_bound_ioctl() of the Linux kernel HCI subsystem was found in the way user calls ioct HCIUNBLOCKADDR or other way triggers race condition of the call hci_unregister_dev() together with one of the calls hci_sock_blacklist_add(), hci_sock_blacklist_del(), hci_get_conn_info(), hci_get_auth_info(). A privileged local user could use this flaw to crash the system or escalate their privileges on the system. This flaw affects the Linux kernel versions prior to 5.13-rc5.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.70.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.70.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.70.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.70.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.70.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.70.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.70.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.70.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.70.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.70.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.70.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.70.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.70.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.70.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.70.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.70.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_70-default-1-5.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_70-default-1-5.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_70-default-1-5.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.70.1.aarch64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.70.1.9.32.1.aarch64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.70.1.9.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.70.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.70.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.70.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.70.1.9.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.70.1.9.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.70.1.9.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.70.1.9.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.70.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.70.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.70.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.70.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.70.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.70.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.70.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.70.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.70.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.70.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.70.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.70.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.70.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.70.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.70.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.70.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.70.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.70.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-preempt-extra-5.3.18-24.70.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3573",
"url": "https://www.suse.com/security/cve/CVE-2021-3573"
},
{
"category": "external",
"summary": "SUSE Bug 1186666 for CVE-2021-3573",
"url": "https://bugzilla.suse.com/1186666"
},
{
"category": "external",
"summary": "SUSE Bug 1187054 for CVE-2021-3573",
"url": "https://bugzilla.suse.com/1187054"
},
{
"category": "external",
"summary": "SUSE Bug 1188172 for CVE-2021-3573",
"url": "https://bugzilla.suse.com/1188172"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.70.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.70.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.70.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.70.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.70.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.70.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.70.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.70.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.70.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.70.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.70.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.70.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.70.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.70.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.70.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.70.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_70-default-1-5.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_70-default-1-5.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_70-default-1-5.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.70.1.aarch64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.70.1.9.32.1.aarch64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.70.1.9.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.70.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.70.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.70.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.70.1.9.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.70.1.9.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.70.1.9.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.70.1.9.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.70.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.70.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.70.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.70.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.70.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.70.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.70.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.70.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.70.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.70.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.70.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.70.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.70.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.70.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.70.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.70.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.70.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.70.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-preempt-extra-5.3.18-24.70.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.70.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.70.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.70.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.70.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.70.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.70.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.70.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.70.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.70.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.70.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.70.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.70.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.70.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.70.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.70.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.70.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_70-default-1-5.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_70-default-1-5.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_70-default-1-5.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.70.1.aarch64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.70.1.9.32.1.aarch64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.70.1.9.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.70.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.70.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.70.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.70.1.9.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.70.1.9.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.70.1.9.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.70.1.9.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.70.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.70.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.70.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.70.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.70.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.70.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.70.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.70.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.70.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.70.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.70.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.70.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.70.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.70.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.70.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.70.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.70.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.70.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.70.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-preempt-extra-5.3.18-24.70.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-14T15:07:41Z",
"details": "important"
}
],
"title": "CVE-2021-3573"
}
]
}
suse-su-2021:2421-1
Vulnerability from csaf_suse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel",
"title": "Title of the patch"
},
{
"category": "description",
"text": "\n\nThe SUSE Linux Enterprise 15 LTSS kernel was updated to receive various security and bugfixes.\n\n\nThe following security bugs were fixed:\n\n- CVE-2021-22555: A heap out-of-bounds write was discovered in net/netfilter/x_tables.c (bnc#1188116 ).\n- CVE-2021-33909: Extremely large seq buffer allocations in seq_file could lead to buffer underruns and code execution (bsc#1188062).\n- CVE-2021-3609: A use-after-free in can/bcm could have led to privilege escalation (bsc#1187215).\n- CVE-2021-33624: In kernel/bpf/verifier.c a branch can be mispredicted (e.g., because of type confusion) and consequently an unprivileged BPF program can read arbitrary memory locations via a side-channel attack, aka CID-9183671af6db (bnc#1187554).\n- CVE-2021-0605: In pfkey_dump of af_key.c, there is a possible out-of-bounds read due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation (bnc#1187601).\n- CVE-2021-0512: In __hidinput_change_resolution_multipliers of hid-input.c, there is a possible out of bounds write due to a heap buffer overflow. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation (bnc#1187595).\n- CVE-2020-26558: Bluetooth LE and BR/EDR secure pairing in Bluetooth Core Specification 2.1 may permit a nearby man-in-the-middle attacker to identify the Passkey used during pairing (in the Passkey authentication procedure) by reflection of the public key and the authentication evidence of the initiating device, potentially permitting this attacker to complete authenticated pairing with the responding device using the correct Passkey for the pairing session. The attack methodology determines the Passkey value one bit at a time (bnc#1179610).\n- CVE-2021-34693: net/can/bcm.c in the Linux kernel allowed local users to obtain sensitive information from kernel stack memory because parts of a data structure are uninitialized (bnc#1187452).\n- CVE-2020-36385: An issue was discovered in the Linux kernel drivers/infiniband/core/ucma.c has a use-after-free because the ctx is reached via the ctx_list in some ucma_migrate_id situations where ucma_close is called, aka CID-f5449e74802c (bnc#1187050).\n- CVE-2021-0129: Improper access control in BlueZ may have allowed an authenticated user to potentially enable information disclosure via adjacent access (bnc#1186463).\n- CVE-2020-36386: An issue was discovered in the Linux kernel net/bluetooth/hci_event.c has a slab out-of-bounds read in hci_extended_inquiry_result_evt, aka CID-51c19bf3d5cf (bnc#1187038).\n- CVE-2020-24588: The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn\u0027t require that the A-MSDU flag in the plaintext QoS header field is authenticated. Against devices that support receiving non-SSP A-MSDU frames (which is mandatory as part of 802.11n), an adversary can abuse this to inject arbitrary network packets (bnc#1185861).\n- CVE-2021-33200: kernel/bpf/verifier.c enforced incorrect limits for pointer arithmetic operations, aka CID-bb01a1bba579. This can be abused to perform out-of-bounds reads and writes in kernel memory, leading to local privilege escalation to root. In particular, there is a corner case where the off reg causes a masking direction change, which then results in an incorrect final aux-\u003ealu_limit (bnc#1186484).\n- CVE-2021-33034: net/bluetooth/hci_event.c had a use-after-free when destroying an hci_chan, aka CID-5c4c8c954409. This leads to writing an arbitrary value (bnc#1186111).\n- CVE-2020-26139: An Access Point (AP) forwards EAPOL frames to other clients even though the sender has not yet successfully authenticated to the AP. This might be abused in projected Wi-Fi networks to launch denial-of-service attacks against connected clients and made it easier to exploit other vulnerabilities in connected clients (bnc#1186062).\n- CVE-2021-23134: Use After Free vulnerability in nfc sockets allowed local attackers to elevate their privileges. In typical configurations, the issue can only be triggered by a privileged local user with the CAP_NET_RAW capability (bnc#1186060).\n- CVE-2020-24586: The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn\u0027t require that received fragments be cleared from memory after (re)connecting to a network. Under the right circumstances, when another device sends fragmented frames encrypted using WEP, CCMP, or GCMP, this can be abused to inject arbitrary network packets and/or exfiltrate user data (bnc#1185859).\n- CVE-2020-26141: The Wi-Fi implementation did not verify the Message Integrity Check (authenticity) of fragmented TKIP frames. An adversary can abuse this to inject and possibly decrypt packets in WPA or WPA2 networks that support the TKIP data-confidentiality protocol (bnc#1185987).\n- CVE-2020-26145: The WEP, WPA, WPA2, and WPA3 implementations accept second (or subsequent) broadcast fragments even when sent in plaintext and process them as full unfragmented frames. An adversary can abuse this to inject arbitrary network packets independent of the network configuration (bnc#1185860).\n- CVE-2020-24587: The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn\u0027t require that all fragments of a frame are encrypted under the same key. An adversary can abuse this to decrypt selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP encryption key is periodically renewed (bnc#1185859 bnc#1185862).\n- CVE-2020-26147: The WEP, WPA, WPA2, and WPA3 implementations reassemble fragments even though some of them were sent in plaintext. This vulnerability can be abused to inject packets and/or exfiltrate selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP data-confidentiality protocol is used. ()\n- CVE-2021-3491: The io_uring subsystem allowed the MAX_RW_COUNT limit to be bypassed in the PROVIDE_BUFFERS operation, which led to negative values being usedin mem_rw when reading /proc/\u003cPID\u003e/mem. This could be used to create a heap overflow leading to arbitrary code execution in the kernel. (bnc#1185642).\n- CVE-2021-23133: A race condition in SCTP sockets (net/sctp/socket.c) could lead to kernel privilege escalation from the context of a network service or an unprivileged process. If sctp_destroy_sock is called without sock_net(sk)-\u003esctp.addr_wq_lock then an element is removed from the auto_asconf_splist list without any proper locking. This can be exploited by an attacker with network service privileges to escalate to root or from the context of an unprivileged user directly if a BPF_CGROUP_INET_SOCK_CREATE is attached which denies creation of some SCTP socket (bnc#1184675).\n- CVE-2021-32399: net/bluetooth/hci_request.c in the Linux kernel has a race condition for removal of the HCI controller (bnc#1184611 bnc#1185898).\n\nThe following non-security bugs were fixed:\n\n- Drivers: hv: vmbus: Increase wait time for VMbus unload (bsc#1185725).\n- Drivers: hv: vmbus: Initialize unload_event statically (bsc#1185725).\n- af_packet: fix the tx skb protocol in raw sockets with ETH_P_ALL (bsc#1176081).\n- dm: fix redundant IO accounting for bios that need splitting (bsc#1183738).\n- kabi: preserve struct header_ops after bsc#1176081 fix (bsc#1176081).\n- net/ethernet: Add parse_protocol header_ops support (bsc#1176081).\n- net/mlx5e: Remove the wrong assumption about transport offset (bsc#1176081).\n- net/mlx5e: Trust kernel regarding transport offset (bsc#1176081).\n- net/packet: Ask driver for protocol if not provided by user (bsc#1176081).\n- net/packet: Remove redundant skb-\u003eprotocol set (bsc#1176081).\n- net: Do not set transport offset to invalid value (bsc#1176081).\n- net: Introduce parse_protocol header_ops callback (bsc#1176081).\n- video: hyperv_fb: Add ratelimit on error message (bsc#1185725).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2021-2421,SUSE-SLE-Module-Live-Patching-15-2021-2421,SUSE-SLE-Product-HA-15-2021-2421,SUSE-SLE-Product-HPC-15-2021-2421,SUSE-SLE-Product-SLES-15-2021-2421,SUSE-SLE-Product-SLES_SAP-15-2021-2421",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2021_2421-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2021:2421-1",
"url": "https://www.suse.com/support/update/announcement/2021/suse-su-20212421-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2021:2421-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2021-July/009183.html"
},
{
"category": "self",
"summary": "SUSE Bug 1176081",
"url": "https://bugzilla.suse.com/1176081"
},
{
"category": "self",
"summary": "SUSE Bug 1179610",
"url": "https://bugzilla.suse.com/1179610"
},
{
"category": "self",
"summary": "SUSE Bug 1183738",
"url": "https://bugzilla.suse.com/1183738"
},
{
"category": "self",
"summary": "SUSE Bug 1184611",
"url": "https://bugzilla.suse.com/1184611"
},
{
"category": "self",
"summary": "SUSE Bug 1184675",
"url": "https://bugzilla.suse.com/1184675"
},
{
"category": "self",
"summary": "SUSE Bug 1185642",
"url": "https://bugzilla.suse.com/1185642"
},
{
"category": "self",
"summary": "SUSE Bug 1185725",
"url": "https://bugzilla.suse.com/1185725"
},
{
"category": "self",
"summary": "SUSE Bug 1185859",
"url": "https://bugzilla.suse.com/1185859"
},
{
"category": "self",
"summary": "SUSE Bug 1185860",
"url": "https://bugzilla.suse.com/1185860"
},
{
"category": "self",
"summary": "SUSE Bug 1185861",
"url": "https://bugzilla.suse.com/1185861"
},
{
"category": "self",
"summary": "SUSE Bug 1185862",
"url": "https://bugzilla.suse.com/1185862"
},
{
"category": "self",
"summary": "SUSE Bug 1185898",
"url": "https://bugzilla.suse.com/1185898"
},
{
"category": "self",
"summary": "SUSE Bug 1185987",
"url": "https://bugzilla.suse.com/1185987"
},
{
"category": "self",
"summary": "SUSE Bug 1186060",
"url": "https://bugzilla.suse.com/1186060"
},
{
"category": "self",
"summary": "SUSE Bug 1186062",
"url": "https://bugzilla.suse.com/1186062"
},
{
"category": "self",
"summary": "SUSE Bug 1186111",
"url": "https://bugzilla.suse.com/1186111"
},
{
"category": "self",
"summary": "SUSE Bug 1186463",
"url": "https://bugzilla.suse.com/1186463"
},
{
"category": "self",
"summary": "SUSE Bug 1186484",
"url": "https://bugzilla.suse.com/1186484"
},
{
"category": "self",
"summary": "SUSE Bug 1187038",
"url": "https://bugzilla.suse.com/1187038"
},
{
"category": "self",
"summary": "SUSE Bug 1187050",
"url": "https://bugzilla.suse.com/1187050"
},
{
"category": "self",
"summary": "SUSE Bug 1187215",
"url": "https://bugzilla.suse.com/1187215"
},
{
"category": "self",
"summary": "SUSE Bug 1187452",
"url": "https://bugzilla.suse.com/1187452"
},
{
"category": "self",
"summary": "SUSE Bug 1187554",
"url": "https://bugzilla.suse.com/1187554"
},
{
"category": "self",
"summary": "SUSE Bug 1187595",
"url": "https://bugzilla.suse.com/1187595"
},
{
"category": "self",
"summary": "SUSE Bug 1187601",
"url": "https://bugzilla.suse.com/1187601"
},
{
"category": "self",
"summary": "SUSE Bug 1188062",
"url": "https://bugzilla.suse.com/1188062"
},
{
"category": "self",
"summary": "SUSE Bug 1188116",
"url": "https://bugzilla.suse.com/1188116"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-24586 page",
"url": "https://www.suse.com/security/cve/CVE-2020-24586/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-24587 page",
"url": "https://www.suse.com/security/cve/CVE-2020-24587/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-24588 page",
"url": "https://www.suse.com/security/cve/CVE-2020-24588/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-26139 page",
"url": "https://www.suse.com/security/cve/CVE-2020-26139/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-26141 page",
"url": "https://www.suse.com/security/cve/CVE-2020-26141/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-26145 page",
"url": "https://www.suse.com/security/cve/CVE-2020-26145/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-26147 page",
"url": "https://www.suse.com/security/cve/CVE-2020-26147/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-26558 page",
"url": "https://www.suse.com/security/cve/CVE-2020-26558/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-36385 page",
"url": "https://www.suse.com/security/cve/CVE-2020-36385/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-36386 page",
"url": "https://www.suse.com/security/cve/CVE-2020-36386/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-0129 page",
"url": "https://www.suse.com/security/cve/CVE-2021-0129/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-0512 page",
"url": "https://www.suse.com/security/cve/CVE-2021-0512/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-0605 page",
"url": "https://www.suse.com/security/cve/CVE-2021-0605/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-22555 page",
"url": "https://www.suse.com/security/cve/CVE-2021-22555/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-23133 page",
"url": "https://www.suse.com/security/cve/CVE-2021-23133/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-23134 page",
"url": "https://www.suse.com/security/cve/CVE-2021-23134/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-32399 page",
"url": "https://www.suse.com/security/cve/CVE-2021-32399/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-33034 page",
"url": "https://www.suse.com/security/cve/CVE-2021-33034/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-33200 page",
"url": "https://www.suse.com/security/cve/CVE-2021-33200/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-33624 page",
"url": "https://www.suse.com/security/cve/CVE-2021-33624/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-33909 page",
"url": "https://www.suse.com/security/cve/CVE-2021-33909/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-34693 page",
"url": "https://www.suse.com/security/cve/CVE-2021-34693/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3491 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3491/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3609 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3609/"
}
],
"title": "Security update for the Linux Kernel",
"tracking": {
"current_release_date": "2021-07-21T09:01:19Z",
"generator": {
"date": "2021-07-21T09:01:19Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2021:2421-1",
"initial_release_date": "2021-07-21T09:01:19Z",
"revision_history": [
{
"date": "2021-07-21T09:01:19Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-4.12.14-150.75.1.aarch64",
"product": {
"name": "cluster-md-kmp-default-4.12.14-150.75.1.aarch64",
"product_id": "cluster-md-kmp-default-4.12.14-150.75.1.aarch64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-4.12.14-150.75.1.aarch64",
"product": {
"name": "dlm-kmp-default-4.12.14-150.75.1.aarch64",
"product_id": "dlm-kmp-default-4.12.14-150.75.1.aarch64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-4.12.14-150.75.1.aarch64",
"product": {
"name": "gfs2-kmp-default-4.12.14-150.75.1.aarch64",
"product_id": "gfs2-kmp-default-4.12.14-150.75.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-4.12.14-150.75.1.aarch64",
"product": {
"name": "kernel-default-4.12.14-150.75.1.aarch64",
"product_id": "kernel-default-4.12.14-150.75.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-4.12.14-150.75.1.aarch64",
"product": {
"name": "kernel-default-base-4.12.14-150.75.1.aarch64",
"product_id": "kernel-default-base-4.12.14-150.75.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-4.12.14-150.75.1.aarch64",
"product": {
"name": "kernel-default-devel-4.12.14-150.75.1.aarch64",
"product_id": "kernel-default-devel-4.12.14-150.75.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-4.12.14-150.75.1.aarch64",
"product": {
"name": "kernel-default-extra-4.12.14-150.75.1.aarch64",
"product_id": "kernel-default-extra-4.12.14-150.75.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-4.12.14-150.75.1.aarch64",
"product": {
"name": "kernel-default-livepatch-4.12.14-150.75.1.aarch64",
"product_id": "kernel-default-livepatch-4.12.14-150.75.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-devel-4.12.14-150.75.1.aarch64",
"product": {
"name": "kernel-default-livepatch-devel-4.12.14-150.75.1.aarch64",
"product_id": "kernel-default-livepatch-devel-4.12.14-150.75.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-4.12.14-150.75.1.aarch64",
"product": {
"name": "kernel-obs-build-4.12.14-150.75.1.aarch64",
"product_id": "kernel-obs-build-4.12.14-150.75.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-4.12.14-150.75.1.aarch64",
"product": {
"name": "kernel-obs-qa-4.12.14-150.75.1.aarch64",
"product_id": "kernel-obs-qa-4.12.14-150.75.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-syms-4.12.14-150.75.1.aarch64",
"product": {
"name": "kernel-syms-4.12.14-150.75.1.aarch64",
"product_id": "kernel-syms-4.12.14-150.75.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-4.12.14-150.75.1.aarch64",
"product": {
"name": "kernel-vanilla-4.12.14-150.75.1.aarch64",
"product_id": "kernel-vanilla-4.12.14-150.75.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"product": {
"name": "kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"product_id": "kernel-vanilla-base-4.12.14-150.75.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-devel-4.12.14-150.75.1.aarch64",
"product": {
"name": "kernel-vanilla-devel-4.12.14-150.75.1.aarch64",
"product_id": "kernel-vanilla-devel-4.12.14-150.75.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-livepatch-devel-4.12.14-150.75.1.aarch64",
"product": {
"name": "kernel-vanilla-livepatch-devel-4.12.14-150.75.1.aarch64",
"product_id": "kernel-vanilla-livepatch-devel-4.12.14-150.75.1.aarch64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-4.12.14-150.75.1.aarch64",
"product": {
"name": "kselftests-kmp-default-4.12.14-150.75.1.aarch64",
"product_id": "kselftests-kmp-default-4.12.14-150.75.1.aarch64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-4.12.14-150.75.1.aarch64",
"product": {
"name": "ocfs2-kmp-default-4.12.14-150.75.1.aarch64",
"product_id": "ocfs2-kmp-default-4.12.14-150.75.1.aarch64"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-default-4.12.14-150.75.1.aarch64",
"product": {
"name": "reiserfs-kmp-default-4.12.14-150.75.1.aarch64",
"product_id": "reiserfs-kmp-default-4.12.14-150.75.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-devel-4.12.14-150.75.1.noarch",
"product": {
"name": "kernel-devel-4.12.14-150.75.1.noarch",
"product_id": "kernel-devel-4.12.14-150.75.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-docs-4.12.14-150.75.1.noarch",
"product": {
"name": "kernel-docs-4.12.14-150.75.1.noarch",
"product_id": "kernel-docs-4.12.14-150.75.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-docs-html-4.12.14-150.75.1.noarch",
"product": {
"name": "kernel-docs-html-4.12.14-150.75.1.noarch",
"product_id": "kernel-docs-html-4.12.14-150.75.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-macros-4.12.14-150.75.1.noarch",
"product": {
"name": "kernel-macros-4.12.14-150.75.1.noarch",
"product_id": "kernel-macros-4.12.14-150.75.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-4.12.14-150.75.1.noarch",
"product": {
"name": "kernel-source-4.12.14-150.75.1.noarch",
"product_id": "kernel-source-4.12.14-150.75.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-vanilla-4.12.14-150.75.1.noarch",
"product": {
"name": "kernel-source-vanilla-4.12.14-150.75.1.noarch",
"product_id": "kernel-source-vanilla-4.12.14-150.75.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-4.12.14-150.75.1.ppc64le",
"product": {
"name": "cluster-md-kmp-default-4.12.14-150.75.1.ppc64le",
"product_id": "cluster-md-kmp-default-4.12.14-150.75.1.ppc64le"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-4.12.14-150.75.1.ppc64le",
"product": {
"name": "dlm-kmp-default-4.12.14-150.75.1.ppc64le",
"product_id": "dlm-kmp-default-4.12.14-150.75.1.ppc64le"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"product": {
"name": "gfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"product_id": "gfs2-kmp-default-4.12.14-150.75.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-4.12.14-150.75.1.ppc64le",
"product": {
"name": "kernel-debug-4.12.14-150.75.1.ppc64le",
"product_id": "kernel-debug-4.12.14-150.75.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-base-4.12.14-150.75.1.ppc64le",
"product": {
"name": "kernel-debug-base-4.12.14-150.75.1.ppc64le",
"product_id": "kernel-debug-base-4.12.14-150.75.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-4.12.14-150.75.1.ppc64le",
"product": {
"name": "kernel-debug-devel-4.12.14-150.75.1.ppc64le",
"product_id": "kernel-debug-devel-4.12.14-150.75.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-livepatch-devel-4.12.14-150.75.1.ppc64le",
"product": {
"name": "kernel-debug-livepatch-devel-4.12.14-150.75.1.ppc64le",
"product_id": "kernel-debug-livepatch-devel-4.12.14-150.75.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-4.12.14-150.75.1.ppc64le",
"product": {
"name": "kernel-default-4.12.14-150.75.1.ppc64le",
"product_id": "kernel-default-4.12.14-150.75.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-base-4.12.14-150.75.1.ppc64le",
"product": {
"name": "kernel-default-base-4.12.14-150.75.1.ppc64le",
"product_id": "kernel-default-base-4.12.14-150.75.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-4.12.14-150.75.1.ppc64le",
"product": {
"name": "kernel-default-devel-4.12.14-150.75.1.ppc64le",
"product_id": "kernel-default-devel-4.12.14-150.75.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-4.12.14-150.75.1.ppc64le",
"product": {
"name": "kernel-default-extra-4.12.14-150.75.1.ppc64le",
"product_id": "kernel-default-extra-4.12.14-150.75.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-4.12.14-150.75.1.ppc64le",
"product": {
"name": "kernel-default-livepatch-4.12.14-150.75.1.ppc64le",
"product_id": "kernel-default-livepatch-4.12.14-150.75.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-devel-4.12.14-150.75.1.ppc64le",
"product": {
"name": "kernel-default-livepatch-devel-4.12.14-150.75.1.ppc64le",
"product_id": "kernel-default-livepatch-devel-4.12.14-150.75.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le",
"product": {
"name": "kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le",
"product_id": "kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-4.12.14-150.75.1.ppc64le",
"product": {
"name": "kernel-obs-build-4.12.14-150.75.1.ppc64le",
"product_id": "kernel-obs-build-4.12.14-150.75.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-4.12.14-150.75.1.ppc64le",
"product": {
"name": "kernel-obs-qa-4.12.14-150.75.1.ppc64le",
"product_id": "kernel-obs-qa-4.12.14-150.75.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-syms-4.12.14-150.75.1.ppc64le",
"product": {
"name": "kernel-syms-4.12.14-150.75.1.ppc64le",
"product_id": "kernel-syms-4.12.14-150.75.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-4.12.14-150.75.1.ppc64le",
"product": {
"name": "kernel-vanilla-4.12.14-150.75.1.ppc64le",
"product_id": "kernel-vanilla-4.12.14-150.75.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"product": {
"name": "kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"product_id": "kernel-vanilla-base-4.12.14-150.75.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-devel-4.12.14-150.75.1.ppc64le",
"product": {
"name": "kernel-vanilla-devel-4.12.14-150.75.1.ppc64le",
"product_id": "kernel-vanilla-devel-4.12.14-150.75.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-livepatch-devel-4.12.14-150.75.1.ppc64le",
"product": {
"name": "kernel-vanilla-livepatch-devel-4.12.14-150.75.1.ppc64le",
"product_id": "kernel-vanilla-livepatch-devel-4.12.14-150.75.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-4.12.14-150.75.1.ppc64le",
"product": {
"name": "kselftests-kmp-default-4.12.14-150.75.1.ppc64le",
"product_id": "kselftests-kmp-default-4.12.14-150.75.1.ppc64le"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"product": {
"name": "ocfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"product_id": "ocfs2-kmp-default-4.12.14-150.75.1.ppc64le"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"product": {
"name": "reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"product_id": "reiserfs-kmp-default-4.12.14-150.75.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-4.12.14-150.75.1.s390x",
"product": {
"name": "cluster-md-kmp-default-4.12.14-150.75.1.s390x",
"product_id": "cluster-md-kmp-default-4.12.14-150.75.1.s390x"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-4.12.14-150.75.1.s390x",
"product": {
"name": "dlm-kmp-default-4.12.14-150.75.1.s390x",
"product_id": "dlm-kmp-default-4.12.14-150.75.1.s390x"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-4.12.14-150.75.1.s390x",
"product": {
"name": "gfs2-kmp-default-4.12.14-150.75.1.s390x",
"product_id": "gfs2-kmp-default-4.12.14-150.75.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-4.12.14-150.75.1.s390x",
"product": {
"name": "kernel-default-4.12.14-150.75.1.s390x",
"product_id": "kernel-default-4.12.14-150.75.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-base-4.12.14-150.75.1.s390x",
"product": {
"name": "kernel-default-base-4.12.14-150.75.1.s390x",
"product_id": "kernel-default-base-4.12.14-150.75.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-4.12.14-150.75.1.s390x",
"product": {
"name": "kernel-default-devel-4.12.14-150.75.1.s390x",
"product_id": "kernel-default-devel-4.12.14-150.75.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-4.12.14-150.75.1.s390x",
"product": {
"name": "kernel-default-extra-4.12.14-150.75.1.s390x",
"product_id": "kernel-default-extra-4.12.14-150.75.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-4.12.14-150.75.1.s390x",
"product": {
"name": "kernel-default-livepatch-4.12.14-150.75.1.s390x",
"product_id": "kernel-default-livepatch-4.12.14-150.75.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-devel-4.12.14-150.75.1.s390x",
"product": {
"name": "kernel-default-livepatch-devel-4.12.14-150.75.1.s390x",
"product_id": "kernel-default-livepatch-devel-4.12.14-150.75.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-man-4.12.14-150.75.1.s390x",
"product": {
"name": "kernel-default-man-4.12.14-150.75.1.s390x",
"product_id": "kernel-default-man-4.12.14-150.75.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-4.12.14-150.75.1.s390x",
"product": {
"name": "kernel-obs-build-4.12.14-150.75.1.s390x",
"product_id": "kernel-obs-build-4.12.14-150.75.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-4.12.14-150.75.1.s390x",
"product": {
"name": "kernel-obs-qa-4.12.14-150.75.1.s390x",
"product_id": "kernel-obs-qa-4.12.14-150.75.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-syms-4.12.14-150.75.1.s390x",
"product": {
"name": "kernel-syms-4.12.14-150.75.1.s390x",
"product_id": "kernel-syms-4.12.14-150.75.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-4.12.14-150.75.1.s390x",
"product": {
"name": "kernel-vanilla-4.12.14-150.75.1.s390x",
"product_id": "kernel-vanilla-4.12.14-150.75.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-base-4.12.14-150.75.1.s390x",
"product": {
"name": "kernel-vanilla-base-4.12.14-150.75.1.s390x",
"product_id": "kernel-vanilla-base-4.12.14-150.75.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-devel-4.12.14-150.75.1.s390x",
"product": {
"name": "kernel-vanilla-devel-4.12.14-150.75.1.s390x",
"product_id": "kernel-vanilla-devel-4.12.14-150.75.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-livepatch-devel-4.12.14-150.75.1.s390x",
"product": {
"name": "kernel-vanilla-livepatch-devel-4.12.14-150.75.1.s390x",
"product_id": "kernel-vanilla-livepatch-devel-4.12.14-150.75.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-4.12.14-150.75.1.s390x",
"product": {
"name": "kernel-zfcpdump-4.12.14-150.75.1.s390x",
"product_id": "kernel-zfcpdump-4.12.14-150.75.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-man-4.12.14-150.75.1.s390x",
"product": {
"name": "kernel-zfcpdump-man-4.12.14-150.75.1.s390x",
"product_id": "kernel-zfcpdump-man-4.12.14-150.75.1.s390x"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-4.12.14-150.75.1.s390x",
"product": {
"name": "kselftests-kmp-default-4.12.14-150.75.1.s390x",
"product_id": "kselftests-kmp-default-4.12.14-150.75.1.s390x"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-4.12.14-150.75.1.s390x",
"product": {
"name": "ocfs2-kmp-default-4.12.14-150.75.1.s390x",
"product_id": "ocfs2-kmp-default-4.12.14-150.75.1.s390x"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-default-4.12.14-150.75.1.s390x",
"product": {
"name": "reiserfs-kmp-default-4.12.14-150.75.1.s390x",
"product_id": "reiserfs-kmp-default-4.12.14-150.75.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-4.12.14-150.75.1.x86_64",
"product": {
"name": "cluster-md-kmp-default-4.12.14-150.75.1.x86_64",
"product_id": "cluster-md-kmp-default-4.12.14-150.75.1.x86_64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-4.12.14-150.75.1.x86_64",
"product": {
"name": "dlm-kmp-default-4.12.14-150.75.1.x86_64",
"product_id": "dlm-kmp-default-4.12.14-150.75.1.x86_64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-4.12.14-150.75.1.x86_64",
"product": {
"name": "gfs2-kmp-default-4.12.14-150.75.1.x86_64",
"product_id": "gfs2-kmp-default-4.12.14-150.75.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-4.12.14-150.75.1.x86_64",
"product": {
"name": "kernel-debug-4.12.14-150.75.1.x86_64",
"product_id": "kernel-debug-4.12.14-150.75.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-base-4.12.14-150.75.1.x86_64",
"product": {
"name": "kernel-debug-base-4.12.14-150.75.1.x86_64",
"product_id": "kernel-debug-base-4.12.14-150.75.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-4.12.14-150.75.1.x86_64",
"product": {
"name": "kernel-debug-devel-4.12.14-150.75.1.x86_64",
"product_id": "kernel-debug-devel-4.12.14-150.75.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-livepatch-devel-4.12.14-150.75.1.x86_64",
"product": {
"name": "kernel-debug-livepatch-devel-4.12.14-150.75.1.x86_64",
"product_id": "kernel-debug-livepatch-devel-4.12.14-150.75.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-4.12.14-150.75.1.x86_64",
"product": {
"name": "kernel-default-4.12.14-150.75.1.x86_64",
"product_id": "kernel-default-4.12.14-150.75.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-4.12.14-150.75.1.x86_64",
"product": {
"name": "kernel-default-base-4.12.14-150.75.1.x86_64",
"product_id": "kernel-default-base-4.12.14-150.75.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-4.12.14-150.75.1.x86_64",
"product": {
"name": "kernel-default-devel-4.12.14-150.75.1.x86_64",
"product_id": "kernel-default-devel-4.12.14-150.75.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-4.12.14-150.75.1.x86_64",
"product": {
"name": "kernel-default-extra-4.12.14-150.75.1.x86_64",
"product_id": "kernel-default-extra-4.12.14-150.75.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-4.12.14-150.75.1.x86_64",
"product": {
"name": "kernel-default-livepatch-4.12.14-150.75.1.x86_64",
"product_id": "kernel-default-livepatch-4.12.14-150.75.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-devel-4.12.14-150.75.1.x86_64",
"product": {
"name": "kernel-default-livepatch-devel-4.12.14-150.75.1.x86_64",
"product_id": "kernel-default-livepatch-devel-4.12.14-150.75.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-4.12.14-150.75.1.x86_64",
"product": {
"name": "kernel-kvmsmall-4.12.14-150.75.1.x86_64",
"product_id": "kernel-kvmsmall-4.12.14-150.75.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-base-4.12.14-150.75.1.x86_64",
"product": {
"name": "kernel-kvmsmall-base-4.12.14-150.75.1.x86_64",
"product_id": "kernel-kvmsmall-base-4.12.14-150.75.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-devel-4.12.14-150.75.1.x86_64",
"product": {
"name": "kernel-kvmsmall-devel-4.12.14-150.75.1.x86_64",
"product_id": "kernel-kvmsmall-devel-4.12.14-150.75.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-livepatch-devel-4.12.14-150.75.1.x86_64",
"product": {
"name": "kernel-kvmsmall-livepatch-devel-4.12.14-150.75.1.x86_64",
"product_id": "kernel-kvmsmall-livepatch-devel-4.12.14-150.75.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64",
"product": {
"name": "kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64",
"product_id": "kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-4.12.14-150.75.1.x86_64",
"product": {
"name": "kernel-obs-build-4.12.14-150.75.1.x86_64",
"product_id": "kernel-obs-build-4.12.14-150.75.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-4.12.14-150.75.1.x86_64",
"product": {
"name": "kernel-obs-qa-4.12.14-150.75.1.x86_64",
"product_id": "kernel-obs-qa-4.12.14-150.75.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-syms-4.12.14-150.75.1.x86_64",
"product": {
"name": "kernel-syms-4.12.14-150.75.1.x86_64",
"product_id": "kernel-syms-4.12.14-150.75.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-4.12.14-150.75.1.x86_64",
"product": {
"name": "kernel-vanilla-4.12.14-150.75.1.x86_64",
"product_id": "kernel-vanilla-4.12.14-150.75.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"product": {
"name": "kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"product_id": "kernel-vanilla-base-4.12.14-150.75.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-devel-4.12.14-150.75.1.x86_64",
"product": {
"name": "kernel-vanilla-devel-4.12.14-150.75.1.x86_64",
"product_id": "kernel-vanilla-devel-4.12.14-150.75.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-livepatch-devel-4.12.14-150.75.1.x86_64",
"product": {
"name": "kernel-vanilla-livepatch-devel-4.12.14-150.75.1.x86_64",
"product_id": "kernel-vanilla-livepatch-devel-4.12.14-150.75.1.x86_64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-4.12.14-150.75.1.x86_64",
"product": {
"name": "kselftests-kmp-default-4.12.14-150.75.1.x86_64",
"product_id": "kselftests-kmp-default-4.12.14-150.75.1.x86_64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-4.12.14-150.75.1.x86_64",
"product": {
"name": "ocfs2-kmp-default-4.12.14-150.75.1.x86_64",
"product_id": "ocfs2-kmp-default-4.12.14-150.75.1.x86_64"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"product": {
"name": "reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"product_id": "reiserfs-kmp-default-4.12.14-150.75.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 15",
"product": {
"name": "SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-live-patching:15"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Availability Extension 15",
"product": {
"name": "SUSE Linux Enterprise High Availability Extension 15",
"product_id": "SUSE Linux Enterprise High Availability Extension 15",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-ha:15"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Performance Computing 15-ESPOS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing 15-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle_hpc-espos:15"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Performance Computing 15-LTSS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing 15-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle_hpc-ltss:15"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 15-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 15-LTSS",
"product_id": "SUSE Linux Enterprise Server 15-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:15"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 15",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 15",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:15"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-4.12.14-150.75.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le"
},
"product_reference": "kernel-default-livepatch-4.12.14-150.75.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-4.12.14-150.75.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64"
},
"product_reference": "kernel-default-livepatch-4.12.14-150.75.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-4.12.14-150.75.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15",
"product_id": "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64"
},
"product_reference": "cluster-md-kmp-default-4.12.14-150.75.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-4.12.14-150.75.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15",
"product_id": "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le"
},
"product_reference": "cluster-md-kmp-default-4.12.14-150.75.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-4.12.14-150.75.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15",
"product_id": "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x"
},
"product_reference": "cluster-md-kmp-default-4.12.14-150.75.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-4.12.14-150.75.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15",
"product_id": "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64"
},
"product_reference": "cluster-md-kmp-default-4.12.14-150.75.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-4.12.14-150.75.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15",
"product_id": "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64"
},
"product_reference": "dlm-kmp-default-4.12.14-150.75.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-4.12.14-150.75.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15",
"product_id": "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le"
},
"product_reference": "dlm-kmp-default-4.12.14-150.75.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-4.12.14-150.75.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15",
"product_id": "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x"
},
"product_reference": "dlm-kmp-default-4.12.14-150.75.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-4.12.14-150.75.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15",
"product_id": "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64"
},
"product_reference": "dlm-kmp-default-4.12.14-150.75.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-4.12.14-150.75.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15",
"product_id": "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64"
},
"product_reference": "gfs2-kmp-default-4.12.14-150.75.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-4.12.14-150.75.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15",
"product_id": "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le"
},
"product_reference": "gfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-4.12.14-150.75.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15",
"product_id": "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x"
},
"product_reference": "gfs2-kmp-default-4.12.14-150.75.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-4.12.14-150.75.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15",
"product_id": "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64"
},
"product_reference": "gfs2-kmp-default-4.12.14-150.75.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-4.12.14-150.75.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15",
"product_id": "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64"
},
"product_reference": "ocfs2-kmp-default-4.12.14-150.75.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-4.12.14-150.75.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15",
"product_id": "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le"
},
"product_reference": "ocfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-4.12.14-150.75.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15",
"product_id": "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x"
},
"product_reference": "ocfs2-kmp-default-4.12.14-150.75.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-4.12.14-150.75.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15",
"product_id": "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64"
},
"product_reference": "ocfs2-kmp-default-4.12.14-150.75.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-150.75.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64"
},
"product_reference": "kernel-default-4.12.14-150.75.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-150.75.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64"
},
"product_reference": "kernel-default-4.12.14-150.75.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-150.75.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64"
},
"product_reference": "kernel-default-base-4.12.14-150.75.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-150.75.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64"
},
"product_reference": "kernel-default-base-4.12.14-150.75.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-150.75.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64"
},
"product_reference": "kernel-default-devel-4.12.14-150.75.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-150.75.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64"
},
"product_reference": "kernel-default-devel-4.12.14-150.75.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-4.12.14-150.75.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch"
},
"product_reference": "kernel-devel-4.12.14-150.75.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-docs-4.12.14-150.75.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch"
},
"product_reference": "kernel-docs-4.12.14-150.75.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-4.12.14-150.75.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch"
},
"product_reference": "kernel-macros-4.12.14-150.75.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.12.14-150.75.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64"
},
"product_reference": "kernel-obs-build-4.12.14-150.75.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.12.14-150.75.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64"
},
"product_reference": "kernel-obs-build-4.12.14-150.75.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-4.12.14-150.75.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch"
},
"product_reference": "kernel-source-4.12.14-150.75.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-150.75.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64"
},
"product_reference": "kernel-syms-4.12.14-150.75.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-150.75.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64"
},
"product_reference": "kernel-syms-4.12.14-150.75.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-vanilla-base-4.12.14-150.75.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64"
},
"product_reference": "kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-vanilla-base-4.12.14-150.75.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64"
},
"product_reference": "kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-150.75.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64"
},
"product_reference": "kernel-default-4.12.14-150.75.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-150.75.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64"
},
"product_reference": "kernel-default-4.12.14-150.75.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-150.75.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64"
},
"product_reference": "kernel-default-base-4.12.14-150.75.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-150.75.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64"
},
"product_reference": "kernel-default-base-4.12.14-150.75.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-150.75.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64"
},
"product_reference": "kernel-default-devel-4.12.14-150.75.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-150.75.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64"
},
"product_reference": "kernel-default-devel-4.12.14-150.75.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-4.12.14-150.75.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch"
},
"product_reference": "kernel-devel-4.12.14-150.75.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-docs-4.12.14-150.75.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch"
},
"product_reference": "kernel-docs-4.12.14-150.75.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-4.12.14-150.75.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch"
},
"product_reference": "kernel-macros-4.12.14-150.75.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.12.14-150.75.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64"
},
"product_reference": "kernel-obs-build-4.12.14-150.75.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.12.14-150.75.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64"
},
"product_reference": "kernel-obs-build-4.12.14-150.75.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-4.12.14-150.75.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch"
},
"product_reference": "kernel-source-4.12.14-150.75.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-150.75.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64"
},
"product_reference": "kernel-syms-4.12.14-150.75.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-150.75.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64"
},
"product_reference": "kernel-syms-4.12.14-150.75.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-vanilla-base-4.12.14-150.75.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64"
},
"product_reference": "kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-vanilla-base-4.12.14-150.75.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64"
},
"product_reference": "kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-150.75.1.aarch64 as component of SUSE Linux Enterprise Server 15-LTSS",
"product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64"
},
"product_reference": "kernel-default-4.12.14-150.75.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-150.75.1.ppc64le as component of SUSE Linux Enterprise Server 15-LTSS",
"product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le"
},
"product_reference": "kernel-default-4.12.14-150.75.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-150.75.1.s390x as component of SUSE Linux Enterprise Server 15-LTSS",
"product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x"
},
"product_reference": "kernel-default-4.12.14-150.75.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-150.75.1.x86_64 as component of SUSE Linux Enterprise Server 15-LTSS",
"product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64"
},
"product_reference": "kernel-default-4.12.14-150.75.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-150.75.1.aarch64 as component of SUSE Linux Enterprise Server 15-LTSS",
"product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64"
},
"product_reference": "kernel-default-base-4.12.14-150.75.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-150.75.1.ppc64le as component of SUSE Linux Enterprise Server 15-LTSS",
"product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le"
},
"product_reference": "kernel-default-base-4.12.14-150.75.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-150.75.1.s390x as component of SUSE Linux Enterprise Server 15-LTSS",
"product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x"
},
"product_reference": "kernel-default-base-4.12.14-150.75.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-150.75.1.x86_64 as component of SUSE Linux Enterprise Server 15-LTSS",
"product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64"
},
"product_reference": "kernel-default-base-4.12.14-150.75.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-150.75.1.aarch64 as component of SUSE Linux Enterprise Server 15-LTSS",
"product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64"
},
"product_reference": "kernel-default-devel-4.12.14-150.75.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-150.75.1.ppc64le as component of SUSE Linux Enterprise Server 15-LTSS",
"product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le"
},
"product_reference": "kernel-default-devel-4.12.14-150.75.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-150.75.1.s390x as component of SUSE Linux Enterprise Server 15-LTSS",
"product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x"
},
"product_reference": "kernel-default-devel-4.12.14-150.75.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-150.75.1.x86_64 as component of SUSE Linux Enterprise Server 15-LTSS",
"product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64"
},
"product_reference": "kernel-default-devel-4.12.14-150.75.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-man-4.12.14-150.75.1.s390x as component of SUSE Linux Enterprise Server 15-LTSS",
"product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x"
},
"product_reference": "kernel-default-man-4.12.14-150.75.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-4.12.14-150.75.1.noarch as component of SUSE Linux Enterprise Server 15-LTSS",
"product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch"
},
"product_reference": "kernel-devel-4.12.14-150.75.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-docs-4.12.14-150.75.1.noarch as component of SUSE Linux Enterprise Server 15-LTSS",
"product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch"
},
"product_reference": "kernel-docs-4.12.14-150.75.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-4.12.14-150.75.1.noarch as component of SUSE Linux Enterprise Server 15-LTSS",
"product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch"
},
"product_reference": "kernel-macros-4.12.14-150.75.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.12.14-150.75.1.aarch64 as component of SUSE Linux Enterprise Server 15-LTSS",
"product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64"
},
"product_reference": "kernel-obs-build-4.12.14-150.75.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.12.14-150.75.1.ppc64le as component of SUSE Linux Enterprise Server 15-LTSS",
"product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le"
},
"product_reference": "kernel-obs-build-4.12.14-150.75.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.12.14-150.75.1.s390x as component of SUSE Linux Enterprise Server 15-LTSS",
"product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x"
},
"product_reference": "kernel-obs-build-4.12.14-150.75.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.12.14-150.75.1.x86_64 as component of SUSE Linux Enterprise Server 15-LTSS",
"product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64"
},
"product_reference": "kernel-obs-build-4.12.14-150.75.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-4.12.14-150.75.1.noarch as component of SUSE Linux Enterprise Server 15-LTSS",
"product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch"
},
"product_reference": "kernel-source-4.12.14-150.75.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-150.75.1.aarch64 as component of SUSE Linux Enterprise Server 15-LTSS",
"product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64"
},
"product_reference": "kernel-syms-4.12.14-150.75.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-150.75.1.ppc64le as component of SUSE Linux Enterprise Server 15-LTSS",
"product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le"
},
"product_reference": "kernel-syms-4.12.14-150.75.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-150.75.1.s390x as component of SUSE Linux Enterprise Server 15-LTSS",
"product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x"
},
"product_reference": "kernel-syms-4.12.14-150.75.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-150.75.1.x86_64 as component of SUSE Linux Enterprise Server 15-LTSS",
"product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64"
},
"product_reference": "kernel-syms-4.12.14-150.75.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-vanilla-base-4.12.14-150.75.1.aarch64 as component of SUSE Linux Enterprise Server 15-LTSS",
"product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64"
},
"product_reference": "kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-vanilla-base-4.12.14-150.75.1.ppc64le as component of SUSE Linux Enterprise Server 15-LTSS",
"product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le"
},
"product_reference": "kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-vanilla-base-4.12.14-150.75.1.s390x as component of SUSE Linux Enterprise Server 15-LTSS",
"product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x"
},
"product_reference": "kernel-vanilla-base-4.12.14-150.75.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-vanilla-base-4.12.14-150.75.1.x86_64 as component of SUSE Linux Enterprise Server 15-LTSS",
"product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64"
},
"product_reference": "kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-4.12.14-150.75.1.aarch64 as component of SUSE Linux Enterprise Server 15-LTSS",
"product_id": "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64"
},
"product_reference": "reiserfs-kmp-default-4.12.14-150.75.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-4.12.14-150.75.1.ppc64le as component of SUSE Linux Enterprise Server 15-LTSS",
"product_id": "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le"
},
"product_reference": "reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-4.12.14-150.75.1.s390x as component of SUSE Linux Enterprise Server 15-LTSS",
"product_id": "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x"
},
"product_reference": "reiserfs-kmp-default-4.12.14-150.75.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-4.12.14-150.75.1.x86_64 as component of SUSE Linux Enterprise Server 15-LTSS",
"product_id": "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64"
},
"product_reference": "reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-150.75.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le"
},
"product_reference": "kernel-default-4.12.14-150.75.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-150.75.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64"
},
"product_reference": "kernel-default-4.12.14-150.75.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-150.75.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le"
},
"product_reference": "kernel-default-base-4.12.14-150.75.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-150.75.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64"
},
"product_reference": "kernel-default-base-4.12.14-150.75.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-150.75.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le"
},
"product_reference": "kernel-default-devel-4.12.14-150.75.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-150.75.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64"
},
"product_reference": "kernel-default-devel-4.12.14-150.75.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-4.12.14-150.75.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch"
},
"product_reference": "kernel-devel-4.12.14-150.75.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-docs-4.12.14-150.75.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch"
},
"product_reference": "kernel-docs-4.12.14-150.75.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-4.12.14-150.75.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch"
},
"product_reference": "kernel-macros-4.12.14-150.75.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.12.14-150.75.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le"
},
"product_reference": "kernel-obs-build-4.12.14-150.75.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.12.14-150.75.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64"
},
"product_reference": "kernel-obs-build-4.12.14-150.75.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-4.12.14-150.75.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch"
},
"product_reference": "kernel-source-4.12.14-150.75.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-150.75.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le"
},
"product_reference": "kernel-syms-4.12.14-150.75.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-150.75.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64"
},
"product_reference": "kernel-syms-4.12.14-150.75.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-vanilla-base-4.12.14-150.75.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le"
},
"product_reference": "kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-vanilla-base-4.12.14-150.75.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64"
},
"product_reference": "kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-4.12.14-150.75.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le"
},
"product_reference": "reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-4.12.14-150.75.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64"
},
"product_reference": "reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2020-24586",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-24586"
}
],
"notes": [
{
"category": "general",
"text": "The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn\u0027t require that received fragments be cleared from memory after (re)connecting to a network. Under the right circumstances, when another device sends fragmented frames encrypted using WEP, CCMP, or GCMP, this can be abused to inject arbitrary network packets and/or exfiltrate user data.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-24586",
"url": "https://www.suse.com/security/cve/CVE-2020-24586"
},
{
"category": "external",
"summary": "SUSE Bug 1185859 for CVE-2020-24586",
"url": "https://bugzilla.suse.com/1185859"
},
{
"category": "external",
"summary": "SUSE Bug 1192868 for CVE-2020-24586",
"url": "https://bugzilla.suse.com/1192868"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-21T09:01:19Z",
"details": "moderate"
}
],
"title": "CVE-2020-24586"
},
{
"cve": "CVE-2020-24587",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-24587"
}
],
"notes": [
{
"category": "general",
"text": "The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn\u0027t require that all fragments of a frame are encrypted under the same key. An adversary can abuse this to decrypt selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP encryption key is periodically renewed.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-24587",
"url": "https://www.suse.com/security/cve/CVE-2020-24587"
},
{
"category": "external",
"summary": "SUSE Bug 1185859 for CVE-2020-24587",
"url": "https://bugzilla.suse.com/1185859"
},
{
"category": "external",
"summary": "SUSE Bug 1185862 for CVE-2020-24587",
"url": "https://bugzilla.suse.com/1185862"
},
{
"category": "external",
"summary": "SUSE Bug 1192868 for CVE-2020-24587",
"url": "https://bugzilla.suse.com/1192868"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-21T09:01:19Z",
"details": "moderate"
}
],
"title": "CVE-2020-24587"
},
{
"cve": "CVE-2020-24588",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-24588"
}
],
"notes": [
{
"category": "general",
"text": "The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn\u0027t require that the A-MSDU flag in the plaintext QoS header field is authenticated. Against devices that support receiving non-SSP A-MSDU frames (which is mandatory as part of 802.11n), an adversary can abuse this to inject arbitrary network packets.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-24588",
"url": "https://www.suse.com/security/cve/CVE-2020-24588"
},
{
"category": "external",
"summary": "SUSE Bug 1185861 for CVE-2020-24588",
"url": "https://bugzilla.suse.com/1185861"
},
{
"category": "external",
"summary": "SUSE Bug 1192868 for CVE-2020-24588",
"url": "https://bugzilla.suse.com/1192868"
},
{
"category": "external",
"summary": "SUSE Bug 1199701 for CVE-2020-24588",
"url": "https://bugzilla.suse.com/1199701"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-21T09:01:19Z",
"details": "moderate"
}
],
"title": "CVE-2020-24588"
},
{
"cve": "CVE-2020-26139",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-26139"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the kernel in NetBSD 7.1. An Access Point (AP) forwards EAPOL frames to other clients even though the sender has not yet successfully authenticated to the AP. This might be abused in projected Wi-Fi networks to launch denial-of-service attacks against connected clients and makes it easier to exploit other vulnerabilities in connected clients.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-26139",
"url": "https://www.suse.com/security/cve/CVE-2020-26139"
},
{
"category": "external",
"summary": "SUSE Bug 1186062 for CVE-2020-26139",
"url": "https://bugzilla.suse.com/1186062"
},
{
"category": "external",
"summary": "SUSE Bug 1192868 for CVE-2020-26139",
"url": "https://bugzilla.suse.com/1192868"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-21T09:01:19Z",
"details": "moderate"
}
],
"title": "CVE-2020-26139"
},
{
"cve": "CVE-2020-26141",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-26141"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the ALFA Windows 10 driver 6.1316.1209 for AWUS036H. The Wi-Fi implementation does not verify the Message Integrity Check (authenticity) of fragmented TKIP frames. An adversary can abuse this to inject and possibly decrypt packets in WPA or WPA2 networks that support the TKIP data-confidentiality protocol.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-26141",
"url": "https://www.suse.com/security/cve/CVE-2020-26141"
},
{
"category": "external",
"summary": "SUSE Bug 1185987 for CVE-2020-26141",
"url": "https://bugzilla.suse.com/1185987"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-21T09:01:19Z",
"details": "moderate"
}
],
"title": "CVE-2020-26141"
},
{
"cve": "CVE-2020-26145",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-26145"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered on Samsung Galaxy S3 i9305 4.4.4 devices. The WEP, WPA, WPA2, and WPA3 implementations accept second (or subsequent) broadcast fragments even when sent in plaintext and process them as full unfragmented frames. An adversary can abuse this to inject arbitrary network packets independent of the network configuration.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-26145",
"url": "https://www.suse.com/security/cve/CVE-2020-26145"
},
{
"category": "external",
"summary": "SUSE Bug 1185860 for CVE-2020-26145",
"url": "https://bugzilla.suse.com/1185860"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-21T09:01:19Z",
"details": "moderate"
}
],
"title": "CVE-2020-26145"
},
{
"cve": "CVE-2020-26147",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-26147"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel 5.8.9. The WEP, WPA, WPA2, and WPA3 implementations reassemble fragments even though some of them were sent in plaintext. This vulnerability can be abused to inject packets and/or exfiltrate selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP data-confidentiality protocol is used.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-26147",
"url": "https://www.suse.com/security/cve/CVE-2020-26147"
},
{
"category": "external",
"summary": "SUSE Bug 1233723 for CVE-2020-26147",
"url": "https://bugzilla.suse.com/1233723"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:L/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-21T09:01:19Z",
"details": "moderate"
}
],
"title": "CVE-2020-26147"
},
{
"cve": "CVE-2020-26558",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-26558"
}
],
"notes": [
{
"category": "general",
"text": "Bluetooth LE and BR/EDR secure pairing in Bluetooth Core Specification 2.1 through 5.2 may permit a nearby man-in-the-middle attacker to identify the Passkey used during pairing (in the Passkey authentication procedure) by reflection of the public key and the authentication evidence of the initiating device, potentially permitting this attacker to complete authenticated pairing with the responding device using the correct Passkey for the pairing session. The attack methodology determines the Passkey value one bit at a time.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-26558",
"url": "https://www.suse.com/security/cve/CVE-2020-26558"
},
{
"category": "external",
"summary": "SUSE Bug 1179610 for CVE-2020-26558",
"url": "https://bugzilla.suse.com/1179610"
},
{
"category": "external",
"summary": "SUSE Bug 1186463 for CVE-2020-26558",
"url": "https://bugzilla.suse.com/1186463"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-21T09:01:19Z",
"details": "moderate"
}
],
"title": "CVE-2020-26558"
},
{
"cve": "CVE-2020-36385",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-36385"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel before 5.10. drivers/infiniband/core/ucma.c has a use-after-free because the ctx is reached via the ctx_list in some ucma_migrate_id situations where ucma_close is called, aka CID-f5449e74802c.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-36385",
"url": "https://www.suse.com/security/cve/CVE-2020-36385"
},
{
"category": "external",
"summary": "SUSE Bug 1187050 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1187050"
},
{
"category": "external",
"summary": "SUSE Bug 1187052 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1187052"
},
{
"category": "external",
"summary": "SUSE Bug 1189302 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1189302"
},
{
"category": "external",
"summary": "SUSE Bug 1196174 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1196174"
},
{
"category": "external",
"summary": "SUSE Bug 1196810 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1196810"
},
{
"category": "external",
"summary": "SUSE Bug 1196914 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1196914"
},
{
"category": "external",
"summary": "SUSE Bug 1200084 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1200084"
},
{
"category": "external",
"summary": "SUSE Bug 1201734 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1201734"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-21T09:01:19Z",
"details": "important"
}
],
"title": "CVE-2020-36385"
},
{
"cve": "CVE-2020-36386",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-36386"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel before 5.8.1. net/bluetooth/hci_event.c has a slab out-of-bounds read in hci_extended_inquiry_result_evt, aka CID-51c19bf3d5cf.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-36386",
"url": "https://www.suse.com/security/cve/CVE-2020-36386"
},
{
"category": "external",
"summary": "SUSE Bug 1187038 for CVE-2020-36386",
"url": "https://bugzilla.suse.com/1187038"
},
{
"category": "external",
"summary": "SUSE Bug 1192868 for CVE-2020-36386",
"url": "https://bugzilla.suse.com/1192868"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-21T09:01:19Z",
"details": "moderate"
}
],
"title": "CVE-2020-36386"
},
{
"cve": "CVE-2021-0129",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-0129"
}
],
"notes": [
{
"category": "general",
"text": "Improper access control in BlueZ may allow an authenticated user to potentially enable information disclosure via adjacent access.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-0129",
"url": "https://www.suse.com/security/cve/CVE-2021-0129"
},
{
"category": "external",
"summary": "SUSE Bug 1186463 for CVE-2021-0129",
"url": "https://bugzilla.suse.com/1186463"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-21T09:01:19Z",
"details": "moderate"
}
],
"title": "CVE-2021-0129"
},
{
"cve": "CVE-2021-0512",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-0512"
}
],
"notes": [
{
"category": "general",
"text": "In __hidinput_change_resolution_multipliers of hid-input.c, there is a possible out of bounds write due to a heap buffer overflow. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-173843328References: Upstream kernel",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-0512",
"url": "https://www.suse.com/security/cve/CVE-2021-0512"
},
{
"category": "external",
"summary": "SUSE Bug 1187595 for CVE-2021-0512",
"url": "https://bugzilla.suse.com/1187595"
},
{
"category": "external",
"summary": "SUSE Bug 1187597 for CVE-2021-0512",
"url": "https://bugzilla.suse.com/1187597"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-21T09:01:19Z",
"details": "important"
}
],
"title": "CVE-2021-0512"
},
{
"cve": "CVE-2021-0605",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-0605"
}
],
"notes": [
{
"category": "general",
"text": "In pfkey_dump of af_key.c, there is a possible out-of-bounds read due to a missing bounds check. This could lead to local information disclosure in the kernel with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-110373476",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-0605",
"url": "https://www.suse.com/security/cve/CVE-2021-0605"
},
{
"category": "external",
"summary": "SUSE Bug 1187601 for CVE-2021-0605",
"url": "https://bugzilla.suse.com/1187601"
},
{
"category": "external",
"summary": "SUSE Bug 1187687 for CVE-2021-0605",
"url": "https://bugzilla.suse.com/1187687"
},
{
"category": "external",
"summary": "SUSE Bug 1188381 for CVE-2021-0605",
"url": "https://bugzilla.suse.com/1188381"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-21T09:01:19Z",
"details": "important"
}
],
"title": "CVE-2021-0605"
},
{
"cve": "CVE-2021-22555",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-22555"
}
],
"notes": [
{
"category": "general",
"text": "A heap out-of-bounds write affecting Linux since v2.6.19-rc1 was discovered in net/netfilter/x_tables.c. This allows an attacker to gain privileges or cause a DoS (via heap memory corruption) through user name space",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-22555",
"url": "https://www.suse.com/security/cve/CVE-2021-22555"
},
{
"category": "external",
"summary": "SUSE Bug 1188116 for CVE-2021-22555",
"url": "https://bugzilla.suse.com/1188116"
},
{
"category": "external",
"summary": "SUSE Bug 1188117 for CVE-2021-22555",
"url": "https://bugzilla.suse.com/1188117"
},
{
"category": "external",
"summary": "SUSE Bug 1188411 for CVE-2021-22555",
"url": "https://bugzilla.suse.com/1188411"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-21T09:01:19Z",
"details": "important"
}
],
"title": "CVE-2021-22555"
},
{
"cve": "CVE-2021-23133",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-23133"
}
],
"notes": [
{
"category": "general",
"text": "A race condition in Linux kernel SCTP sockets (net/sctp/socket.c) before 5.12-rc8 can lead to kernel privilege escalation from the context of a network service or an unprivileged process. If sctp_destroy_sock is called without sock_net(sk)-\u003esctp.addr_wq_lock then an element is removed from the auto_asconf_splist list without any proper locking. This can be exploited by an attacker with network service privileges to escalate to root or from the context of an unprivileged user directly if a BPF_CGROUP_INET_SOCK_CREATE is attached which denies creation of some SCTP socket.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-23133",
"url": "https://www.suse.com/security/cve/CVE-2021-23133"
},
{
"category": "external",
"summary": "SUSE Bug 1184675 for CVE-2021-23133",
"url": "https://bugzilla.suse.com/1184675"
},
{
"category": "external",
"summary": "SUSE Bug 1185901 for CVE-2021-23133",
"url": "https://bugzilla.suse.com/1185901"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-21T09:01:19Z",
"details": "moderate"
}
],
"title": "CVE-2021-23133"
},
{
"cve": "CVE-2021-23134",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-23134"
}
],
"notes": [
{
"category": "general",
"text": "Use After Free vulnerability in nfc sockets in the Linux Kernel before 5.12.4 allows local attackers to elevate their privileges. In typical configurations, the issue can only be triggered by a privileged local user with the CAP_NET_RAW capability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-23134",
"url": "https://www.suse.com/security/cve/CVE-2021-23134"
},
{
"category": "external",
"summary": "SUSE Bug 1186060 for CVE-2021-23134",
"url": "https://bugzilla.suse.com/1186060"
},
{
"category": "external",
"summary": "SUSE Bug 1186061 for CVE-2021-23134",
"url": "https://bugzilla.suse.com/1186061"
},
{
"category": "external",
"summary": "SUSE Bug 1220739 for CVE-2021-23134",
"url": "https://bugzilla.suse.com/1220739"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-21T09:01:19Z",
"details": "important"
}
],
"title": "CVE-2021-23134"
},
{
"cve": "CVE-2021-32399",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-32399"
}
],
"notes": [
{
"category": "general",
"text": "net/bluetooth/hci_request.c in the Linux kernel through 5.12.2 has a race condition for removal of the HCI controller.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-32399",
"url": "https://www.suse.com/security/cve/CVE-2021-32399"
},
{
"category": "external",
"summary": "SUSE Bug 1184611 for CVE-2021-32399",
"url": "https://bugzilla.suse.com/1184611"
},
{
"category": "external",
"summary": "SUSE Bug 1185898 for CVE-2021-32399",
"url": "https://bugzilla.suse.com/1185898"
},
{
"category": "external",
"summary": "SUSE Bug 1185899 for CVE-2021-32399",
"url": "https://bugzilla.suse.com/1185899"
},
{
"category": "external",
"summary": "SUSE Bug 1196174 for CVE-2021-32399",
"url": "https://bugzilla.suse.com/1196174"
},
{
"category": "external",
"summary": "SUSE Bug 1200084 for CVE-2021-32399",
"url": "https://bugzilla.suse.com/1200084"
},
{
"category": "external",
"summary": "SUSE Bug 1201734 for CVE-2021-32399",
"url": "https://bugzilla.suse.com/1201734"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-21T09:01:19Z",
"details": "important"
}
],
"title": "CVE-2021-32399"
},
{
"cve": "CVE-2021-33034",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-33034"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel before 5.12.4, net/bluetooth/hci_event.c has a use-after-free when destroying an hci_chan, aka CID-5c4c8c954409. This leads to writing an arbitrary value.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-33034",
"url": "https://www.suse.com/security/cve/CVE-2021-33034"
},
{
"category": "external",
"summary": "SUSE Bug 1186111 for CVE-2021-33034",
"url": "https://bugzilla.suse.com/1186111"
},
{
"category": "external",
"summary": "SUSE Bug 1186285 for CVE-2021-33034",
"url": "https://bugzilla.suse.com/1186285"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-21T09:01:19Z",
"details": "important"
}
],
"title": "CVE-2021-33034"
},
{
"cve": "CVE-2021-33200",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-33200"
}
],
"notes": [
{
"category": "general",
"text": "kernel/bpf/verifier.c in the Linux kernel through 5.12.7 enforces incorrect limits for pointer arithmetic operations, aka CID-bb01a1bba579. This can be abused to perform out-of-bounds reads and writes in kernel memory, leading to local privilege escalation to root. In particular, there is a corner case where the off reg causes a masking direction change, which then results in an incorrect final aux-\u003ealu_limit.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-33200",
"url": "https://www.suse.com/security/cve/CVE-2021-33200"
},
{
"category": "external",
"summary": "SUSE Bug 1186484 for CVE-2021-33200",
"url": "https://bugzilla.suse.com/1186484"
},
{
"category": "external",
"summary": "SUSE Bug 1186498 for CVE-2021-33200",
"url": "https://bugzilla.suse.com/1186498"
},
{
"category": "external",
"summary": "SUSE Bug 1224878 for CVE-2021-33200",
"url": "https://bugzilla.suse.com/1224878"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-21T09:01:19Z",
"details": "important"
}
],
"title": "CVE-2021-33200"
},
{
"cve": "CVE-2021-33624",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-33624"
}
],
"notes": [
{
"category": "general",
"text": "In kernel/bpf/verifier.c in the Linux kernel before 5.12.13, a branch can be mispredicted (e.g., because of type confusion) and consequently an unprivileged BPF program can read arbitrary memory locations via a side-channel attack, aka CID-9183671af6db.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-33624",
"url": "https://www.suse.com/security/cve/CVE-2021-33624"
},
{
"category": "external",
"summary": "SUSE Bug 1187554 for CVE-2021-33624",
"url": "https://bugzilla.suse.com/1187554"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-21T09:01:19Z",
"details": "moderate"
}
],
"title": "CVE-2021-33624"
},
{
"cve": "CVE-2021-33909",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-33909"
}
],
"notes": [
{
"category": "general",
"text": "fs/seq_file.c in the Linux kernel 3.16 through 5.13.x before 5.13.4 does not properly restrict seq buffer allocations, leading to an integer overflow, an Out-of-bounds Write, and escalation to root by an unprivileged user, aka CID-8cae8cd89f05.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-33909",
"url": "https://www.suse.com/security/cve/CVE-2021-33909"
},
{
"category": "external",
"summary": "SUSE Bug 1188062 for CVE-2021-33909",
"url": "https://bugzilla.suse.com/1188062"
},
{
"category": "external",
"summary": "SUSE Bug 1188063 for CVE-2021-33909",
"url": "https://bugzilla.suse.com/1188063"
},
{
"category": "external",
"summary": "SUSE Bug 1188257 for CVE-2021-33909",
"url": "https://bugzilla.suse.com/1188257"
},
{
"category": "external",
"summary": "SUSE Bug 1189302 for CVE-2021-33909",
"url": "https://bugzilla.suse.com/1189302"
},
{
"category": "external",
"summary": "SUSE Bug 1190859 for CVE-2021-33909",
"url": "https://bugzilla.suse.com/1190859"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-21T09:01:19Z",
"details": "important"
}
],
"title": "CVE-2021-33909"
},
{
"cve": "CVE-2021-34693",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-34693"
}
],
"notes": [
{
"category": "general",
"text": "net/can/bcm.c in the Linux kernel through 5.12.10 allows local users to obtain sensitive information from kernel stack memory because parts of a data structure are uninitialized.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-34693",
"url": "https://www.suse.com/security/cve/CVE-2021-34693"
},
{
"category": "external",
"summary": "SUSE Bug 1187452 for CVE-2021-34693",
"url": "https://bugzilla.suse.com/1187452"
},
{
"category": "external",
"summary": "SUSE Bug 1192868 for CVE-2021-34693",
"url": "https://bugzilla.suse.com/1192868"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-21T09:01:19Z",
"details": "moderate"
}
],
"title": "CVE-2021-34693"
},
{
"cve": "CVE-2021-3491",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3491"
}
],
"notes": [
{
"category": "general",
"text": "The io_uring subsystem in the Linux kernel allowed the MAX_RW_COUNT limit to be bypassed in the PROVIDE_BUFFERS operation, which led to negative values being usedin mem_rw when reading /proc/\u003cPID\u003e/mem. This could be used to create a heap overflow leading to arbitrary code execution in the kernel. It was addressed via commit d1f82808877b (\"io_uring: truncate lengths larger than MAX_RW_COUNT on provide buffers\") (v5.13-rc1) and backported to the stable kernels in v5.12.4, v5.11.21, and v5.10.37. It was introduced in ddf0322db79c (\"io_uring: add IORING_OP_PROVIDE_BUFFERS\") (v5.7-rc1).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3491",
"url": "https://www.suse.com/security/cve/CVE-2021-3491"
},
{
"category": "external",
"summary": "SUSE Bug 1185642 for CVE-2021-3491",
"url": "https://bugzilla.suse.com/1185642"
},
{
"category": "external",
"summary": "SUSE Bug 1187090 for CVE-2021-3491",
"url": "https://bugzilla.suse.com/1187090"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-21T09:01:19Z",
"details": "important"
}
],
"title": "CVE-2021-3491"
},
{
"cve": "CVE-2021-3609",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3609"
}
],
"notes": [
{
"category": "general",
"text": ".A flaw was found in the CAN BCM networking protocol in the Linux kernel, where a local attacker can abuse a flaw in the CAN subsystem to corrupt memory, crash the system or escalate privileges. This race condition in net/can/bcm.c in the Linux kernel allows for local privilege escalation to root.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3609",
"url": "https://www.suse.com/security/cve/CVE-2021-3609"
},
{
"category": "external",
"summary": "SUSE Bug 1187215 for CVE-2021-3609",
"url": "https://bugzilla.suse.com/1187215"
},
{
"category": "external",
"summary": "SUSE Bug 1188323 for CVE-2021-3609",
"url": "https://bugzilla.suse.com/1188323"
},
{
"category": "external",
"summary": "SUSE Bug 1188720 for CVE-2021-3609",
"url": "https://bugzilla.suse.com/1188720"
},
{
"category": "external",
"summary": "SUSE Bug 1190276 for CVE-2021-3609",
"url": "https://bugzilla.suse.com/1190276"
},
{
"category": "external",
"summary": "SUSE Bug 1196810 for CVE-2021-3609",
"url": "https://bugzilla.suse.com/1196810"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-21T09:01:19Z",
"details": "moderate"
}
],
"title": "CVE-2021-3609"
}
]
}
suse-su-2021:2291-1
Vulnerability from csaf_suse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for bluez",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for bluez fixes the following issues:\n\n- CVE-2021-0129,CVE-2020-26558: Check bluetooth security flags (bsc#1186463).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2021-2291,SUSE-SLE-Module-Basesystem-15-SP3-2021-2291,SUSE-SLE-Module-Desktop-Applications-15-SP3-2021-2291,SUSE-SLE-Product-WE-15-SP3-2021-2291",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2021_2291-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2021:2291-1",
"url": "https://www.suse.com/support/update/announcement/2021/suse-su-20212291-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2021:2291-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2021-July/009123.html"
},
{
"category": "self",
"summary": "SUSE Bug 1186463",
"url": "https://bugzilla.suse.com/1186463"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-26558 page",
"url": "https://www.suse.com/security/cve/CVE-2020-26558/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-0129 page",
"url": "https://www.suse.com/security/cve/CVE-2021-0129/"
}
],
"title": "Security update for bluez",
"tracking": {
"current_release_date": "2021-07-12T06:23:59Z",
"generator": {
"date": "2021-07-12T06:23:59Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2021:2291-1",
"initial_release_date": "2021-07-12T06:23:59Z",
"revision_history": [
{
"date": "2021-07-12T06:23:59Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "bluez-5.55-3.3.1.aarch64",
"product": {
"name": "bluez-5.55-3.3.1.aarch64",
"product_id": "bluez-5.55-3.3.1.aarch64"
}
},
{
"category": "product_version",
"name": "bluez-cups-5.55-3.3.1.aarch64",
"product": {
"name": "bluez-cups-5.55-3.3.1.aarch64",
"product_id": "bluez-cups-5.55-3.3.1.aarch64"
}
},
{
"category": "product_version",
"name": "bluez-deprecated-5.55-3.3.1.aarch64",
"product": {
"name": "bluez-deprecated-5.55-3.3.1.aarch64",
"product_id": "bluez-deprecated-5.55-3.3.1.aarch64"
}
},
{
"category": "product_version",
"name": "bluez-devel-5.55-3.3.1.aarch64",
"product": {
"name": "bluez-devel-5.55-3.3.1.aarch64",
"product_id": "bluez-devel-5.55-3.3.1.aarch64"
}
},
{
"category": "product_version",
"name": "bluez-test-5.55-3.3.1.aarch64",
"product": {
"name": "bluez-test-5.55-3.3.1.aarch64",
"product_id": "bluez-test-5.55-3.3.1.aarch64"
}
},
{
"category": "product_version",
"name": "libbluetooth3-5.55-3.3.1.aarch64",
"product": {
"name": "libbluetooth3-5.55-3.3.1.aarch64",
"product_id": "libbluetooth3-5.55-3.3.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "bluez-devel-64bit-5.55-3.3.1.aarch64_ilp32",
"product": {
"name": "bluez-devel-64bit-5.55-3.3.1.aarch64_ilp32",
"product_id": "bluez-devel-64bit-5.55-3.3.1.aarch64_ilp32"
}
},
{
"category": "product_version",
"name": "libbluetooth3-64bit-5.55-3.3.1.aarch64_ilp32",
"product": {
"name": "libbluetooth3-64bit-5.55-3.3.1.aarch64_ilp32",
"product_id": "libbluetooth3-64bit-5.55-3.3.1.aarch64_ilp32"
}
}
],
"category": "architecture",
"name": "aarch64_ilp32"
},
{
"branches": [
{
"category": "product_version",
"name": "bluez-5.55-3.3.1.i586",
"product": {
"name": "bluez-5.55-3.3.1.i586",
"product_id": "bluez-5.55-3.3.1.i586"
}
},
{
"category": "product_version",
"name": "bluez-cups-5.55-3.3.1.i586",
"product": {
"name": "bluez-cups-5.55-3.3.1.i586",
"product_id": "bluez-cups-5.55-3.3.1.i586"
}
},
{
"category": "product_version",
"name": "bluez-deprecated-5.55-3.3.1.i586",
"product": {
"name": "bluez-deprecated-5.55-3.3.1.i586",
"product_id": "bluez-deprecated-5.55-3.3.1.i586"
}
},
{
"category": "product_version",
"name": "bluez-devel-5.55-3.3.1.i586",
"product": {
"name": "bluez-devel-5.55-3.3.1.i586",
"product_id": "bluez-devel-5.55-3.3.1.i586"
}
},
{
"category": "product_version",
"name": "bluez-test-5.55-3.3.1.i586",
"product": {
"name": "bluez-test-5.55-3.3.1.i586",
"product_id": "bluez-test-5.55-3.3.1.i586"
}
},
{
"category": "product_version",
"name": "libbluetooth3-5.55-3.3.1.i586",
"product": {
"name": "libbluetooth3-5.55-3.3.1.i586",
"product_id": "libbluetooth3-5.55-3.3.1.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "bluez-auto-enable-devices-5.55-3.3.1.noarch",
"product": {
"name": "bluez-auto-enable-devices-5.55-3.3.1.noarch",
"product_id": "bluez-auto-enable-devices-5.55-3.3.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "bluez-5.55-3.3.1.ppc64le",
"product": {
"name": "bluez-5.55-3.3.1.ppc64le",
"product_id": "bluez-5.55-3.3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "bluez-cups-5.55-3.3.1.ppc64le",
"product": {
"name": "bluez-cups-5.55-3.3.1.ppc64le",
"product_id": "bluez-cups-5.55-3.3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "bluez-deprecated-5.55-3.3.1.ppc64le",
"product": {
"name": "bluez-deprecated-5.55-3.3.1.ppc64le",
"product_id": "bluez-deprecated-5.55-3.3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "bluez-devel-5.55-3.3.1.ppc64le",
"product": {
"name": "bluez-devel-5.55-3.3.1.ppc64le",
"product_id": "bluez-devel-5.55-3.3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "bluez-test-5.55-3.3.1.ppc64le",
"product": {
"name": "bluez-test-5.55-3.3.1.ppc64le",
"product_id": "bluez-test-5.55-3.3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libbluetooth3-5.55-3.3.1.ppc64le",
"product": {
"name": "libbluetooth3-5.55-3.3.1.ppc64le",
"product_id": "libbluetooth3-5.55-3.3.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "bluez-5.55-3.3.1.s390x",
"product": {
"name": "bluez-5.55-3.3.1.s390x",
"product_id": "bluez-5.55-3.3.1.s390x"
}
},
{
"category": "product_version",
"name": "bluez-cups-5.55-3.3.1.s390x",
"product": {
"name": "bluez-cups-5.55-3.3.1.s390x",
"product_id": "bluez-cups-5.55-3.3.1.s390x"
}
},
{
"category": "product_version",
"name": "bluez-deprecated-5.55-3.3.1.s390x",
"product": {
"name": "bluez-deprecated-5.55-3.3.1.s390x",
"product_id": "bluez-deprecated-5.55-3.3.1.s390x"
}
},
{
"category": "product_version",
"name": "bluez-devel-5.55-3.3.1.s390x",
"product": {
"name": "bluez-devel-5.55-3.3.1.s390x",
"product_id": "bluez-devel-5.55-3.3.1.s390x"
}
},
{
"category": "product_version",
"name": "bluez-test-5.55-3.3.1.s390x",
"product": {
"name": "bluez-test-5.55-3.3.1.s390x",
"product_id": "bluez-test-5.55-3.3.1.s390x"
}
},
{
"category": "product_version",
"name": "libbluetooth3-5.55-3.3.1.s390x",
"product": {
"name": "libbluetooth3-5.55-3.3.1.s390x",
"product_id": "libbluetooth3-5.55-3.3.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "bluez-5.55-3.3.1.x86_64",
"product": {
"name": "bluez-5.55-3.3.1.x86_64",
"product_id": "bluez-5.55-3.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "bluez-cups-5.55-3.3.1.x86_64",
"product": {
"name": "bluez-cups-5.55-3.3.1.x86_64",
"product_id": "bluez-cups-5.55-3.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "bluez-deprecated-5.55-3.3.1.x86_64",
"product": {
"name": "bluez-deprecated-5.55-3.3.1.x86_64",
"product_id": "bluez-deprecated-5.55-3.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "bluez-devel-5.55-3.3.1.x86_64",
"product": {
"name": "bluez-devel-5.55-3.3.1.x86_64",
"product_id": "bluez-devel-5.55-3.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "bluez-devel-32bit-5.55-3.3.1.x86_64",
"product": {
"name": "bluez-devel-32bit-5.55-3.3.1.x86_64",
"product_id": "bluez-devel-32bit-5.55-3.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "bluez-test-5.55-3.3.1.x86_64",
"product": {
"name": "bluez-test-5.55-3.3.1.x86_64",
"product_id": "bluez-test-5.55-3.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "libbluetooth3-5.55-3.3.1.x86_64",
"product": {
"name": "libbluetooth3-5.55-3.3.1.x86_64",
"product_id": "libbluetooth3-5.55-3.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "libbluetooth3-32bit-5.55-3.3.1.x86_64",
"product": {
"name": "libbluetooth3-32bit-5.55-3.3.1.x86_64",
"product_id": "libbluetooth3-32bit-5.55-3.3.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Basesystem 15 SP3",
"product": {
"name": "SUSE Linux Enterprise Module for Basesystem 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-basesystem:15:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Desktop Applications 15 SP3",
"product": {
"name": "SUSE Linux Enterprise Module for Desktop Applications 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Desktop Applications 15 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-desktop-applications:15:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Workstation Extension 15 SP3",
"product": {
"name": "SUSE Linux Enterprise Workstation Extension 15 SP3",
"product_id": "SUSE Linux Enterprise Workstation Extension 15 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-we:15:sp3"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "bluez-5.55-3.3.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:bluez-5.55-3.3.1.aarch64"
},
"product_reference": "bluez-5.55-3.3.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bluez-5.55-3.3.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:bluez-5.55-3.3.1.ppc64le"
},
"product_reference": "bluez-5.55-3.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bluez-5.55-3.3.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:bluez-5.55-3.3.1.s390x"
},
"product_reference": "bluez-5.55-3.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bluez-5.55-3.3.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:bluez-5.55-3.3.1.x86_64"
},
"product_reference": "bluez-5.55-3.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libbluetooth3-5.55-3.3.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:libbluetooth3-5.55-3.3.1.aarch64"
},
"product_reference": "libbluetooth3-5.55-3.3.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libbluetooth3-5.55-3.3.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:libbluetooth3-5.55-3.3.1.ppc64le"
},
"product_reference": "libbluetooth3-5.55-3.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libbluetooth3-5.55-3.3.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:libbluetooth3-5.55-3.3.1.s390x"
},
"product_reference": "libbluetooth3-5.55-3.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libbluetooth3-5.55-3.3.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:libbluetooth3-5.55-3.3.1.x86_64"
},
"product_reference": "libbluetooth3-5.55-3.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bluez-devel-5.55-3.3.1.aarch64 as component of SUSE Linux Enterprise Module for Desktop Applications 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:bluez-devel-5.55-3.3.1.aarch64"
},
"product_reference": "bluez-devel-5.55-3.3.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Desktop Applications 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bluez-devel-5.55-3.3.1.ppc64le as component of SUSE Linux Enterprise Module for Desktop Applications 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:bluez-devel-5.55-3.3.1.ppc64le"
},
"product_reference": "bluez-devel-5.55-3.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Desktop Applications 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bluez-devel-5.55-3.3.1.s390x as component of SUSE Linux Enterprise Module for Desktop Applications 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:bluez-devel-5.55-3.3.1.s390x"
},
"product_reference": "bluez-devel-5.55-3.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Desktop Applications 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bluez-devel-5.55-3.3.1.x86_64 as component of SUSE Linux Enterprise Module for Desktop Applications 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:bluez-devel-5.55-3.3.1.x86_64"
},
"product_reference": "bluez-devel-5.55-3.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Desktop Applications 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bluez-cups-5.55-3.3.1.x86_64 as component of SUSE Linux Enterprise Workstation Extension 15 SP3",
"product_id": "SUSE Linux Enterprise Workstation Extension 15 SP3:bluez-cups-5.55-3.3.1.x86_64"
},
"product_reference": "bluez-cups-5.55-3.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Workstation Extension 15 SP3"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2020-26558",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-26558"
}
],
"notes": [
{
"category": "general",
"text": "Bluetooth LE and BR/EDR secure pairing in Bluetooth Core Specification 2.1 through 5.2 may permit a nearby man-in-the-middle attacker to identify the Passkey used during pairing (in the Passkey authentication procedure) by reflection of the public key and the authentication evidence of the initiating device, potentially permitting this attacker to complete authenticated pairing with the responding device using the correct Passkey for the pairing session. The attack methodology determines the Passkey value one bit at a time.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15 SP3:bluez-5.55-3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:bluez-5.55-3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:bluez-5.55-3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:bluez-5.55-3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:libbluetooth3-5.55-3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:libbluetooth3-5.55-3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:libbluetooth3-5.55-3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:libbluetooth3-5.55-3.3.1.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP3:bluez-devel-5.55-3.3.1.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP3:bluez-devel-5.55-3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP3:bluez-devel-5.55-3.3.1.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP3:bluez-devel-5.55-3.3.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:bluez-cups-5.55-3.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-26558",
"url": "https://www.suse.com/security/cve/CVE-2020-26558"
},
{
"category": "external",
"summary": "SUSE Bug 1179610 for CVE-2020-26558",
"url": "https://bugzilla.suse.com/1179610"
},
{
"category": "external",
"summary": "SUSE Bug 1186463 for CVE-2020-26558",
"url": "https://bugzilla.suse.com/1186463"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15 SP3:bluez-5.55-3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:bluez-5.55-3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:bluez-5.55-3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:bluez-5.55-3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:libbluetooth3-5.55-3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:libbluetooth3-5.55-3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:libbluetooth3-5.55-3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:libbluetooth3-5.55-3.3.1.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP3:bluez-devel-5.55-3.3.1.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP3:bluez-devel-5.55-3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP3:bluez-devel-5.55-3.3.1.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP3:bluez-devel-5.55-3.3.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:bluez-cups-5.55-3.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15 SP3:bluez-5.55-3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:bluez-5.55-3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:bluez-5.55-3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:bluez-5.55-3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:libbluetooth3-5.55-3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:libbluetooth3-5.55-3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:libbluetooth3-5.55-3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:libbluetooth3-5.55-3.3.1.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP3:bluez-devel-5.55-3.3.1.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP3:bluez-devel-5.55-3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP3:bluez-devel-5.55-3.3.1.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP3:bluez-devel-5.55-3.3.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:bluez-cups-5.55-3.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-12T06:23:59Z",
"details": "moderate"
}
],
"title": "CVE-2020-26558"
},
{
"cve": "CVE-2021-0129",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-0129"
}
],
"notes": [
{
"category": "general",
"text": "Improper access control in BlueZ may allow an authenticated user to potentially enable information disclosure via adjacent access.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15 SP3:bluez-5.55-3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:bluez-5.55-3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:bluez-5.55-3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:bluez-5.55-3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:libbluetooth3-5.55-3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:libbluetooth3-5.55-3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:libbluetooth3-5.55-3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:libbluetooth3-5.55-3.3.1.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP3:bluez-devel-5.55-3.3.1.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP3:bluez-devel-5.55-3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP3:bluez-devel-5.55-3.3.1.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP3:bluez-devel-5.55-3.3.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:bluez-cups-5.55-3.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-0129",
"url": "https://www.suse.com/security/cve/CVE-2021-0129"
},
{
"category": "external",
"summary": "SUSE Bug 1186463 for CVE-2021-0129",
"url": "https://bugzilla.suse.com/1186463"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15 SP3:bluez-5.55-3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:bluez-5.55-3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:bluez-5.55-3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:bluez-5.55-3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:libbluetooth3-5.55-3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:libbluetooth3-5.55-3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:libbluetooth3-5.55-3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:libbluetooth3-5.55-3.3.1.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP3:bluez-devel-5.55-3.3.1.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP3:bluez-devel-5.55-3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP3:bluez-devel-5.55-3.3.1.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP3:bluez-devel-5.55-3.3.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:bluez-cups-5.55-3.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15 SP3:bluez-5.55-3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:bluez-5.55-3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:bluez-5.55-3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:bluez-5.55-3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:libbluetooth3-5.55-3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:libbluetooth3-5.55-3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:libbluetooth3-5.55-3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:libbluetooth3-5.55-3.3.1.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP3:bluez-devel-5.55-3.3.1.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP3:bluez-devel-5.55-3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP3:bluez-devel-5.55-3.3.1.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP3:bluez-devel-5.55-3.3.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:bluez-cups-5.55-3.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-12T06:23:59Z",
"details": "moderate"
}
],
"title": "CVE-2021-0129"
}
]
}
suse-su-2021:2422-1
Vulnerability from csaf_suse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel",
"title": "Title of the patch"
},
{
"category": "description",
"text": "\nThe SUSE Linux Enterprise 12 SP4 LTSS kernel was updated to receive various security and bugfixes.\n\nThe following security bugs were fixed:\n\n- CVE-2021-22555: A heap out-of-bounds write was discovered in net/netfilter/x_tables.c (bnc#1188116).\n- CVE-2021-33909: Extremely large seq buffer allocations in seq_file could lead to buffer underruns and code execution (bsc#1188062).\n- CVE-2021-3609: A use-after-free in can/bcm could have led to privilege escalation (bsc#1187215).\n- CVE-2021-33624: In kernel/bpf/verifier.c a branch can be mispredicted (e.g., because of type confusion) and consequently an unprivileged BPF program can read arbitrary memory locations via a side-channel attack, aka CID-9183671af6db (bnc#1187554).\n- CVE-2021-0605: In pfkey_dump of af_key.c, there is a possible out-of-bounds read due to a missing bounds check. This could lead to local information disclosure in the kernel with System execution privileges needed. User interaction is not needed for exploitation (bnc#1187601).\n- CVE-2021-0512: In __hidinput_change_resolution_multipliers of hid-input.c, there is a possible out of bounds write due to a heap buffer overflow. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation (bnc#1187595).\n- CVE-2020-26558: Bluetooth LE and BR/EDR secure pairing in Bluetooth Core Specification 2.1 may permit a nearby man-in-the-middle attacker to identify the Passkey used during pairing (in the Passkey authentication procedure) by reflection of the public key and the authentication evidence of the initiating device, potentially permitting this attacker to complete authenticated pairing with the responding device using the correct Passkey for the pairing session. The attack methodology determines the Passkey value one bit at a time (bnc#1179610 bnc#1186463).\n- CVE-2021-34693: net/can/bcm.c allowed local users to obtain sensitive information from kernel stack memory because parts of a data structure are uninitialized (bnc#1187452).\n- CVE-2020-36385: An issue was discovered in drivers/infiniband/core/ucma.c has a use-after-free because the ctx is reached via the ctx_list in some ucma_migrate_id situations where ucma_close is called, aka CID-f5449e74802c (bnc#1187050).\n- CVE-2021-0129: Improper access control in BlueZ may have allowed an authenticated user to potentially enable information disclosure via adjacent access (bnc#1186463).\n- CVE-2020-36386: An issue was discovered net/bluetooth/hci_event.c has a slab out-of-bounds read in hci_extended_inquiry_result_evt, aka CID-51c19bf3d5cf (bnc#1187038).\n- CVE-2020-24588: The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn\u0027t require that the A-MSDU flag in the plaintext QoS header field is authenticated. Against devices that support receiving non-SSP A-MSDU frames (which is mandatory as part of 802.11n), an adversary can abuse this to inject arbitrary network packets (bnc#1185861).\n- CVE-2021-33200: kernel/bpf/verifier.c enforced incorrect limits for pointer arithmetic operations, aka CID-bb01a1bba579. This can be abused to perform out-of-bounds reads and writes in kernel memory, leading to local privilege escalation to root. In particular, there is a corner case where the off reg causes a masking direction change, which then results in an incorrect final aux-\u003ealu_limit (bnc#1186484).\n\nThe following non-security bugs were fixed:\n\n- block: do not use blocking queue entered for recursive bio (bsc#1104967).\n- s390/stack: fix possible register corruption with stack switch helper (git-fixes).\n- scsi: scsi_dh_alua: Retry RTPG on a different path after failure (bsc#1174978 bsc#1185701).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2021-2422,SUSE-OpenStack-Cloud-9-2021-2422,SUSE-OpenStack-Cloud-Crowbar-9-2021-2422,SUSE-SLE-HA-12-SP4-2021-2422,SUSE-SLE-Live-Patching-12-SP4-2021-2422,SUSE-SLE-SAP-12-SP4-2021-2422,SUSE-SLE-SERVER-12-SP4-LTSS-2021-2422",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2021_2422-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2021:2422-1",
"url": "https://www.suse.com/support/update/announcement/2021/suse-su-20212422-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2021:2422-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2021-July/009191.html"
},
{
"category": "self",
"summary": "SUSE Bug 1104967",
"url": "https://bugzilla.suse.com/1104967"
},
{
"category": "self",
"summary": "SUSE Bug 1174978",
"url": "https://bugzilla.suse.com/1174978"
},
{
"category": "self",
"summary": "SUSE Bug 1179610",
"url": "https://bugzilla.suse.com/1179610"
},
{
"category": "self",
"summary": "SUSE Bug 1185701",
"url": "https://bugzilla.suse.com/1185701"
},
{
"category": "self",
"summary": "SUSE Bug 1185861",
"url": "https://bugzilla.suse.com/1185861"
},
{
"category": "self",
"summary": "SUSE Bug 1186463",
"url": "https://bugzilla.suse.com/1186463"
},
{
"category": "self",
"summary": "SUSE Bug 1186484",
"url": "https://bugzilla.suse.com/1186484"
},
{
"category": "self",
"summary": "SUSE Bug 1187038",
"url": "https://bugzilla.suse.com/1187038"
},
{
"category": "self",
"summary": "SUSE Bug 1187050",
"url": "https://bugzilla.suse.com/1187050"
},
{
"category": "self",
"summary": "SUSE Bug 1187215",
"url": "https://bugzilla.suse.com/1187215"
},
{
"category": "self",
"summary": "SUSE Bug 1187452",
"url": "https://bugzilla.suse.com/1187452"
},
{
"category": "self",
"summary": "SUSE Bug 1187554",
"url": "https://bugzilla.suse.com/1187554"
},
{
"category": "self",
"summary": "SUSE Bug 1187595",
"url": "https://bugzilla.suse.com/1187595"
},
{
"category": "self",
"summary": "SUSE Bug 1187601",
"url": "https://bugzilla.suse.com/1187601"
},
{
"category": "self",
"summary": "SUSE Bug 1187934",
"url": "https://bugzilla.suse.com/1187934"
},
{
"category": "self",
"summary": "SUSE Bug 1188062",
"url": "https://bugzilla.suse.com/1188062"
},
{
"category": "self",
"summary": "SUSE Bug 1188116",
"url": "https://bugzilla.suse.com/1188116"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-24588 page",
"url": "https://www.suse.com/security/cve/CVE-2020-24588/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-26558 page",
"url": "https://www.suse.com/security/cve/CVE-2020-26558/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-36385 page",
"url": "https://www.suse.com/security/cve/CVE-2020-36385/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-36386 page",
"url": "https://www.suse.com/security/cve/CVE-2020-36386/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-0129 page",
"url": "https://www.suse.com/security/cve/CVE-2021-0129/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-0512 page",
"url": "https://www.suse.com/security/cve/CVE-2021-0512/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-0605 page",
"url": "https://www.suse.com/security/cve/CVE-2021-0605/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-22555 page",
"url": "https://www.suse.com/security/cve/CVE-2021-22555/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-33200 page",
"url": "https://www.suse.com/security/cve/CVE-2021-33200/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-33624 page",
"url": "https://www.suse.com/security/cve/CVE-2021-33624/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-33909 page",
"url": "https://www.suse.com/security/cve/CVE-2021-33909/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-34693 page",
"url": "https://www.suse.com/security/cve/CVE-2021-34693/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3609 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3609/"
}
],
"title": "Security update for the Linux Kernel",
"tracking": {
"current_release_date": "2021-07-21T09:02:38Z",
"generator": {
"date": "2021-07-21T09:02:38Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2021:2422-1",
"initial_release_date": "2021-07-21T09:02:38Z",
"revision_history": [
{
"date": "2021-07-21T09:02:38Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-4.12.14-95.80.1.aarch64",
"product": {
"name": "cluster-md-kmp-default-4.12.14-95.80.1.aarch64",
"product_id": "cluster-md-kmp-default-4.12.14-95.80.1.aarch64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-4.12.14-95.80.1.aarch64",
"product": {
"name": "dlm-kmp-default-4.12.14-95.80.1.aarch64",
"product_id": "dlm-kmp-default-4.12.14-95.80.1.aarch64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-4.12.14-95.80.1.aarch64",
"product": {
"name": "gfs2-kmp-default-4.12.14-95.80.1.aarch64",
"product_id": "gfs2-kmp-default-4.12.14-95.80.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-4.12.14-95.80.1.aarch64",
"product": {
"name": "kernel-default-4.12.14-95.80.1.aarch64",
"product_id": "kernel-default-4.12.14-95.80.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-4.12.14-95.80.1.aarch64",
"product": {
"name": "kernel-default-base-4.12.14-95.80.1.aarch64",
"product_id": "kernel-default-base-4.12.14-95.80.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-4.12.14-95.80.1.aarch64",
"product": {
"name": "kernel-default-devel-4.12.14-95.80.1.aarch64",
"product_id": "kernel-default-devel-4.12.14-95.80.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-4.12.14-95.80.1.aarch64",
"product": {
"name": "kernel-default-extra-4.12.14-95.80.1.aarch64",
"product_id": "kernel-default-extra-4.12.14-95.80.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-kgraft-4.12.14-95.80.1.aarch64",
"product": {
"name": "kernel-default-kgraft-4.12.14-95.80.1.aarch64",
"product_id": "kernel-default-kgraft-4.12.14-95.80.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-kgraft-devel-4.12.14-95.80.1.aarch64",
"product": {
"name": "kernel-default-kgraft-devel-4.12.14-95.80.1.aarch64",
"product_id": "kernel-default-kgraft-devel-4.12.14-95.80.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-4.12.14-95.80.1.aarch64",
"product": {
"name": "kernel-obs-build-4.12.14-95.80.1.aarch64",
"product_id": "kernel-obs-build-4.12.14-95.80.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-4.12.14-95.80.1.aarch64",
"product": {
"name": "kernel-obs-qa-4.12.14-95.80.1.aarch64",
"product_id": "kernel-obs-qa-4.12.14-95.80.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-syms-4.12.14-95.80.1.aarch64",
"product": {
"name": "kernel-syms-4.12.14-95.80.1.aarch64",
"product_id": "kernel-syms-4.12.14-95.80.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-4.12.14-95.80.1.aarch64",
"product": {
"name": "kernel-vanilla-4.12.14-95.80.1.aarch64",
"product_id": "kernel-vanilla-4.12.14-95.80.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-base-4.12.14-95.80.1.aarch64",
"product": {
"name": "kernel-vanilla-base-4.12.14-95.80.1.aarch64",
"product_id": "kernel-vanilla-base-4.12.14-95.80.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-devel-4.12.14-95.80.1.aarch64",
"product": {
"name": "kernel-vanilla-devel-4.12.14-95.80.1.aarch64",
"product_id": "kernel-vanilla-devel-4.12.14-95.80.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-kgraft-devel-4.12.14-95.80.1.aarch64",
"product": {
"name": "kernel-vanilla-kgraft-devel-4.12.14-95.80.1.aarch64",
"product_id": "kernel-vanilla-kgraft-devel-4.12.14-95.80.1.aarch64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-4.12.14-95.80.1.aarch64",
"product": {
"name": "kselftests-kmp-default-4.12.14-95.80.1.aarch64",
"product_id": "kselftests-kmp-default-4.12.14-95.80.1.aarch64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-4.12.14-95.80.1.aarch64",
"product": {
"name": "ocfs2-kmp-default-4.12.14-95.80.1.aarch64",
"product_id": "ocfs2-kmp-default-4.12.14-95.80.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-devel-4.12.14-95.80.1.noarch",
"product": {
"name": "kernel-devel-4.12.14-95.80.1.noarch",
"product_id": "kernel-devel-4.12.14-95.80.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-docs-4.12.14-95.80.1.noarch",
"product": {
"name": "kernel-docs-4.12.14-95.80.1.noarch",
"product_id": "kernel-docs-4.12.14-95.80.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-docs-html-4.12.14-95.80.1.noarch",
"product": {
"name": "kernel-docs-html-4.12.14-95.80.1.noarch",
"product_id": "kernel-docs-html-4.12.14-95.80.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-macros-4.12.14-95.80.1.noarch",
"product": {
"name": "kernel-macros-4.12.14-95.80.1.noarch",
"product_id": "kernel-macros-4.12.14-95.80.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-4.12.14-95.80.1.noarch",
"product": {
"name": "kernel-source-4.12.14-95.80.1.noarch",
"product_id": "kernel-source-4.12.14-95.80.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-vanilla-4.12.14-95.80.1.noarch",
"product": {
"name": "kernel-source-vanilla-4.12.14-95.80.1.noarch",
"product_id": "kernel-source-vanilla-4.12.14-95.80.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-4.12.14-95.80.1.ppc64le",
"product": {
"name": "cluster-md-kmp-default-4.12.14-95.80.1.ppc64le",
"product_id": "cluster-md-kmp-default-4.12.14-95.80.1.ppc64le"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-4.12.14-95.80.1.ppc64le",
"product": {
"name": "dlm-kmp-default-4.12.14-95.80.1.ppc64le",
"product_id": "dlm-kmp-default-4.12.14-95.80.1.ppc64le"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-4.12.14-95.80.1.ppc64le",
"product": {
"name": "gfs2-kmp-default-4.12.14-95.80.1.ppc64le",
"product_id": "gfs2-kmp-default-4.12.14-95.80.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-4.12.14-95.80.1.ppc64le",
"product": {
"name": "kernel-debug-4.12.14-95.80.1.ppc64le",
"product_id": "kernel-debug-4.12.14-95.80.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-base-4.12.14-95.80.1.ppc64le",
"product": {
"name": "kernel-debug-base-4.12.14-95.80.1.ppc64le",
"product_id": "kernel-debug-base-4.12.14-95.80.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-4.12.14-95.80.1.ppc64le",
"product": {
"name": "kernel-debug-devel-4.12.14-95.80.1.ppc64le",
"product_id": "kernel-debug-devel-4.12.14-95.80.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-kgraft-devel-4.12.14-95.80.1.ppc64le",
"product": {
"name": "kernel-debug-kgraft-devel-4.12.14-95.80.1.ppc64le",
"product_id": "kernel-debug-kgraft-devel-4.12.14-95.80.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-4.12.14-95.80.1.ppc64le",
"product": {
"name": "kernel-default-4.12.14-95.80.1.ppc64le",
"product_id": "kernel-default-4.12.14-95.80.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-base-4.12.14-95.80.1.ppc64le",
"product": {
"name": "kernel-default-base-4.12.14-95.80.1.ppc64le",
"product_id": "kernel-default-base-4.12.14-95.80.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-4.12.14-95.80.1.ppc64le",
"product": {
"name": "kernel-default-devel-4.12.14-95.80.1.ppc64le",
"product_id": "kernel-default-devel-4.12.14-95.80.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-4.12.14-95.80.1.ppc64le",
"product": {
"name": "kernel-default-extra-4.12.14-95.80.1.ppc64le",
"product_id": "kernel-default-extra-4.12.14-95.80.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-kgraft-4.12.14-95.80.1.ppc64le",
"product": {
"name": "kernel-default-kgraft-4.12.14-95.80.1.ppc64le",
"product_id": "kernel-default-kgraft-4.12.14-95.80.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-kgraft-devel-4.12.14-95.80.1.ppc64le",
"product": {
"name": "kernel-default-kgraft-devel-4.12.14-95.80.1.ppc64le",
"product_id": "kernel-default-kgraft-devel-4.12.14-95.80.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-4.12.14-95.80.1.ppc64le",
"product": {
"name": "kernel-obs-build-4.12.14-95.80.1.ppc64le",
"product_id": "kernel-obs-build-4.12.14-95.80.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-4.12.14-95.80.1.ppc64le",
"product": {
"name": "kernel-obs-qa-4.12.14-95.80.1.ppc64le",
"product_id": "kernel-obs-qa-4.12.14-95.80.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-syms-4.12.14-95.80.1.ppc64le",
"product": {
"name": "kernel-syms-4.12.14-95.80.1.ppc64le",
"product_id": "kernel-syms-4.12.14-95.80.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-4.12.14-95.80.1.ppc64le",
"product": {
"name": "kernel-vanilla-4.12.14-95.80.1.ppc64le",
"product_id": "kernel-vanilla-4.12.14-95.80.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-base-4.12.14-95.80.1.ppc64le",
"product": {
"name": "kernel-vanilla-base-4.12.14-95.80.1.ppc64le",
"product_id": "kernel-vanilla-base-4.12.14-95.80.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-devel-4.12.14-95.80.1.ppc64le",
"product": {
"name": "kernel-vanilla-devel-4.12.14-95.80.1.ppc64le",
"product_id": "kernel-vanilla-devel-4.12.14-95.80.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-kgraft-devel-4.12.14-95.80.1.ppc64le",
"product": {
"name": "kernel-vanilla-kgraft-devel-4.12.14-95.80.1.ppc64le",
"product_id": "kernel-vanilla-kgraft-devel-4.12.14-95.80.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-95_80-default-1-6.3.1.ppc64le",
"product": {
"name": "kgraft-patch-4_12_14-95_80-default-1-6.3.1.ppc64le",
"product_id": "kgraft-patch-4_12_14-95_80-default-1-6.3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-4.12.14-95.80.1.ppc64le",
"product": {
"name": "kselftests-kmp-default-4.12.14-95.80.1.ppc64le",
"product_id": "kselftests-kmp-default-4.12.14-95.80.1.ppc64le"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-4.12.14-95.80.1.ppc64le",
"product": {
"name": "ocfs2-kmp-default-4.12.14-95.80.1.ppc64le",
"product_id": "ocfs2-kmp-default-4.12.14-95.80.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-4.12.14-95.80.1.s390x",
"product": {
"name": "cluster-md-kmp-default-4.12.14-95.80.1.s390x",
"product_id": "cluster-md-kmp-default-4.12.14-95.80.1.s390x"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-4.12.14-95.80.1.s390x",
"product": {
"name": "dlm-kmp-default-4.12.14-95.80.1.s390x",
"product_id": "dlm-kmp-default-4.12.14-95.80.1.s390x"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-4.12.14-95.80.1.s390x",
"product": {
"name": "gfs2-kmp-default-4.12.14-95.80.1.s390x",
"product_id": "gfs2-kmp-default-4.12.14-95.80.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-4.12.14-95.80.1.s390x",
"product": {
"name": "kernel-default-4.12.14-95.80.1.s390x",
"product_id": "kernel-default-4.12.14-95.80.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-base-4.12.14-95.80.1.s390x",
"product": {
"name": "kernel-default-base-4.12.14-95.80.1.s390x",
"product_id": "kernel-default-base-4.12.14-95.80.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-4.12.14-95.80.1.s390x",
"product": {
"name": "kernel-default-devel-4.12.14-95.80.1.s390x",
"product_id": "kernel-default-devel-4.12.14-95.80.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-4.12.14-95.80.1.s390x",
"product": {
"name": "kernel-default-extra-4.12.14-95.80.1.s390x",
"product_id": "kernel-default-extra-4.12.14-95.80.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-kgraft-4.12.14-95.80.1.s390x",
"product": {
"name": "kernel-default-kgraft-4.12.14-95.80.1.s390x",
"product_id": "kernel-default-kgraft-4.12.14-95.80.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-kgraft-devel-4.12.14-95.80.1.s390x",
"product": {
"name": "kernel-default-kgraft-devel-4.12.14-95.80.1.s390x",
"product_id": "kernel-default-kgraft-devel-4.12.14-95.80.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-man-4.12.14-95.80.1.s390x",
"product": {
"name": "kernel-default-man-4.12.14-95.80.1.s390x",
"product_id": "kernel-default-man-4.12.14-95.80.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-4.12.14-95.80.1.s390x",
"product": {
"name": "kernel-obs-build-4.12.14-95.80.1.s390x",
"product_id": "kernel-obs-build-4.12.14-95.80.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-4.12.14-95.80.1.s390x",
"product": {
"name": "kernel-obs-qa-4.12.14-95.80.1.s390x",
"product_id": "kernel-obs-qa-4.12.14-95.80.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-syms-4.12.14-95.80.1.s390x",
"product": {
"name": "kernel-syms-4.12.14-95.80.1.s390x",
"product_id": "kernel-syms-4.12.14-95.80.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-4.12.14-95.80.1.s390x",
"product": {
"name": "kernel-vanilla-4.12.14-95.80.1.s390x",
"product_id": "kernel-vanilla-4.12.14-95.80.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-base-4.12.14-95.80.1.s390x",
"product": {
"name": "kernel-vanilla-base-4.12.14-95.80.1.s390x",
"product_id": "kernel-vanilla-base-4.12.14-95.80.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-devel-4.12.14-95.80.1.s390x",
"product": {
"name": "kernel-vanilla-devel-4.12.14-95.80.1.s390x",
"product_id": "kernel-vanilla-devel-4.12.14-95.80.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-kgraft-devel-4.12.14-95.80.1.s390x",
"product": {
"name": "kernel-vanilla-kgraft-devel-4.12.14-95.80.1.s390x",
"product_id": "kernel-vanilla-kgraft-devel-4.12.14-95.80.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-4.12.14-95.80.1.s390x",
"product": {
"name": "kernel-zfcpdump-4.12.14-95.80.1.s390x",
"product_id": "kernel-zfcpdump-4.12.14-95.80.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-man-4.12.14-95.80.1.s390x",
"product": {
"name": "kernel-zfcpdump-man-4.12.14-95.80.1.s390x",
"product_id": "kernel-zfcpdump-man-4.12.14-95.80.1.s390x"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-95_80-default-1-6.3.1.s390x",
"product": {
"name": "kgraft-patch-4_12_14-95_80-default-1-6.3.1.s390x",
"product_id": "kgraft-patch-4_12_14-95_80-default-1-6.3.1.s390x"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-4.12.14-95.80.1.s390x",
"product": {
"name": "kselftests-kmp-default-4.12.14-95.80.1.s390x",
"product_id": "kselftests-kmp-default-4.12.14-95.80.1.s390x"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-4.12.14-95.80.1.s390x",
"product": {
"name": "ocfs2-kmp-default-4.12.14-95.80.1.s390x",
"product_id": "ocfs2-kmp-default-4.12.14-95.80.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-4.12.14-95.80.1.x86_64",
"product": {
"name": "cluster-md-kmp-default-4.12.14-95.80.1.x86_64",
"product_id": "cluster-md-kmp-default-4.12.14-95.80.1.x86_64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-4.12.14-95.80.1.x86_64",
"product": {
"name": "dlm-kmp-default-4.12.14-95.80.1.x86_64",
"product_id": "dlm-kmp-default-4.12.14-95.80.1.x86_64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-4.12.14-95.80.1.x86_64",
"product": {
"name": "gfs2-kmp-default-4.12.14-95.80.1.x86_64",
"product_id": "gfs2-kmp-default-4.12.14-95.80.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-4.12.14-95.80.1.x86_64",
"product": {
"name": "kernel-debug-4.12.14-95.80.1.x86_64",
"product_id": "kernel-debug-4.12.14-95.80.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-base-4.12.14-95.80.1.x86_64",
"product": {
"name": "kernel-debug-base-4.12.14-95.80.1.x86_64",
"product_id": "kernel-debug-base-4.12.14-95.80.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-4.12.14-95.80.1.x86_64",
"product": {
"name": "kernel-debug-devel-4.12.14-95.80.1.x86_64",
"product_id": "kernel-debug-devel-4.12.14-95.80.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-kgraft-devel-4.12.14-95.80.1.x86_64",
"product": {
"name": "kernel-debug-kgraft-devel-4.12.14-95.80.1.x86_64",
"product_id": "kernel-debug-kgraft-devel-4.12.14-95.80.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-4.12.14-95.80.1.x86_64",
"product": {
"name": "kernel-default-4.12.14-95.80.1.x86_64",
"product_id": "kernel-default-4.12.14-95.80.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-4.12.14-95.80.1.x86_64",
"product": {
"name": "kernel-default-base-4.12.14-95.80.1.x86_64",
"product_id": "kernel-default-base-4.12.14-95.80.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-4.12.14-95.80.1.x86_64",
"product": {
"name": "kernel-default-devel-4.12.14-95.80.1.x86_64",
"product_id": "kernel-default-devel-4.12.14-95.80.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-4.12.14-95.80.1.x86_64",
"product": {
"name": "kernel-default-extra-4.12.14-95.80.1.x86_64",
"product_id": "kernel-default-extra-4.12.14-95.80.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-kgraft-4.12.14-95.80.1.x86_64",
"product": {
"name": "kernel-default-kgraft-4.12.14-95.80.1.x86_64",
"product_id": "kernel-default-kgraft-4.12.14-95.80.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-kgraft-devel-4.12.14-95.80.1.x86_64",
"product": {
"name": "kernel-default-kgraft-devel-4.12.14-95.80.1.x86_64",
"product_id": "kernel-default-kgraft-devel-4.12.14-95.80.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-4.12.14-95.80.1.x86_64",
"product": {
"name": "kernel-kvmsmall-4.12.14-95.80.1.x86_64",
"product_id": "kernel-kvmsmall-4.12.14-95.80.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-base-4.12.14-95.80.1.x86_64",
"product": {
"name": "kernel-kvmsmall-base-4.12.14-95.80.1.x86_64",
"product_id": "kernel-kvmsmall-base-4.12.14-95.80.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-devel-4.12.14-95.80.1.x86_64",
"product": {
"name": "kernel-kvmsmall-devel-4.12.14-95.80.1.x86_64",
"product_id": "kernel-kvmsmall-devel-4.12.14-95.80.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-kgraft-devel-4.12.14-95.80.1.x86_64",
"product": {
"name": "kernel-kvmsmall-kgraft-devel-4.12.14-95.80.1.x86_64",
"product_id": "kernel-kvmsmall-kgraft-devel-4.12.14-95.80.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-4.12.14-95.80.1.x86_64",
"product": {
"name": "kernel-obs-build-4.12.14-95.80.1.x86_64",
"product_id": "kernel-obs-build-4.12.14-95.80.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-4.12.14-95.80.1.x86_64",
"product": {
"name": "kernel-obs-qa-4.12.14-95.80.1.x86_64",
"product_id": "kernel-obs-qa-4.12.14-95.80.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-syms-4.12.14-95.80.1.x86_64",
"product": {
"name": "kernel-syms-4.12.14-95.80.1.x86_64",
"product_id": "kernel-syms-4.12.14-95.80.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-4.12.14-95.80.1.x86_64",
"product": {
"name": "kernel-vanilla-4.12.14-95.80.1.x86_64",
"product_id": "kernel-vanilla-4.12.14-95.80.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-base-4.12.14-95.80.1.x86_64",
"product": {
"name": "kernel-vanilla-base-4.12.14-95.80.1.x86_64",
"product_id": "kernel-vanilla-base-4.12.14-95.80.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-devel-4.12.14-95.80.1.x86_64",
"product": {
"name": "kernel-vanilla-devel-4.12.14-95.80.1.x86_64",
"product_id": "kernel-vanilla-devel-4.12.14-95.80.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-kgraft-devel-4.12.14-95.80.1.x86_64",
"product": {
"name": "kernel-vanilla-kgraft-devel-4.12.14-95.80.1.x86_64",
"product_id": "kernel-vanilla-kgraft-devel-4.12.14-95.80.1.x86_64"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-95_80-default-1-6.3.1.x86_64",
"product": {
"name": "kgraft-patch-4_12_14-95_80-default-1-6.3.1.x86_64",
"product_id": "kgraft-patch-4_12_14-95_80-default-1-6.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-4.12.14-95.80.1.x86_64",
"product": {
"name": "kselftests-kmp-default-4.12.14-95.80.1.x86_64",
"product_id": "kselftests-kmp-default-4.12.14-95.80.1.x86_64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-4.12.14-95.80.1.x86_64",
"product": {
"name": "ocfs2-kmp-default-4.12.14-95.80.1.x86_64",
"product_id": "ocfs2-kmp-default-4.12.14-95.80.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE OpenStack Cloud 9",
"product": {
"name": "SUSE OpenStack Cloud 9",
"product_id": "SUSE OpenStack Cloud 9",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse-openstack-cloud:9"
}
}
},
{
"category": "product_name",
"name": "SUSE OpenStack Cloud Crowbar 9",
"product": {
"name": "SUSE OpenStack Cloud Crowbar 9",
"product_id": "SUSE OpenStack Cloud Crowbar 9",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse-openstack-cloud-crowbar:9"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Availability Extension 12 SP4",
"product": {
"name": "SUSE Linux Enterprise High Availability Extension 12 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-ha:12:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 12 SP4",
"product": {
"name": "SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-live-patching:12:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:12:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 12 SP4-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 12 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:12:sp4"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-95.80.1.x86_64 as component of SUSE OpenStack Cloud 9",
"product_id": "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.80.1.x86_64"
},
"product_reference": "kernel-default-4.12.14-95.80.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud 9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-95.80.1.x86_64 as component of SUSE OpenStack Cloud 9",
"product_id": "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.80.1.x86_64"
},
"product_reference": "kernel-default-base-4.12.14-95.80.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud 9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-95.80.1.x86_64 as component of SUSE OpenStack Cloud 9",
"product_id": "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.80.1.x86_64"
},
"product_reference": "kernel-default-devel-4.12.14-95.80.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud 9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-4.12.14-95.80.1.noarch as component of SUSE OpenStack Cloud 9",
"product_id": "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.80.1.noarch"
},
"product_reference": "kernel-devel-4.12.14-95.80.1.noarch",
"relates_to_product_reference": "SUSE OpenStack Cloud 9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-4.12.14-95.80.1.noarch as component of SUSE OpenStack Cloud 9",
"product_id": "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.80.1.noarch"
},
"product_reference": "kernel-macros-4.12.14-95.80.1.noarch",
"relates_to_product_reference": "SUSE OpenStack Cloud 9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-4.12.14-95.80.1.noarch as component of SUSE OpenStack Cloud 9",
"product_id": "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.80.1.noarch"
},
"product_reference": "kernel-source-4.12.14-95.80.1.noarch",
"relates_to_product_reference": "SUSE OpenStack Cloud 9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-95.80.1.x86_64 as component of SUSE OpenStack Cloud 9",
"product_id": "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.80.1.x86_64"
},
"product_reference": "kernel-syms-4.12.14-95.80.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud 9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-95.80.1.x86_64 as component of SUSE OpenStack Cloud Crowbar 9",
"product_id": "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.80.1.x86_64"
},
"product_reference": "kernel-default-4.12.14-95.80.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-95.80.1.x86_64 as component of SUSE OpenStack Cloud Crowbar 9",
"product_id": "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.80.1.x86_64"
},
"product_reference": "kernel-default-base-4.12.14-95.80.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-95.80.1.x86_64 as component of SUSE OpenStack Cloud Crowbar 9",
"product_id": "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.80.1.x86_64"
},
"product_reference": "kernel-default-devel-4.12.14-95.80.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-4.12.14-95.80.1.noarch as component of SUSE OpenStack Cloud Crowbar 9",
"product_id": "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.80.1.noarch"
},
"product_reference": "kernel-devel-4.12.14-95.80.1.noarch",
"relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-4.12.14-95.80.1.noarch as component of SUSE OpenStack Cloud Crowbar 9",
"product_id": "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.80.1.noarch"
},
"product_reference": "kernel-macros-4.12.14-95.80.1.noarch",
"relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-4.12.14-95.80.1.noarch as component of SUSE OpenStack Cloud Crowbar 9",
"product_id": "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.80.1.noarch"
},
"product_reference": "kernel-source-4.12.14-95.80.1.noarch",
"relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-95.80.1.x86_64 as component of SUSE OpenStack Cloud Crowbar 9",
"product_id": "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.80.1.x86_64"
},
"product_reference": "kernel-syms-4.12.14-95.80.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-4.12.14-95.80.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.80.1.ppc64le"
},
"product_reference": "cluster-md-kmp-default-4.12.14-95.80.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-4.12.14-95.80.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.80.1.s390x"
},
"product_reference": "cluster-md-kmp-default-4.12.14-95.80.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-4.12.14-95.80.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.80.1.x86_64"
},
"product_reference": "cluster-md-kmp-default-4.12.14-95.80.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-4.12.14-95.80.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.80.1.ppc64le"
},
"product_reference": "dlm-kmp-default-4.12.14-95.80.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-4.12.14-95.80.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.80.1.s390x"
},
"product_reference": "dlm-kmp-default-4.12.14-95.80.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-4.12.14-95.80.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.80.1.x86_64"
},
"product_reference": "dlm-kmp-default-4.12.14-95.80.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-4.12.14-95.80.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.80.1.ppc64le"
},
"product_reference": "gfs2-kmp-default-4.12.14-95.80.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-4.12.14-95.80.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.80.1.s390x"
},
"product_reference": "gfs2-kmp-default-4.12.14-95.80.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-4.12.14-95.80.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.80.1.x86_64"
},
"product_reference": "gfs2-kmp-default-4.12.14-95.80.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-4.12.14-95.80.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.80.1.ppc64le"
},
"product_reference": "ocfs2-kmp-default-4.12.14-95.80.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-4.12.14-95.80.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.80.1.s390x"
},
"product_reference": "ocfs2-kmp-default-4.12.14-95.80.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-4.12.14-95.80.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.80.1.x86_64"
},
"product_reference": "ocfs2-kmp-default-4.12.14-95.80.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-kgraft-4.12.14-95.80.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.80.1.ppc64le"
},
"product_reference": "kernel-default-kgraft-4.12.14-95.80.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-kgraft-4.12.14-95.80.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.80.1.s390x"
},
"product_reference": "kernel-default-kgraft-4.12.14-95.80.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-kgraft-4.12.14-95.80.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.80.1.x86_64"
},
"product_reference": "kernel-default-kgraft-4.12.14-95.80.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-kgraft-devel-4.12.14-95.80.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.80.1.ppc64le"
},
"product_reference": "kernel-default-kgraft-devel-4.12.14-95.80.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-kgraft-devel-4.12.14-95.80.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.80.1.s390x"
},
"product_reference": "kernel-default-kgraft-devel-4.12.14-95.80.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-kgraft-devel-4.12.14-95.80.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.80.1.x86_64"
},
"product_reference": "kernel-default-kgraft-devel-4.12.14-95.80.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_80-default-1-6.3.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-1-6.3.1.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-95_80-default-1-6.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_80-default-1-6.3.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-1-6.3.1.s390x"
},
"product_reference": "kgraft-patch-4_12_14-95_80-default-1-6.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_80-default-1-6.3.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-1-6.3.1.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-95_80-default-1-6.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-95.80.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.80.1.ppc64le"
},
"product_reference": "kernel-default-4.12.14-95.80.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-95.80.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.80.1.x86_64"
},
"product_reference": "kernel-default-4.12.14-95.80.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-95.80.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.80.1.ppc64le"
},
"product_reference": "kernel-default-base-4.12.14-95.80.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-95.80.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.80.1.x86_64"
},
"product_reference": "kernel-default-base-4.12.14-95.80.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-95.80.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.80.1.ppc64le"
},
"product_reference": "kernel-default-devel-4.12.14-95.80.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-95.80.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.80.1.x86_64"
},
"product_reference": "kernel-default-devel-4.12.14-95.80.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-4.12.14-95.80.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.80.1.noarch"
},
"product_reference": "kernel-devel-4.12.14-95.80.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-4.12.14-95.80.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.80.1.noarch"
},
"product_reference": "kernel-macros-4.12.14-95.80.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-4.12.14-95.80.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.80.1.noarch"
},
"product_reference": "kernel-source-4.12.14-95.80.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-95.80.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.80.1.ppc64le"
},
"product_reference": "kernel-syms-4.12.14-95.80.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-95.80.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.80.1.x86_64"
},
"product_reference": "kernel-syms-4.12.14-95.80.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-95.80.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.aarch64"
},
"product_reference": "kernel-default-4.12.14-95.80.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-95.80.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.ppc64le"
},
"product_reference": "kernel-default-4.12.14-95.80.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-95.80.1.s390x as component of SUSE Linux Enterprise Server 12 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.s390x"
},
"product_reference": "kernel-default-4.12.14-95.80.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-95.80.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.x86_64"
},
"product_reference": "kernel-default-4.12.14-95.80.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-95.80.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.aarch64"
},
"product_reference": "kernel-default-base-4.12.14-95.80.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-95.80.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.ppc64le"
},
"product_reference": "kernel-default-base-4.12.14-95.80.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-95.80.1.s390x as component of SUSE Linux Enterprise Server 12 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.s390x"
},
"product_reference": "kernel-default-base-4.12.14-95.80.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-95.80.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.x86_64"
},
"product_reference": "kernel-default-base-4.12.14-95.80.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-95.80.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.aarch64"
},
"product_reference": "kernel-default-devel-4.12.14-95.80.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-95.80.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.ppc64le"
},
"product_reference": "kernel-default-devel-4.12.14-95.80.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-95.80.1.s390x as component of SUSE Linux Enterprise Server 12 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.s390x"
},
"product_reference": "kernel-default-devel-4.12.14-95.80.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-95.80.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.x86_64"
},
"product_reference": "kernel-default-devel-4.12.14-95.80.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-man-4.12.14-95.80.1.s390x as component of SUSE Linux Enterprise Server 12 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.80.1.s390x"
},
"product_reference": "kernel-default-man-4.12.14-95.80.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-4.12.14-95.80.1.noarch as component of SUSE Linux Enterprise Server 12 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.80.1.noarch"
},
"product_reference": "kernel-devel-4.12.14-95.80.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-4.12.14-95.80.1.noarch as component of SUSE Linux Enterprise Server 12 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.80.1.noarch"
},
"product_reference": "kernel-macros-4.12.14-95.80.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-4.12.14-95.80.1.noarch as component of SUSE Linux Enterprise Server 12 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.80.1.noarch"
},
"product_reference": "kernel-source-4.12.14-95.80.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-95.80.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.aarch64"
},
"product_reference": "kernel-syms-4.12.14-95.80.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-95.80.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.ppc64le"
},
"product_reference": "kernel-syms-4.12.14-95.80.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-95.80.1.s390x as component of SUSE Linux Enterprise Server 12 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.s390x"
},
"product_reference": "kernel-syms-4.12.14-95.80.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-95.80.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.x86_64"
},
"product_reference": "kernel-syms-4.12.14-95.80.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2020-24588",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-24588"
}
],
"notes": [
{
"category": "general",
"text": "The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn\u0027t require that the A-MSDU flag in the plaintext QoS header field is authenticated. Against devices that support receiving non-SSP A-MSDU frames (which is mandatory as part of 802.11n), an adversary can abuse this to inject arbitrary network packets.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-1-6.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-1-6.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-1-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.80.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-24588",
"url": "https://www.suse.com/security/cve/CVE-2020-24588"
},
{
"category": "external",
"summary": "SUSE Bug 1185861 for CVE-2020-24588",
"url": "https://bugzilla.suse.com/1185861"
},
{
"category": "external",
"summary": "SUSE Bug 1192868 for CVE-2020-24588",
"url": "https://bugzilla.suse.com/1192868"
},
{
"category": "external",
"summary": "SUSE Bug 1199701 for CVE-2020-24588",
"url": "https://bugzilla.suse.com/1199701"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-1-6.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-1-6.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-1-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.80.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-1-6.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-1-6.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-1-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.80.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-21T09:02:38Z",
"details": "moderate"
}
],
"title": "CVE-2020-24588"
},
{
"cve": "CVE-2020-26558",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-26558"
}
],
"notes": [
{
"category": "general",
"text": "Bluetooth LE and BR/EDR secure pairing in Bluetooth Core Specification 2.1 through 5.2 may permit a nearby man-in-the-middle attacker to identify the Passkey used during pairing (in the Passkey authentication procedure) by reflection of the public key and the authentication evidence of the initiating device, potentially permitting this attacker to complete authenticated pairing with the responding device using the correct Passkey for the pairing session. The attack methodology determines the Passkey value one bit at a time.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-1-6.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-1-6.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-1-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.80.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-26558",
"url": "https://www.suse.com/security/cve/CVE-2020-26558"
},
{
"category": "external",
"summary": "SUSE Bug 1179610 for CVE-2020-26558",
"url": "https://bugzilla.suse.com/1179610"
},
{
"category": "external",
"summary": "SUSE Bug 1186463 for CVE-2020-26558",
"url": "https://bugzilla.suse.com/1186463"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-1-6.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-1-6.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-1-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.80.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-1-6.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-1-6.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-1-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.80.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-21T09:02:38Z",
"details": "moderate"
}
],
"title": "CVE-2020-26558"
},
{
"cve": "CVE-2020-36385",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-36385"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel before 5.10. drivers/infiniband/core/ucma.c has a use-after-free because the ctx is reached via the ctx_list in some ucma_migrate_id situations where ucma_close is called, aka CID-f5449e74802c.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-1-6.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-1-6.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-1-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.80.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-36385",
"url": "https://www.suse.com/security/cve/CVE-2020-36385"
},
{
"category": "external",
"summary": "SUSE Bug 1187050 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1187050"
},
{
"category": "external",
"summary": "SUSE Bug 1187052 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1187052"
},
{
"category": "external",
"summary": "SUSE Bug 1189302 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1189302"
},
{
"category": "external",
"summary": "SUSE Bug 1196174 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1196174"
},
{
"category": "external",
"summary": "SUSE Bug 1196810 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1196810"
},
{
"category": "external",
"summary": "SUSE Bug 1196914 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1196914"
},
{
"category": "external",
"summary": "SUSE Bug 1200084 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1200084"
},
{
"category": "external",
"summary": "SUSE Bug 1201734 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1201734"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-1-6.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-1-6.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-1-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.80.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-1-6.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-1-6.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-1-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.80.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-21T09:02:38Z",
"details": "important"
}
],
"title": "CVE-2020-36385"
},
{
"cve": "CVE-2020-36386",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-36386"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel before 5.8.1. net/bluetooth/hci_event.c has a slab out-of-bounds read in hci_extended_inquiry_result_evt, aka CID-51c19bf3d5cf.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-1-6.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-1-6.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-1-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.80.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-36386",
"url": "https://www.suse.com/security/cve/CVE-2020-36386"
},
{
"category": "external",
"summary": "SUSE Bug 1187038 for CVE-2020-36386",
"url": "https://bugzilla.suse.com/1187038"
},
{
"category": "external",
"summary": "SUSE Bug 1192868 for CVE-2020-36386",
"url": "https://bugzilla.suse.com/1192868"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-1-6.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-1-6.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-1-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.80.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-1-6.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-1-6.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-1-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.80.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-21T09:02:38Z",
"details": "moderate"
}
],
"title": "CVE-2020-36386"
},
{
"cve": "CVE-2021-0129",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-0129"
}
],
"notes": [
{
"category": "general",
"text": "Improper access control in BlueZ may allow an authenticated user to potentially enable information disclosure via adjacent access.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-1-6.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-1-6.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-1-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.80.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-0129",
"url": "https://www.suse.com/security/cve/CVE-2021-0129"
},
{
"category": "external",
"summary": "SUSE Bug 1186463 for CVE-2021-0129",
"url": "https://bugzilla.suse.com/1186463"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-1-6.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-1-6.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-1-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.80.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-1-6.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-1-6.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-1-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.80.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-21T09:02:38Z",
"details": "moderate"
}
],
"title": "CVE-2021-0129"
},
{
"cve": "CVE-2021-0512",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-0512"
}
],
"notes": [
{
"category": "general",
"text": "In __hidinput_change_resolution_multipliers of hid-input.c, there is a possible out of bounds write due to a heap buffer overflow. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-173843328References: Upstream kernel",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-1-6.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-1-6.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-1-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.80.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-0512",
"url": "https://www.suse.com/security/cve/CVE-2021-0512"
},
{
"category": "external",
"summary": "SUSE Bug 1187595 for CVE-2021-0512",
"url": "https://bugzilla.suse.com/1187595"
},
{
"category": "external",
"summary": "SUSE Bug 1187597 for CVE-2021-0512",
"url": "https://bugzilla.suse.com/1187597"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-1-6.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-1-6.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-1-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.80.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-1-6.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-1-6.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-1-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.80.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-21T09:02:38Z",
"details": "important"
}
],
"title": "CVE-2021-0512"
},
{
"cve": "CVE-2021-0605",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-0605"
}
],
"notes": [
{
"category": "general",
"text": "In pfkey_dump of af_key.c, there is a possible out-of-bounds read due to a missing bounds check. This could lead to local information disclosure in the kernel with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-110373476",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-1-6.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-1-6.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-1-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.80.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-0605",
"url": "https://www.suse.com/security/cve/CVE-2021-0605"
},
{
"category": "external",
"summary": "SUSE Bug 1187601 for CVE-2021-0605",
"url": "https://bugzilla.suse.com/1187601"
},
{
"category": "external",
"summary": "SUSE Bug 1187687 for CVE-2021-0605",
"url": "https://bugzilla.suse.com/1187687"
},
{
"category": "external",
"summary": "SUSE Bug 1188381 for CVE-2021-0605",
"url": "https://bugzilla.suse.com/1188381"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-1-6.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-1-6.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-1-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.80.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-1-6.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-1-6.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-1-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.80.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-21T09:02:38Z",
"details": "important"
}
],
"title": "CVE-2021-0605"
},
{
"cve": "CVE-2021-22555",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-22555"
}
],
"notes": [
{
"category": "general",
"text": "A heap out-of-bounds write affecting Linux since v2.6.19-rc1 was discovered in net/netfilter/x_tables.c. This allows an attacker to gain privileges or cause a DoS (via heap memory corruption) through user name space",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-1-6.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-1-6.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-1-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.80.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-22555",
"url": "https://www.suse.com/security/cve/CVE-2021-22555"
},
{
"category": "external",
"summary": "SUSE Bug 1188116 for CVE-2021-22555",
"url": "https://bugzilla.suse.com/1188116"
},
{
"category": "external",
"summary": "SUSE Bug 1188117 for CVE-2021-22555",
"url": "https://bugzilla.suse.com/1188117"
},
{
"category": "external",
"summary": "SUSE Bug 1188411 for CVE-2021-22555",
"url": "https://bugzilla.suse.com/1188411"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-1-6.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-1-6.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-1-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.80.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-1-6.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-1-6.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-1-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.80.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-21T09:02:38Z",
"details": "important"
}
],
"title": "CVE-2021-22555"
},
{
"cve": "CVE-2021-33200",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-33200"
}
],
"notes": [
{
"category": "general",
"text": "kernel/bpf/verifier.c in the Linux kernel through 5.12.7 enforces incorrect limits for pointer arithmetic operations, aka CID-bb01a1bba579. This can be abused to perform out-of-bounds reads and writes in kernel memory, leading to local privilege escalation to root. In particular, there is a corner case where the off reg causes a masking direction change, which then results in an incorrect final aux-\u003ealu_limit.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-1-6.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-1-6.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-1-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.80.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-33200",
"url": "https://www.suse.com/security/cve/CVE-2021-33200"
},
{
"category": "external",
"summary": "SUSE Bug 1186484 for CVE-2021-33200",
"url": "https://bugzilla.suse.com/1186484"
},
{
"category": "external",
"summary": "SUSE Bug 1186498 for CVE-2021-33200",
"url": "https://bugzilla.suse.com/1186498"
},
{
"category": "external",
"summary": "SUSE Bug 1224878 for CVE-2021-33200",
"url": "https://bugzilla.suse.com/1224878"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-1-6.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-1-6.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-1-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.80.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-1-6.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-1-6.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-1-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.80.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-21T09:02:38Z",
"details": "important"
}
],
"title": "CVE-2021-33200"
},
{
"cve": "CVE-2021-33624",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-33624"
}
],
"notes": [
{
"category": "general",
"text": "In kernel/bpf/verifier.c in the Linux kernel before 5.12.13, a branch can be mispredicted (e.g., because of type confusion) and consequently an unprivileged BPF program can read arbitrary memory locations via a side-channel attack, aka CID-9183671af6db.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-1-6.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-1-6.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-1-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.80.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-33624",
"url": "https://www.suse.com/security/cve/CVE-2021-33624"
},
{
"category": "external",
"summary": "SUSE Bug 1187554 for CVE-2021-33624",
"url": "https://bugzilla.suse.com/1187554"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-1-6.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-1-6.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-1-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.80.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-1-6.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-1-6.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-1-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.80.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-21T09:02:38Z",
"details": "moderate"
}
],
"title": "CVE-2021-33624"
},
{
"cve": "CVE-2021-33909",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-33909"
}
],
"notes": [
{
"category": "general",
"text": "fs/seq_file.c in the Linux kernel 3.16 through 5.13.x before 5.13.4 does not properly restrict seq buffer allocations, leading to an integer overflow, an Out-of-bounds Write, and escalation to root by an unprivileged user, aka CID-8cae8cd89f05.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-1-6.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-1-6.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-1-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.80.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-33909",
"url": "https://www.suse.com/security/cve/CVE-2021-33909"
},
{
"category": "external",
"summary": "SUSE Bug 1188062 for CVE-2021-33909",
"url": "https://bugzilla.suse.com/1188062"
},
{
"category": "external",
"summary": "SUSE Bug 1188063 for CVE-2021-33909",
"url": "https://bugzilla.suse.com/1188063"
},
{
"category": "external",
"summary": "SUSE Bug 1188257 for CVE-2021-33909",
"url": "https://bugzilla.suse.com/1188257"
},
{
"category": "external",
"summary": "SUSE Bug 1189302 for CVE-2021-33909",
"url": "https://bugzilla.suse.com/1189302"
},
{
"category": "external",
"summary": "SUSE Bug 1190859 for CVE-2021-33909",
"url": "https://bugzilla.suse.com/1190859"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-1-6.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-1-6.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-1-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.80.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-1-6.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-1-6.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-1-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.80.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-21T09:02:38Z",
"details": "important"
}
],
"title": "CVE-2021-33909"
},
{
"cve": "CVE-2021-34693",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-34693"
}
],
"notes": [
{
"category": "general",
"text": "net/can/bcm.c in the Linux kernel through 5.12.10 allows local users to obtain sensitive information from kernel stack memory because parts of a data structure are uninitialized.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-1-6.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-1-6.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-1-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.80.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-34693",
"url": "https://www.suse.com/security/cve/CVE-2021-34693"
},
{
"category": "external",
"summary": "SUSE Bug 1187452 for CVE-2021-34693",
"url": "https://bugzilla.suse.com/1187452"
},
{
"category": "external",
"summary": "SUSE Bug 1192868 for CVE-2021-34693",
"url": "https://bugzilla.suse.com/1192868"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-1-6.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-1-6.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-1-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.80.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-1-6.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-1-6.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-1-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.80.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-21T09:02:38Z",
"details": "moderate"
}
],
"title": "CVE-2021-34693"
},
{
"cve": "CVE-2021-3609",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3609"
}
],
"notes": [
{
"category": "general",
"text": ".A flaw was found in the CAN BCM networking protocol in the Linux kernel, where a local attacker can abuse a flaw in the CAN subsystem to corrupt memory, crash the system or escalate privileges. This race condition in net/can/bcm.c in the Linux kernel allows for local privilege escalation to root.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-1-6.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-1-6.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-1-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.80.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3609",
"url": "https://www.suse.com/security/cve/CVE-2021-3609"
},
{
"category": "external",
"summary": "SUSE Bug 1187215 for CVE-2021-3609",
"url": "https://bugzilla.suse.com/1187215"
},
{
"category": "external",
"summary": "SUSE Bug 1188323 for CVE-2021-3609",
"url": "https://bugzilla.suse.com/1188323"
},
{
"category": "external",
"summary": "SUSE Bug 1188720 for CVE-2021-3609",
"url": "https://bugzilla.suse.com/1188720"
},
{
"category": "external",
"summary": "SUSE Bug 1190276 for CVE-2021-3609",
"url": "https://bugzilla.suse.com/1190276"
},
{
"category": "external",
"summary": "SUSE Bug 1196810 for CVE-2021-3609",
"url": "https://bugzilla.suse.com/1196810"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-1-6.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-1-6.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-1-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.80.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-1-6.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-1-6.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_80-default-1-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.80.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.80.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.80.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-21T09:02:38Z",
"details": "moderate"
}
],
"title": "CVE-2021-3609"
}
]
}
suse-su-2021:2349-1
Vulnerability from csaf_suse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel",
"title": "Title of the patch"
},
{
"category": "description",
"text": "The SUSE Linux Enterprise 12 SP5 kernel was updated to receive various security and bugfixes.\n\nThe following security bugs were fixed:\n\n- CVE-2021-33624: Fixed a bug which allows unprivileged BPF program to leak the contents of arbitrary kernel memory (and therefore, of all physical memory) via a side-channel. (bsc#1187554)\n- CVE-2019-25045: Fixed an use-after-free issue in the Linux kernel The XFRM subsystem, related to an xfrm_state_fini panic. (bsc#1187049)\n- CVE-2021-0605: Fixed an out-of-bounds read which could lead to local information disclosure in the kernel with System execution privileges needed. (bsc#1187601)\n- CVE-2021-0512: Fixed a possible out-of-bounds write which could lead to local escalation of privilege with no additional execution privileges needed. (bsc#1187595)\n- CVE-2020-26558: Fixed a flaw in the Bluetooth LE and BR/EDR secure pairing that could permit a nearby man-in-the-middle attacker to identify the Passkey used during pairing. (bsc#1179610)\n- CVE-2021-34693: Fixed a bug in net/can/bcm.c which could allow local users to obtain sensitive information from kernel stack memory because parts of a data structure are uninitialized. (bsc#1187452)\n- CVE-2021-0129: Fixed an improper access control in BlueZ that may have allowed an authenticated user to potentially enable information disclosure via adjacent access. (bsc#1186463)\n- CVE-2020-36386: Fixed an out-of-bounds read in hci_extended_inquiry_result_evt. (bsc#1187038)\n- CVE-2020-24588: Fixed a bug that could allow an adversary to abuse devices that support receiving non-SSP A-MSDU frames to inject arbitrary network packets. (bsc#1185861)\n\nThe following non-security bugs were fixed:\n\n- ACPI: custom_method: fix a possible memory leak (git-fixes).\n- ACPI: custom_method: fix potential use-after-free issue (git-fixes).\n- ACPI: GTDT: Do not corrupt interrupt mappings on watchdow probe failure (git-fixes).\n- ALSA: bebob/oxfw: fix Kconfig entry for Mackie d.2 Pro (git-fixes).\n- ALSA: emu8000: Fix a use after free in snd_emu8000_create_mixer (git-fixes).\n- ALSA: hda/conexant: Re-order CX5066 quirk table entries (git-fixes).\n- ALSA: hda/realtek: Re-order ALC269 Lenovo quirk table entries (git-fixes).\n- ALSA: hda/realtek: Re-order ALC269 Sony quirk table entries (git-fixes).\n- ALSA: hda/realtek: Re-order ALC882 Acer quirk table entries (git-fixes).\n- ALSA: hda/realtek: Re-order ALC882 Sony quirk table entries (git-fixes).\n- ALSA: hda/realtek: Remove redundant entry for ALC861 Haier/Uniwill devices (git-fixes).\n- ALSA: hda/realtek: reset eapd coeff to default value for alc287 (git-fixes).\n- ALSA: hdsp: do not disable if not enabled (git-fixes).\n- ALSA: hdspm: do not disable if not enabled (git-fixes).\n- ALSA: line6: Fix racy initialization of LINE6 MIDI (git-fixes).\n- ALSA: rme9652: do not disable if not enabled (git-fixes).\n- ALSA: sb: Fix two use after free in snd_sb_qsound_build (git-fixes).\n- ALSA: timer: Fix master timer notification (git-fixes).\n- ALSA: usb-audio: Add MIDI quirk for Vox ToneLab EX (git-fixes).\n- alx: Fix an error handling path in \u0027alx_probe()\u0027 (git-fixes).\n- ASoC: cs35l33: fix an error code in probe() (git-fixes).\n- ASoC: cs42l42: Regmap must use_single_read/write (git-fixes).\n- ASoC: rt286: Generalize support for ALC3263 codec (git-fixes).\n- ASoC: rt286: Make RT286_SET_GPIO_* readable and writable (git-fixes).\n- ASoC: sti-sas: add missing MODULE_DEVICE_TABLE (git-fixes).\n- batman-adv: Avoid WARN_ON timing related checks (git-fixes).\n- blk-mq: Swap two calls in blk_mq_exit_queue() (bsc#1187453).\n- blk-wbt: Fix missed wakeup (bsc#1186627).\n- block: Discard page cache of zone reset target range (bsc#1187402).\n- Bluetooth: fix the erroneous flush_work() order (git-fixes).\n- Bluetooth: initialize skb_queue_head at l2cap_chan_create() (git-fixes).\n- Bluetooth: Set CONF_NOT_COMPLETE as l2cap_chan default (git-fixes).\n- Bluetooth: SMP: Fail if remote and local public keys are identical (git-fixes).\n- Bluetooth: use correct lock to prevent UAF of hdev object (git-fixes).\n- bnxt_en: Fix PCI AER error recovery flow (git-fixes).\n- btrfs: account for new extents being deleted in total_bytes_pinned (bsc#1135481).\n- btrfs: add a comment explaining the data flush steps (bsc#1135481).\n- btrfs: add btrfs_reserve_data_bytes and use it (bsc#1135481).\n- btrfs: add flushing states for handling data reservations (bsc#1135481).\n- btrfs: add missing error handling after doing leaf/node binary search (bsc#1187833).\n- btrfs: add the data transaction commit logic into may_commit_transaction (bsc#1135481).\n- btrfs: call btrfs_try_granting_tickets when freeing reserved bytes (bsc#1135481).\n- btrfs: call btrfs_try_granting_tickets when reserving space (bsc#1135481).\n- btrfs: call btrfs_try_granting_tickets when unpinning anything (bsc#1135481).\n- btrfs: change insert_dirty_subvol to return errors (bsc#1187833).\n- btrfs: change nr to u64 in btrfs_start_delalloc_roots (bsc#1135481).\n- btrfs: check record_root_in_trans related failures in select_reloc_root (bsc#1187833).\n- btrfs: check return value of btrfs_commit_transaction in relocation (bsc#1187833).\n- btrfs: check tickets after waiting on ordered extents (bsc#1135481).\n- btrfs: cleanup error handling in prepare_to_merge (bsc#1187833).\n- btrfs: convert BUG_ON()\u0027s in relocate_tree_block (bsc#1187833).\n- btrfs: convert BUG_ON()\u0027s in select_reloc_root() to proper errors (bsc#1187833).\n- btrfs: convert logic BUG_ON()\u0027s in replace_path to ASSERT()\u0027s (bsc#1187833).\n- btrfs: convert some BUG_ON()\u0027s to ASSERT()\u0027s in do_relocation (bsc#1187833).\n- btrfs: do async reclaim for data reservations (bsc#1135481).\n- btrfs: do not force commit if we are data (bsc#1135481).\n- btrfs: do not leak reloc root if we fail to read the fs root (bsc#1187833).\n- btrfs: do not make defrag wait on async_delalloc_pages (bsc#1135481).\n- btrfs: do not panic in __add_reloc_root (bsc#1187833).\n- btrfs: do proper error handling in btrfs_update_reloc_root (bsc#1187833).\n- btrfs: do proper error handling in create_reloc_inode (bsc#1187833).\n- btrfs: do proper error handling in create_reloc_root (bsc#1187833).\n- btrfs: do proper error handling in merge_reloc_roots (bsc#1187833).\n- btrfs: do proper error handling in record_reloc_root_in_trans (bsc#1187833).\n- btrfs: drop the commit_cycles stuff for data reservations (bsc#1135481).\n- btrfs: fix possible infinite loop in data async reclaim (bsc#1135481).\n- btrfs: flush delayed refs when trying to reserve data space (bsc#1135481).\n- btrfs: handle __add_reloc_root failures in btrfs_recover_relocation (bsc#1187833).\n- btrfs: handle btrfs_cow_block errors in replace_path (bsc#1187833).\n- btrfs: handle btrfs_record_root_in_trans failure in btrfs_recover_log_trees (bsc#1187833).\n- btrfs: handle btrfs_record_root_in_trans failure in btrfs_rename (bsc#1187833).\n- btrfs: handle btrfs_record_root_in_trans failure in btrfs_rename_exchange (bsc#1187833).\n- btrfs: handle btrfs_record_root_in_trans failure in create_subvol (bsc#1187833).\n- btrfs: handle btrfs_record_root_in_trans failure in relocate_tree_block (bsc#1187833).\n- btrfs: handle btrfs_record_root_in_trans failure in start_transaction (bsc#1187833).\n- btrfs: handle btrfs_search_slot failure in replace_path (bsc#1187833).\n- btrfs: handle btrfs_update_reloc_root failure in commit_fs_roots (bsc#1187833).\n- btrfs: handle btrfs_update_reloc_root failure in insert_dirty_subvol (bsc#1187833).\n- btrfs: handle btrfs_update_reloc_root failure in prepare_to_merge (bsc#1187833).\n- btrfs: handle errors from select_reloc_root() (bsc#1187833).\n- btrfs: handle errors in reference count manipulation in replace_path (bsc#1187833).\n- btrfs: handle extent corruption with select_one_root properly (bsc#1187833).\n- btrfs: handle extent reference errors in do_relocation (bsc#1187833).\n- btrfs: handle record_root_in_trans failure in btrfs_record_root_in_trans (bsc#1187833).\n- btrfs: handle record_root_in_trans failure in create_pending_snapshot (bsc#1187833).\n- btrfs: handle record_root_in_trans failure in qgroup_account_snapshot (bsc#1187833).\n- btrfs: handle space_info::total_bytes_pinned inside the delayed ref itself (bsc#1135481).\n- btrfs: handle U64_MAX for shrink_delalloc (bsc#1135481).\n- btrfs: have proper error handling in btrfs_init_reloc_root (bsc#1187833).\n- btrfs: make ALLOC_CHUNK use the space info flags (bsc#1135481).\n- btrfs: make shrink_delalloc take space_info as an arg (bsc#1135481).\n- btrfs: reloc: clean dirty subvols if we fail to start a transaction (bsc#1187833).\n- btrfs: remove err variable from do_relocation (bsc#1187833).\n- btrfs: remove nr_async_bios (bsc#1135481).\n- btrfs: remove nr_async_submits and async_submit_draining (bsc#1135481). Preparation for ticketed data space flushing in btrfs.\n- btrfs: remove orig from shrink_delalloc (bsc#1135481).\n- btrfs: remove the extent item sanity checks in relocate_block_group (bsc#1187833).\n- btrfs: return an error from btrfs_record_root_in_trans (bsc#1187833).\n- btrfs: run delayed iputs before committing the transaction for data (bsc#1135481).\n- btrfs: serialize data reservations if we are flushing (bsc#1135481).\n- btrfs: shrink delalloc pages instead of full inodes (bsc#1135481).\n- btrfs: track ordered bytes instead of just dio ordered bytes (bsc#1135481).\n- btrfs: tree-checker: check for BTRFS_BLOCK_FLAG_FULL_BACKREF being set improperly (bsc#1187833).\n- btrfs: unset reloc control if we fail to recover (bsc#1187833).\n- btrfs: use btrfs_start_delalloc_roots in shrink_delalloc (bsc#1135481).\n- btrfs: use customized batch size for total_bytes_pinned (bsc#1135481). Turns out using the batched percpu api had an effect on timing w.r.t metadata/data reclaim. So backport this patch as well, side effect is it\u0027s also bringing the code closer to upstream so future backports shall be made easier.\n- btrfs: use tagged writepage to mitigate livelock of snapshot (bsc#1135481). Preparation for introducing ticketed space handling for data space. Due to the sequence of patches, the main patch has embedded in it changes from other patches which remove some unused arguments. This is done to ease backporting itself and shouldn\u0027t have any repercussions on functionality.\n- btrfs: use the btrfs_space_info_free_bytes_may_use helper for delalloc (bsc#1135481).\n- btrfs: use the same helper for data and metadata reservations (bsc#1135481).\n- btrfs: use ticketing for data space reservations (bsc#1135481).\n- btrfs: validate root::reloc_root after recording root in trans (bsc#1187833).\n- can: flexcan: disable completely the ECC mechanism (git-fixes).\n- can: mcba_usb: fix memory leak in mcba_usb (git-fixes).\n- can: xilinx_can: xcan_chip_start(): fix failure with invalid bus (git-fixes).\n- cfg80211: scan: drop entry from hidden_list on overflow (git-fixes).\n- cgroup1: do not allow \u0027\\n\u0027 in renaming (bsc#1187972).\n- char: hpet: add checks after calling ioremap (git-fixes).\n- cpufreq: Add NULL checks to show() and store() methods of cpufreq (bsc#1184040).\n- cpufreq: Avoid cpufreq_suspend() deadlock on system shutdown (bsc#1184040).\n- crypto: ccp - Fix a resource leak in an error handling path (12sp5).\n- cxgb4: avoid accessing registers when clearing filters (bsc#1136345 jsc#SLE-4681).\n- dax: Add a wakeup mode parameter to put_unlocked_entry() (bsc#1187411).\n- dax: Add an enum for specifying dax wakup mode (bsc#1187411).\n- dax: Wake up all waiters after invalidating dax entry (bsc#1187411).\n- dmaengine: pl330: fix wrong usage of spinlock flags in dma_cyclc (git-fixes).\n- dmaengine: QCOM_HIDMA_MGMT depends on HAS_IOMEM (git-fixes).\n- dmaengine: qcom_hidma: comment platform_driver_register call (git-fixes).\n- dmaengine: stedma40: add missing iounmap() on error in d40_probe() (git-fixes).\n- drbd: Remove uninitialized_var() usage (bsc#1186515).\n- drivers: video: fbcon: fix NULL dereference in fbcon_cursor() (bsc#1129770) Backporting changes: * move from driver/video/fbdev/core to driver/video/console * context changes\n- drm: Fix use-after-free read in drm_getunique() (git-fixes).\n- drm: Lock pointer access in drm_master_release() (git-fixes).\n- drm/amdgpu : Fix asic reset regression issue introduce by 8f211fe8ac7c4f (git-fixes).\n- drm/amdgpu: Fix a use-after-free (git-fixes).\n- drm/amdgpu: fix NULL pointer dereference (git-fixes).\n- drm/meson: fix shutdown crash when component not probed (git-fixes).\n- drm/msm/mdp5: Configure PP_SYNC_HEIGHT to double the vtotal (git-fixes).\n- drm/radeon: Fix off-by-one power_state index heap overwrite (git-fixes).\n- drm/radeon/dpm: Disable sclk switching on Oland when two 4K 60Hz monitors are connected (git-fixes).\n- efi: Allow EFI_MEMORY_XP and EFI_MEMORY_RO both to be cleared (git-fixes).\n- efi: cper: fix snprintf() use in cper_dimm_err_location() (git-fixes).\n- ext4: fix bug on in ext4_es_cache_extent as ext4_split_extent_at failed (bsc#1187408).\n- ext4: fix check to prevent false positive report of incorrect used inodes (bsc#1187404).\n- ext4: fix error code in ext4_commit_super (bsc#1187407).\n- ext4: fix memory leak in ext4_fill_super (bsc#1187409).\n- extcon: arizona: Fix some issues when HPDET IRQ fires after the jack has been unplugged (git-fixes).\n- fbdev: zero-fill colormap in fbcmap.c (git-fixes).\n- FCOE: fcoe_wwn_from_mac kABI fix (bsc#1186528).\n- ftrace: Do not blindly read the ip address in ftrace_bug() (git-fixes).\n- ftrace: Free the trampoline when ftrace_startup() fails (git-fixes).\n- gpio: xilinx: Correct kernel doc for xgpio_probe() (git-fixes).\n- gpiolib: acpi: Add quirk to ignore EC wakeups on Dell Venue 10 Pro 5055 (git-fixes).\n- HID: pidff: fix error return code in hid_pidff_init() (git-fixes).\n- i2c: i801: Do not generate an interrupt on bus reset (git-fixes).\n- i2c: i801: Do not generate an interrupt on bus reset (git-fixes).\n- i2c: mpc: Make use of i2c_recover_bus() (git-fixes).\n- i2c: s3c2410: fix possible NULL pointer deref on read message after write (git-fixes).\n- i2c: sh7760: add IRQ check (git-fixes).\n- i2c: sh7760: fix IRQ error path (git-fixes).\n- iio: adc: ad7793: Add missing error code in ad7793_setup() (git-fixes).\n- iio: gyro: mpu3050: Fix reported temperature value (git-fixes).\n- iio: proximity: pulsedlight: Fix rumtime PM imbalance on error (git-fixes).\n- iio: tsl2583: Fix division by a zero lux_val (git-fixes).\n- ima: Free IMA measurement buffer after kexec syscall (git-fixes).\n- Input: elants_i2c - do not bind to i2c-hid compatible ACPI instantiated devices (git-fixes).\n- Input: silead - add workaround for x86 BIOS-es which bring the chip up in a stuck state (git-fixes).\n- intel_th: Consistency and off-by-one fix (git-fixes).\n- isdn: mISDN: netjet: Fix crash in nj_probe: (git-fixes).\n- isdn: mISDNinfineon: check/cleanup ioremap failure correctly in setup_io (git-fixes).\n- ixgbe: fix large MTU request from VF (git-fixes).\n- ixgbevf: add correct exception tracing for XDP (bsc#1113994 ).\n- kabi fix for NFSv4.1: Do not rebind to the same source port when reconnecting to the server (bnc#1186264).\n- kernel: kexec_file: fix error return code of kexec_calculate_store_digests() (git-fixes).\n- kthread_worker: split code for canceling the delayed work timer (bsc#1187867).\n- kthread: prevent deadlock when kthread_mod_delayed_work() races with kthread_cancel_delayed_work_sync() (bsc#1187867).\n- leds: lp5523: check return value of lp5xx_read and jump to cleanup code (git-fixes).\n- libertas: register sysfs groups properly (git-fixes).\n- mac80211: clear the beacon\u0027s CRC after channel switch (git-fixes).\n- md: Fix missing unused status line of /proc/mdstat (git-fixes).\n- media: adv7604: fix possible use-after-free in adv76xx_remove() (git-fixes).\n- media: dvb-usb: fix memory leak in dvb_usb_adapter_init (git-fixes).\n- media: dvb: Add check on sp8870_readreg return (git-fixes).\n- media: em28xx: fix memory leak (git-fixes).\n- media: gspca: properly check for errors in po1030_probe() (git-fixes).\n- media: gspca/sq905.c: fix uninitialized variable (git-fixes).\n- media: i2c: adv7842: fix possible use-after-free in adv7842_remove() (git-fixes).\n- media: ite-cir: check for receive overflow (git-fixes).\n- media: media/saa7164: fix saa7164_encoder_register() memory leak bugs (git-fixes).\n- mei: request autosuspend after sending rx flow control (git-fixes).\n- misc/uss720: fix memory leak in uss720_probe (git-fixes).\n- mlxsw: spectrum: Do not process learned records with a dummy FID (git-fixes).\n- mmc: core: Do a power cycle when the CMD11 fails (git-fixes).\n- mmc: core: Set read only for SD cards with permanent write protect bit (git-fixes).\n- Move nfs backports into sorted section\n- net: bnx2: Fix error return code in bnx2_init_board() (git-fixes).\n- net: caif: Fix debugfs on 64-bit platforms (git-fixes).\n- net: dsa: mv88e6xxx: Fix writing to a PHY page (git-fixes).\n- net: dsa: qca8k: Use up to 7 ports for all operations (git-fixes).\n- net: enic: Cure the enic api locking trainwreck (git-fixes).\n- net: fix iteration for sctp transport seq_files (git-fixes).\n- net: hns3: Limiting the scope of vector_ring_chain variable (bsc#1104353).\n- net: netcp: Fix an error message (git-fixes).\n- net: phy: intel-xway: enable integrated led functions (git-fixes).\n- net: qed: RDMA personality shouldn\u0027t fail VF load (git-fixes).\n- net: stmmac: Correctly take timestamp for PTPv2 (git-fixes).\n- net: stmmac: ensure that the device has released ownership before reading data (git-fixes).\n- net: usb: fix memory leak in smsc75xx_bind (git-fixes).\n- net/nfc/rawsock.c: fix a permission check bug (git-fixes).\n- net/smc: remove device from smcd_dev_list after failed device_add() (git-fixes).\n- nfc: fix NULL ptr dereference in llcp_sock_getname() after failed connect (git-fixes).\n- NFC: fix possible resource leak (git-fixes).\n- NFC: fix resource leak when target index is invalid (git-fixes).\n- NFC: nci: fix memory leak in nci_allocate_device (git-fixes).\n- NFS: Deal correctly with attribute generation counter overflow (git-fixes).\n- NFS: Do not corrupt the value of pg_bytes_written in nfs_do_recoalesce() (git-fixes).\n- NFS: Do not gratuitously clear the inode cache when lookup failed (git-fixes).\n- NFS: Do not revalidate the directory permissions on a lookup failure (git-fixes).\n- NFS: Fix a potential NULL dereference in nfs_get_client() (git-fixes).\n- NFS: fix an incorrect limit in filelayout_decode_layout() (git-fixes).\n- NFS: Fix an Oopsable condition in __nfs_pageio_add_request() (git-fixes).\n- NFS: Repair misuse of sv_lock in 5.10.16-rt30 (git-fixes).\n- NFS: Do not discard segments marked for return in _pnfs_return_layout() (git-fixes).\n- NFS: Fix a NULL pointer dereference in pnfs_mark_matching_lsegs_return() (git-fixes).\n- NFS: Fix v4.0/v4.1 SEEK_DATA return -ENOTSUPP when set NFS_V4_2 config (git-fixes).\n- NFS: nfs4_proc_set_acl needs to restore NFS_CAP_UIDGID_NOMAP on error (git-fixes).\n- NFS: Do not rebind to the same source port when reconnecting to the server (bnc#1186264).\n- NFS: fix handling of sr_eof in SEEK\u0027s reply (git-fixes).\n- NFS: Always flush out writes in nfs42_proc_fallocate() (git-fixes).\n- NFS: fix return value of _nfs4_get_security_label() (git-fixes).\n- ocfs2: fix data corruption by fallocate (bsc#1187412).\n- parisc: parisc-agp requires SBA IOMMU driver (bsc#1129770)\n- PCI: PM: Do not read power state in pci_enable_device_flags() (git-fixes).\n- phy: phy-twl4030-usb: Fix possible use-after-free in twl4030_usb_remove() (git-fixes).\n- pid: take a reference when initializing `cad_pid` (bsc#1114648).\n- pinctrl: samsung: use \u0027int\u0027 for register masks in Exynos (git-fixes).\n- platform/mellanox: mlxbf-tmfifo: Fix a memory barrier issue (git-fixes).\n- platform/x86: hp-wireless: add AMD\u0027s hardware id to the supported list (git-fixes).\n- platform/x86: intel_punit_ipc: Append MODULE_DEVICE_TABLE for ACPI (git-fixes).\n- platform/x86: thinkpad_acpi: Correct thermal sensor allocation (git-fixes).\n- pNFS/flexfiles: fix incorrect size check in decode_nfs_fh() (git-fixes).\n- pNFS/NFSv4: Fix a layout segment leak in pnfs_layout_process() (git-fixes).\n- power: supply: generic-adc-battery: fix possible use-after-free in gab_remove() (git-fixes).\n- power: supply: s3c_adc_battery: fix possible use-after-free in s3c_adc_bat_remove() (git-fixes).\n- power: supply: Use IRQF_ONESHOT (git-fixes).\n- qla2xxx: synchronize rport dev_loss_tmo setting (bsc#1182470 bsc#1185486).\n- qlcnic: Add null check after calling netdev_alloc_skb (git-fixes).\n- ravb: fix invalid context bug while calling auto-negotiation by ethtool (git-fixes).\n- ravb: fix invalid context bug while changing link options by ethtool (git-fixes).\n- RDMA/mlx5: Recover from fatal event in dual port mode (bsc#1103991).\n- Revert \u0027ibmvnic: simplify reset_long_term_buff function\u0027 (bsc#1186206 ltc#191041).\n- Revert \u0027leds: lp5523: fix a missing check of return value of lp55xx_read\u0027 (git-fixes).\n- Revert 337f13046ff0 (\u0027futex: Allow FUTEX_CLOCK_REALTIME with FUTEX_WAIT op\u0027) (git-fixes).\n- s390/stack: fix possible register corruption with stack switch helper (bsc#1185677).\n- scsi: aacraid: Fix an oops in error handling (bsc#1186698).\n- scsi: aacraid: Remove erroneous fallthrough annotation (bsc#1186516).\n- scsi: aacraid: Use memdup_user() as a cleanup (bsc#1186517).\n- scsi: acornscsi: Fix an error handling path in acornscsi_probe() (bsc#1186518).\n- scsi: be2iscsi: Fix a theoretical leak in beiscsi_create_eqs() (bsc#1186519).\n- scsi: be2iscsi: Revert \u0027Fix a theoretical leak in beiscsi_create_eqs()\u0027 (bsc#1186699).\n- scsi: bfa: Fix error return in bfad_pci_init() (bsc#1186520).\n- scsi: bnx2fc: Fix Kconfig warning and CNIC build errors (bsc#1186521).\n- scsi: bnx2i: Requires MMU (bsc#1186522).\n- scsi: csiostor: Fix wrong return value in csio_hw_prep_fw() (bsc#1186523).\n- scsi: cumana_2: Fix different dev_id between request_irq() and free_irq() (bsc#1186524).\n- scsi: cxgb3i: Fix some leaks in init_act_open() (bsc#1186525).\n- scsi: cxgb4i: Fix TLS dependency (bsc#1186526).\n- scsi: eesox: Fix different dev_id between request_irq() and free_irq() (bsc#1186527).\n- scsi: fcoe: Fix mismatched fcoe_wwn_from_mac declaration (bsc#1186528).\n- scsi: fnic: Fix error return code in fnic_probe() (bsc#1186529).\n- scsi: hisi_sas: Fix IRQ checks (bsc#1186530).\n- scsi: hisi_sas: Remove preemptible() (bsc#1186638).\n- scsi: jazz_esp: Add IRQ check (bsc#1186531).\n- scsi: libfc: Fix enum-conversion warning (bsc#1186532).\n- scsi: libsas: Fix error path in sas_notify_lldd_dev_found() (bsc#1186533).\n- scsi: libsas: Reset num_scatter if libata marks qc as NODATA (bsc#1186700).\n- scsi: libsas: Set data_dir as DMA_NONE if libata marks qc as NODATA (bsc#1186534).\n- scsi: lpfc: Fix failure to transmit ABTS on FC link (git-fixes).\n- scsi: megaraid_sas: Check user-provided offsets (bsc#1186535).\n- scsi: megaraid_sas: Fix MEGASAS_IOC_FIRMWARE regression (bsc#1186701).\n- scsi: mesh: Fix panic after host or bus reset (bsc#1186537).\n- scsi: mpt3sas: Fix error return code of mpt3sas_base_attach() (bsc#1186538).\n- scsi: pm80xx: Fix error return in pm8001_pci_probe() (bsc#1186539).\n- scsi: powertec: Fix different dev_id between request_irq() and free_irq() (bsc#1186540).\n- scsi: qedi: Check for buffer overflow in qedi_set_path() (bsc#1186541).\n- scsi: qedi: Fix error return code of qedi_alloc_global_queues() (bsc#1186542).\n- scsi: qedi: Fix missing destroy_workqueue() on error in __qedi_probe (bsc#1186543).\n- scsi: qla4xxx: Fix an error handling path in \u0027qla4xxx_get_host_stats()\u0027 (bsc#1186545).\n- scsi: qla4xxx: Remove in_interrupt() (bsc#1186546).\n- scsi: scsi_debug: Add check for sdebug_max_queue during module init (bsc#1186547).\n- scsi: scsi_dh_alua: Retry RTPG on a different path after failure (bsc#1174978 bsc#1185701).\n- scsi: sd: Fix optimal I/O size for devices that change reported values (bsc#1186548).\n- scsi: sg: add sg_remove_request in sg_write (bsc#1186635).\n- scsi: sni_53c710: Add IRQ check (bsc#1186549).\n- scsi: sun3x_esp: Add IRQ check (bsc#1186550).\n- scsi: ufs-qcom: Fix scheduling while atomic issue (bsc#1186556).\n- scsi: ufs: core: Narrow down fast path in system suspend path (bsc#1186551).\n- scsi: ufs: Do not update urgent bkops level when toggling auto bkops (bsc#1186552).\n- scsi: ufs: Fix imprecise load calculation in devfreq window (bsc#1187630).\n- scsi: ufs: fix ktime_t kabi change (bsc#1187630).\n- scsi: ufs: Fix race between shutdown and runtime resume flow (bsc#1186554).\n- scsi: ufs: Properly release resources if a task is aborted successfully (bsc#1186555).\n- scsi: ufs: ufshcd-pltfrm depends on HAS_IOMEM (bsc#1188010).\n- scsi: ufs: ufshcd-pltfrm: Fix deferred probing (bsc#1187631).\n- serial: max310x: unregister uart driver in case of failure and abort (git-fixes).\n- serial: rp2: use \u0027request_firmware\u0027 instead of \u0027request_firmware_nowait\u0027 (git-fixes).\n- serial: sh-sci: Fix off-by-one error in FIFO threshold register setting (git-fixes).\n- serial: stm32: fix incorrect characters on console (git-fixes).\n- spi: dln2: Fix reference leak to master (git-fixes).\n- spi: omap-100k: Fix reference leak to master (git-fixes).\n- staging: emxx_udc: fix loop in _nbu2ss_nuke() (git-fixes).\n- staging: iio: cdc: ad7746: avoid overwrite of num_channels (git-fixes).\n- staging: rtl8723bs: Fix uninitialized variables (git-fixes).\n- SUNRPC: correct error code comment in xs_tcp_setup_socket() (git-fixes).\n- SUNRPC: fix refcount leak for rpc auth modules (git-fixes).\n- SUNRPC: More fixes for backlog congestion (bsc#1185428).\n- SUNRPC: Move fault injection call sites (git-fixes).\n- SUNRPC: prevent port reuse on transports which do not request it (bnc#1186264).\n- svcrdma: disable timeouts on rdma backchannel (git-fixes).\n- swiotlb: fix \u0027x86: Do not panic if can not alloc buffer for swiotlb\u0027 (git-fixes).\n- thunderbolt: dma_port: Fix NVM read buffer bounds and offset issue (git-fixes).\n- tls splice: check SPLICE_F_NONBLOCK instead of MSG_DONTWAIT (bsc#1103990).\n- tpm: fix error return code in tpm2_get_cc_attrs_tbl() (git-fixes).\n- tracing: Correct the length check which causes memory corruption (git-fixes).\n- tracing: Do no increment trace_clock_global() by one (git-fixes).\n- tracing: Restructure trace_clock_global() to never block (git-fixes).\n- ttyprintk: Add TTY hangup callback (git-fixes).\n- ubifs: Only check replay with inode type to judge if inode linked (bsc#1187455).\n- USB: Add LPM quirk for Lenovo ThinkPad USB-C Dock Gen2 Ethernet (git-fixes).\n- USB: Add reset-resume quirk for WD19\u0027s Realtek Hub (git-fixes).\n- USB: cdc-acm: always claim data interface (git-fixes).\n- USB: cdc-acm: do not log successful probe on later errors (git-fixes).\n- USB: core: hub: fix race condition about TRSMRCY of resume (git-fixes).\n- USB: dwc3: ep0: fix NULL pointer exception (git-fixes).\n- USB: dwc3: omap: improve extcon initialization (git-fixes).\n- USB: fotg210-hcd: Fix an error message (git-fixes).\n- USB: pd: Set PD_T_SINK_WAIT_CAP to 310ms (git-fixes).\n- USB: serial: ftdi_sio: add IDs for IDS GmbH Products (git-fixes).\n- USB: serial: ftdi_sio: add NovaTech OrionMX product ID (git-fixes).\n- USB: serial: omninet: add device id for Zyxel Omni 56K Plus (git-fixes).\n- USB: serial: option: add Telit LE910-S1 compositions 0x7010, 0x7011 (git-fixes).\n- USB: serial: pl2303: add device id for ADLINK ND-6530 GC (git-fixes).\n- USB: serial: quatech2: fix control-request directions (git-fixes).\n- USB: serial: ti_usb_3410_5052: add startech.com device id (git-fixes).\n- USB: serial: usb_wwan: fix TIOCSSERIAL jiffies conversions (git-fixes).\n- USB: sl811-hcd: improve misleading indentation (git-fixes).\n- USB: trancevibrator: fix control-request direction (git-fixes).\n- USB: typec: tcpm: Use LE to CPU conversion when accessing msg-\u003eheader (git-fixes).\n- USB: typec: ucsi: Clear PPM capability data in ucsi_init() error path (git-fixes).\n- USB: typec: ucsi: Put fwnode in any case during -\u003eprobe() (git-fixes).\n- USB: xhci: Fix port minor revision (git-fixes).\n- USB: xhci: Increase timeout for HC halt (git-fixes).\n- vfio/pci: Fix error return code in vfio_ecap_init() (git-fixes).\n- vfio/pci: zap_vma_ptes() needs MMU (git-fixes).\n- vfio/platform: fix module_put call in error flow (git-fixes).\n- vgacon: Record video mode changes with VT_RESIZEX (git-fixes).\n- video: hgafb: correctly handle card detect failure during probe (bsc#1129770)\n- video: hgafb: fix potential NULL pointer dereference (bsc#1129770) Backporting changes: * context changes\n- vsock/vmci: log once the failed queue pair allocation (git-fixes).\n- wl3501_cs: Fix out-of-bounds warnings in wl3501_mgmt_join (git-fixes).\n- wl3501_cs: Fix out-of-bounds warnings in wl3501_send_pkt (git-fixes).\n- x86: fix seq_file iteration for pat/memtype.c (git-fixes).\n- x86/cpu: Initialize MSR_TSC_AUX if RDTSCP *or* RDPID is supported (bsc#1114648).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2021-2349,SUSE-SLE-RT-12-SP5-2021-2349,SUSE-SUSE-MicroOS-5.0-2021-2349",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2021_2349-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2021:2349-1",
"url": "https://www.suse.com/support/update/announcement/2021/suse-su-20212349-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2021:2349-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2021-July/009133.html"
},
{
"category": "self",
"summary": "SUSE Bug 1103990",
"url": "https://bugzilla.suse.com/1103990"
},
{
"category": "self",
"summary": "SUSE Bug 1103991",
"url": "https://bugzilla.suse.com/1103991"
},
{
"category": "self",
"summary": "SUSE Bug 1104353",
"url": "https://bugzilla.suse.com/1104353"
},
{
"category": "self",
"summary": "SUSE Bug 1113994",
"url": "https://bugzilla.suse.com/1113994"
},
{
"category": "self",
"summary": "SUSE Bug 1114648",
"url": "https://bugzilla.suse.com/1114648"
},
{
"category": "self",
"summary": "SUSE Bug 1129770",
"url": "https://bugzilla.suse.com/1129770"
},
{
"category": "self",
"summary": "SUSE Bug 1135481",
"url": "https://bugzilla.suse.com/1135481"
},
{
"category": "self",
"summary": "SUSE Bug 1136345",
"url": "https://bugzilla.suse.com/1136345"
},
{
"category": "self",
"summary": "SUSE Bug 1174978",
"url": "https://bugzilla.suse.com/1174978"
},
{
"category": "self",
"summary": "SUSE Bug 1179610",
"url": "https://bugzilla.suse.com/1179610"
},
{
"category": "self",
"summary": "SUSE Bug 1182470",
"url": "https://bugzilla.suse.com/1182470"
},
{
"category": "self",
"summary": "SUSE Bug 1184040",
"url": "https://bugzilla.suse.com/1184040"
},
{
"category": "self",
"summary": "SUSE Bug 1185428",
"url": "https://bugzilla.suse.com/1185428"
},
{
"category": "self",
"summary": "SUSE Bug 1185486",
"url": "https://bugzilla.suse.com/1185486"
},
{
"category": "self",
"summary": "SUSE Bug 1185677",
"url": "https://bugzilla.suse.com/1185677"
},
{
"category": "self",
"summary": "SUSE Bug 1185701",
"url": "https://bugzilla.suse.com/1185701"
},
{
"category": "self",
"summary": "SUSE Bug 1185861",
"url": "https://bugzilla.suse.com/1185861"
},
{
"category": "self",
"summary": "SUSE Bug 1185863",
"url": "https://bugzilla.suse.com/1185863"
},
{
"category": "self",
"summary": "SUSE Bug 1186206",
"url": "https://bugzilla.suse.com/1186206"
},
{
"category": "self",
"summary": "SUSE Bug 1186264",
"url": "https://bugzilla.suse.com/1186264"
},
{
"category": "self",
"summary": "SUSE Bug 1186463",
"url": "https://bugzilla.suse.com/1186463"
},
{
"category": "self",
"summary": "SUSE Bug 1186515",
"url": "https://bugzilla.suse.com/1186515"
},
{
"category": "self",
"summary": "SUSE Bug 1186516",
"url": "https://bugzilla.suse.com/1186516"
},
{
"category": "self",
"summary": "SUSE Bug 1186517",
"url": "https://bugzilla.suse.com/1186517"
},
{
"category": "self",
"summary": "SUSE Bug 1186518",
"url": "https://bugzilla.suse.com/1186518"
},
{
"category": "self",
"summary": "SUSE Bug 1186519",
"url": "https://bugzilla.suse.com/1186519"
},
{
"category": "self",
"summary": "SUSE Bug 1186520",
"url": "https://bugzilla.suse.com/1186520"
},
{
"category": "self",
"summary": "SUSE Bug 1186521",
"url": "https://bugzilla.suse.com/1186521"
},
{
"category": "self",
"summary": "SUSE Bug 1186522",
"url": "https://bugzilla.suse.com/1186522"
},
{
"category": "self",
"summary": "SUSE Bug 1186523",
"url": "https://bugzilla.suse.com/1186523"
},
{
"category": "self",
"summary": "SUSE Bug 1186524",
"url": "https://bugzilla.suse.com/1186524"
},
{
"category": "self",
"summary": "SUSE Bug 1186525",
"url": "https://bugzilla.suse.com/1186525"
},
{
"category": "self",
"summary": "SUSE Bug 1186526",
"url": "https://bugzilla.suse.com/1186526"
},
{
"category": "self",
"summary": "SUSE Bug 1186527",
"url": "https://bugzilla.suse.com/1186527"
},
{
"category": "self",
"summary": "SUSE Bug 1186528",
"url": "https://bugzilla.suse.com/1186528"
},
{
"category": "self",
"summary": "SUSE Bug 1186529",
"url": "https://bugzilla.suse.com/1186529"
},
{
"category": "self",
"summary": "SUSE Bug 1186530",
"url": "https://bugzilla.suse.com/1186530"
},
{
"category": "self",
"summary": "SUSE Bug 1186531",
"url": "https://bugzilla.suse.com/1186531"
},
{
"category": "self",
"summary": "SUSE Bug 1186532",
"url": "https://bugzilla.suse.com/1186532"
},
{
"category": "self",
"summary": "SUSE Bug 1186533",
"url": "https://bugzilla.suse.com/1186533"
},
{
"category": "self",
"summary": "SUSE Bug 1186534",
"url": "https://bugzilla.suse.com/1186534"
},
{
"category": "self",
"summary": "SUSE Bug 1186535",
"url": "https://bugzilla.suse.com/1186535"
},
{
"category": "self",
"summary": "SUSE Bug 1186537",
"url": "https://bugzilla.suse.com/1186537"
},
{
"category": "self",
"summary": "SUSE Bug 1186538",
"url": "https://bugzilla.suse.com/1186538"
},
{
"category": "self",
"summary": "SUSE Bug 1186539",
"url": "https://bugzilla.suse.com/1186539"
},
{
"category": "self",
"summary": "SUSE Bug 1186540",
"url": "https://bugzilla.suse.com/1186540"
},
{
"category": "self",
"summary": "SUSE Bug 1186541",
"url": "https://bugzilla.suse.com/1186541"
},
{
"category": "self",
"summary": "SUSE Bug 1186542",
"url": "https://bugzilla.suse.com/1186542"
},
{
"category": "self",
"summary": "SUSE Bug 1186543",
"url": "https://bugzilla.suse.com/1186543"
},
{
"category": "self",
"summary": "SUSE Bug 1186545",
"url": "https://bugzilla.suse.com/1186545"
},
{
"category": "self",
"summary": "SUSE Bug 1186546",
"url": "https://bugzilla.suse.com/1186546"
},
{
"category": "self",
"summary": "SUSE Bug 1186547",
"url": "https://bugzilla.suse.com/1186547"
},
{
"category": "self",
"summary": "SUSE Bug 1186548",
"url": "https://bugzilla.suse.com/1186548"
},
{
"category": "self",
"summary": "SUSE Bug 1186549",
"url": "https://bugzilla.suse.com/1186549"
},
{
"category": "self",
"summary": "SUSE Bug 1186550",
"url": "https://bugzilla.suse.com/1186550"
},
{
"category": "self",
"summary": "SUSE Bug 1186551",
"url": "https://bugzilla.suse.com/1186551"
},
{
"category": "self",
"summary": "SUSE Bug 1186552",
"url": "https://bugzilla.suse.com/1186552"
},
{
"category": "self",
"summary": "SUSE Bug 1186554",
"url": "https://bugzilla.suse.com/1186554"
},
{
"category": "self",
"summary": "SUSE Bug 1186555",
"url": "https://bugzilla.suse.com/1186555"
},
{
"category": "self",
"summary": "SUSE Bug 1186556",
"url": "https://bugzilla.suse.com/1186556"
},
{
"category": "self",
"summary": "SUSE Bug 1186627",
"url": "https://bugzilla.suse.com/1186627"
},
{
"category": "self",
"summary": "SUSE Bug 1186635",
"url": "https://bugzilla.suse.com/1186635"
},
{
"category": "self",
"summary": "SUSE Bug 1186638",
"url": "https://bugzilla.suse.com/1186638"
},
{
"category": "self",
"summary": "SUSE Bug 1186698",
"url": "https://bugzilla.suse.com/1186698"
},
{
"category": "self",
"summary": "SUSE Bug 1186699",
"url": "https://bugzilla.suse.com/1186699"
},
{
"category": "self",
"summary": "SUSE Bug 1186700",
"url": "https://bugzilla.suse.com/1186700"
},
{
"category": "self",
"summary": "SUSE Bug 1186701",
"url": "https://bugzilla.suse.com/1186701"
},
{
"category": "self",
"summary": "SUSE Bug 1187038",
"url": "https://bugzilla.suse.com/1187038"
},
{
"category": "self",
"summary": "SUSE Bug 1187049",
"url": "https://bugzilla.suse.com/1187049"
},
{
"category": "self",
"summary": "SUSE Bug 1187402",
"url": "https://bugzilla.suse.com/1187402"
},
{
"category": "self",
"summary": "SUSE Bug 1187404",
"url": "https://bugzilla.suse.com/1187404"
},
{
"category": "self",
"summary": "SUSE Bug 1187407",
"url": "https://bugzilla.suse.com/1187407"
},
{
"category": "self",
"summary": "SUSE Bug 1187408",
"url": "https://bugzilla.suse.com/1187408"
},
{
"category": "self",
"summary": "SUSE Bug 1187409",
"url": "https://bugzilla.suse.com/1187409"
},
{
"category": "self",
"summary": "SUSE Bug 1187411",
"url": "https://bugzilla.suse.com/1187411"
},
{
"category": "self",
"summary": "SUSE Bug 1187412",
"url": "https://bugzilla.suse.com/1187412"
},
{
"category": "self",
"summary": "SUSE Bug 1187452",
"url": "https://bugzilla.suse.com/1187452"
},
{
"category": "self",
"summary": "SUSE Bug 1187453",
"url": "https://bugzilla.suse.com/1187453"
},
{
"category": "self",
"summary": "SUSE Bug 1187455",
"url": "https://bugzilla.suse.com/1187455"
},
{
"category": "self",
"summary": "SUSE Bug 1187554",
"url": "https://bugzilla.suse.com/1187554"
},
{
"category": "self",
"summary": "SUSE Bug 1187595",
"url": "https://bugzilla.suse.com/1187595"
},
{
"category": "self",
"summary": "SUSE Bug 1187601",
"url": "https://bugzilla.suse.com/1187601"
},
{
"category": "self",
"summary": "SUSE Bug 1187630",
"url": "https://bugzilla.suse.com/1187630"
},
{
"category": "self",
"summary": "SUSE Bug 1187631",
"url": "https://bugzilla.suse.com/1187631"
},
{
"category": "self",
"summary": "SUSE Bug 1187833",
"url": "https://bugzilla.suse.com/1187833"
},
{
"category": "self",
"summary": "SUSE Bug 1187867",
"url": "https://bugzilla.suse.com/1187867"
},
{
"category": "self",
"summary": "SUSE Bug 1187972",
"url": "https://bugzilla.suse.com/1187972"
},
{
"category": "self",
"summary": "SUSE Bug 1188010",
"url": "https://bugzilla.suse.com/1188010"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-25045 page",
"url": "https://www.suse.com/security/cve/CVE-2019-25045/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-24588 page",
"url": "https://www.suse.com/security/cve/CVE-2020-24588/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-26558 page",
"url": "https://www.suse.com/security/cve/CVE-2020-26558/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-36386 page",
"url": "https://www.suse.com/security/cve/CVE-2020-36386/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-0129 page",
"url": "https://www.suse.com/security/cve/CVE-2021-0129/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-0512 page",
"url": "https://www.suse.com/security/cve/CVE-2021-0512/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-0605 page",
"url": "https://www.suse.com/security/cve/CVE-2021-0605/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-33624 page",
"url": "https://www.suse.com/security/cve/CVE-2021-33624/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-34693 page",
"url": "https://www.suse.com/security/cve/CVE-2021-34693/"
}
],
"title": "Security update for the Linux Kernel",
"tracking": {
"current_release_date": "2021-07-14T15:37:23Z",
"generator": {
"date": "2021-07-14T15:37:23Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2021:2349-1",
"initial_release_date": "2021-07-14T15:37:23Z",
"revision_history": [
{
"date": "2021-07-14T15:37:23Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "kernel-devel-rt-4.12.14-10.49.1.noarch",
"product": {
"name": "kernel-devel-rt-4.12.14-10.49.1.noarch",
"product_id": "kernel-devel-rt-4.12.14-10.49.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-rt-4.12.14-10.49.1.noarch",
"product": {
"name": "kernel-source-rt-4.12.14-10.49.1.noarch",
"product_id": "kernel-source-rt-4.12.14-10.49.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-rt-4.12.14-10.49.1.x86_64",
"product": {
"name": "cluster-md-kmp-rt-4.12.14-10.49.1.x86_64",
"product_id": "cluster-md-kmp-rt-4.12.14-10.49.1.x86_64"
}
},
{
"category": "product_version",
"name": "cluster-md-kmp-rt_debug-4.12.14-10.49.1.x86_64",
"product": {
"name": "cluster-md-kmp-rt_debug-4.12.14-10.49.1.x86_64",
"product_id": "cluster-md-kmp-rt_debug-4.12.14-10.49.1.x86_64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-rt-4.12.14-10.49.1.x86_64",
"product": {
"name": "dlm-kmp-rt-4.12.14-10.49.1.x86_64",
"product_id": "dlm-kmp-rt-4.12.14-10.49.1.x86_64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-rt_debug-4.12.14-10.49.1.x86_64",
"product": {
"name": "dlm-kmp-rt_debug-4.12.14-10.49.1.x86_64",
"product_id": "dlm-kmp-rt_debug-4.12.14-10.49.1.x86_64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-rt-4.12.14-10.49.1.x86_64",
"product": {
"name": "gfs2-kmp-rt-4.12.14-10.49.1.x86_64",
"product_id": "gfs2-kmp-rt-4.12.14-10.49.1.x86_64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-rt_debug-4.12.14-10.49.1.x86_64",
"product": {
"name": "gfs2-kmp-rt_debug-4.12.14-10.49.1.x86_64",
"product_id": "gfs2-kmp-rt_debug-4.12.14-10.49.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt-4.12.14-10.49.1.x86_64",
"product": {
"name": "kernel-rt-4.12.14-10.49.1.x86_64",
"product_id": "kernel-rt-4.12.14-10.49.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt-base-4.12.14-10.49.1.x86_64",
"product": {
"name": "kernel-rt-base-4.12.14-10.49.1.x86_64",
"product_id": "kernel-rt-base-4.12.14-10.49.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt-devel-4.12.14-10.49.1.x86_64",
"product": {
"name": "kernel-rt-devel-4.12.14-10.49.1.x86_64",
"product_id": "kernel-rt-devel-4.12.14-10.49.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt-extra-4.12.14-10.49.1.x86_64",
"product": {
"name": "kernel-rt-extra-4.12.14-10.49.1.x86_64",
"product_id": "kernel-rt-extra-4.12.14-10.49.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt-kgraft-devel-4.12.14-10.49.1.x86_64",
"product": {
"name": "kernel-rt-kgraft-devel-4.12.14-10.49.1.x86_64",
"product_id": "kernel-rt-kgraft-devel-4.12.14-10.49.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt_debug-4.12.14-10.49.1.x86_64",
"product": {
"name": "kernel-rt_debug-4.12.14-10.49.1.x86_64",
"product_id": "kernel-rt_debug-4.12.14-10.49.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt_debug-base-4.12.14-10.49.1.x86_64",
"product": {
"name": "kernel-rt_debug-base-4.12.14-10.49.1.x86_64",
"product_id": "kernel-rt_debug-base-4.12.14-10.49.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt_debug-devel-4.12.14-10.49.1.x86_64",
"product": {
"name": "kernel-rt_debug-devel-4.12.14-10.49.1.x86_64",
"product_id": "kernel-rt_debug-devel-4.12.14-10.49.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt_debug-extra-4.12.14-10.49.1.x86_64",
"product": {
"name": "kernel-rt_debug-extra-4.12.14-10.49.1.x86_64",
"product_id": "kernel-rt_debug-extra-4.12.14-10.49.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt_debug-kgraft-devel-4.12.14-10.49.1.x86_64",
"product": {
"name": "kernel-rt_debug-kgraft-devel-4.12.14-10.49.1.x86_64",
"product_id": "kernel-rt_debug-kgraft-devel-4.12.14-10.49.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-syms-rt-4.12.14-10.49.1.x86_64",
"product": {
"name": "kernel-syms-rt-4.12.14-10.49.1.x86_64",
"product_id": "kernel-syms-rt-4.12.14-10.49.1.x86_64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-rt-4.12.14-10.49.1.x86_64",
"product": {
"name": "kselftests-kmp-rt-4.12.14-10.49.1.x86_64",
"product_id": "kselftests-kmp-rt-4.12.14-10.49.1.x86_64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-rt_debug-4.12.14-10.49.1.x86_64",
"product": {
"name": "kselftests-kmp-rt_debug-4.12.14-10.49.1.x86_64",
"product_id": "kselftests-kmp-rt_debug-4.12.14-10.49.1.x86_64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-rt-4.12.14-10.49.1.x86_64",
"product": {
"name": "ocfs2-kmp-rt-4.12.14-10.49.1.x86_64",
"product_id": "ocfs2-kmp-rt-4.12.14-10.49.1.x86_64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-rt_debug-4.12.14-10.49.1.x86_64",
"product": {
"name": "ocfs2-kmp-rt_debug-4.12.14-10.49.1.x86_64",
"product_id": "ocfs2-kmp-rt_debug-4.12.14-10.49.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Real Time 12 SP5",
"product": {
"name": "SUSE Linux Enterprise Real Time 12 SP5",
"product_id": "SUSE Linux Enterprise Real Time 12 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse-linux-enterprise-rt:12:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Micro 5.0",
"product": {
"name": "SUSE Linux Enterprise Micro 5.0",
"product_id": "SUSE Linux Enterprise Micro 5.0",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse-microos:5.0"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-rt-4.12.14-10.49.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP5",
"product_id": "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.49.1.x86_64"
},
"product_reference": "cluster-md-kmp-rt-4.12.14-10.49.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-rt-4.12.14-10.49.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP5",
"product_id": "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.49.1.x86_64"
},
"product_reference": "dlm-kmp-rt-4.12.14-10.49.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-rt-4.12.14-10.49.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP5",
"product_id": "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.49.1.x86_64"
},
"product_reference": "gfs2-kmp-rt-4.12.14-10.49.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-rt-4.12.14-10.49.1.noarch as component of SUSE Linux Enterprise Real Time 12 SP5",
"product_id": "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.49.1.noarch"
},
"product_reference": "kernel-devel-rt-4.12.14-10.49.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-4.12.14-10.49.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP5",
"product_id": "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.49.1.x86_64"
},
"product_reference": "kernel-rt-4.12.14-10.49.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-base-4.12.14-10.49.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP5",
"product_id": "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.49.1.x86_64"
},
"product_reference": "kernel-rt-base-4.12.14-10.49.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-devel-4.12.14-10.49.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP5",
"product_id": "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.49.1.x86_64"
},
"product_reference": "kernel-rt-devel-4.12.14-10.49.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt_debug-4.12.14-10.49.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP5",
"product_id": "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.49.1.x86_64"
},
"product_reference": "kernel-rt_debug-4.12.14-10.49.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt_debug-devel-4.12.14-10.49.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP5",
"product_id": "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.49.1.x86_64"
},
"product_reference": "kernel-rt_debug-devel-4.12.14-10.49.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-rt-4.12.14-10.49.1.noarch as component of SUSE Linux Enterprise Real Time 12 SP5",
"product_id": "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.49.1.noarch"
},
"product_reference": "kernel-source-rt-4.12.14-10.49.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-rt-4.12.14-10.49.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP5",
"product_id": "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.49.1.x86_64"
},
"product_reference": "kernel-syms-rt-4.12.14-10.49.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-rt-4.12.14-10.49.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP5",
"product_id": "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.49.1.x86_64"
},
"product_reference": "ocfs2-kmp-rt-4.12.14-10.49.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-4.12.14-10.49.1.x86_64 as component of SUSE Linux Enterprise Micro 5.0",
"product_id": "SUSE Linux Enterprise Micro 5.0:kernel-rt-4.12.14-10.49.1.x86_64"
},
"product_reference": "kernel-rt-4.12.14-10.49.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.0"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2019-25045",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-25045"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel before 5.0.19. The XFRM subsystem has a use-after-free, related to an xfrm_state_fini panic, aka CID-dbb2483b2a46.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Micro 5.0:kernel-rt-4.12.14-10.49.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.49.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.49.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.49.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.49.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.49.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.49.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.49.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.49.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.49.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.49.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.49.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.49.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-25045",
"url": "https://www.suse.com/security/cve/CVE-2019-25045"
},
{
"category": "external",
"summary": "SUSE Bug 1187049 for CVE-2019-25045",
"url": "https://bugzilla.suse.com/1187049"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Micro 5.0:kernel-rt-4.12.14-10.49.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.49.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.49.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.49.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.49.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.49.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.49.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.49.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.49.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.49.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.49.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.49.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.49.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Micro 5.0:kernel-rt-4.12.14-10.49.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.49.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.49.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.49.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.49.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.49.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.49.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.49.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.49.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.49.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.49.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.49.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.49.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-14T15:37:23Z",
"details": "important"
}
],
"title": "CVE-2019-25045"
},
{
"cve": "CVE-2020-24588",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-24588"
}
],
"notes": [
{
"category": "general",
"text": "The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn\u0027t require that the A-MSDU flag in the plaintext QoS header field is authenticated. Against devices that support receiving non-SSP A-MSDU frames (which is mandatory as part of 802.11n), an adversary can abuse this to inject arbitrary network packets.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Micro 5.0:kernel-rt-4.12.14-10.49.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.49.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.49.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.49.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.49.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.49.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.49.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.49.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.49.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.49.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.49.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.49.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.49.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-24588",
"url": "https://www.suse.com/security/cve/CVE-2020-24588"
},
{
"category": "external",
"summary": "SUSE Bug 1185861 for CVE-2020-24588",
"url": "https://bugzilla.suse.com/1185861"
},
{
"category": "external",
"summary": "SUSE Bug 1192868 for CVE-2020-24588",
"url": "https://bugzilla.suse.com/1192868"
},
{
"category": "external",
"summary": "SUSE Bug 1199701 for CVE-2020-24588",
"url": "https://bugzilla.suse.com/1199701"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Micro 5.0:kernel-rt-4.12.14-10.49.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.49.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.49.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.49.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.49.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.49.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.49.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.49.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.49.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.49.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.49.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.49.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.49.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Micro 5.0:kernel-rt-4.12.14-10.49.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.49.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.49.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.49.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.49.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.49.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.49.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.49.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.49.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.49.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.49.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.49.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.49.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-14T15:37:23Z",
"details": "moderate"
}
],
"title": "CVE-2020-24588"
},
{
"cve": "CVE-2020-26558",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-26558"
}
],
"notes": [
{
"category": "general",
"text": "Bluetooth LE and BR/EDR secure pairing in Bluetooth Core Specification 2.1 through 5.2 may permit a nearby man-in-the-middle attacker to identify the Passkey used during pairing (in the Passkey authentication procedure) by reflection of the public key and the authentication evidence of the initiating device, potentially permitting this attacker to complete authenticated pairing with the responding device using the correct Passkey for the pairing session. The attack methodology determines the Passkey value one bit at a time.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Micro 5.0:kernel-rt-4.12.14-10.49.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.49.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.49.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.49.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.49.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.49.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.49.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.49.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.49.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.49.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.49.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.49.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.49.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-26558",
"url": "https://www.suse.com/security/cve/CVE-2020-26558"
},
{
"category": "external",
"summary": "SUSE Bug 1179610 for CVE-2020-26558",
"url": "https://bugzilla.suse.com/1179610"
},
{
"category": "external",
"summary": "SUSE Bug 1186463 for CVE-2020-26558",
"url": "https://bugzilla.suse.com/1186463"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Micro 5.0:kernel-rt-4.12.14-10.49.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.49.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.49.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.49.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.49.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.49.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.49.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.49.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.49.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.49.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.49.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.49.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.49.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Micro 5.0:kernel-rt-4.12.14-10.49.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.49.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.49.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.49.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.49.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.49.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.49.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.49.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.49.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.49.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.49.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.49.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.49.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-14T15:37:23Z",
"details": "moderate"
}
],
"title": "CVE-2020-26558"
},
{
"cve": "CVE-2020-36386",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-36386"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel before 5.8.1. net/bluetooth/hci_event.c has a slab out-of-bounds read in hci_extended_inquiry_result_evt, aka CID-51c19bf3d5cf.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Micro 5.0:kernel-rt-4.12.14-10.49.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.49.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.49.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.49.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.49.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.49.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.49.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.49.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.49.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.49.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.49.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.49.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.49.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-36386",
"url": "https://www.suse.com/security/cve/CVE-2020-36386"
},
{
"category": "external",
"summary": "SUSE Bug 1187038 for CVE-2020-36386",
"url": "https://bugzilla.suse.com/1187038"
},
{
"category": "external",
"summary": "SUSE Bug 1192868 for CVE-2020-36386",
"url": "https://bugzilla.suse.com/1192868"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Micro 5.0:kernel-rt-4.12.14-10.49.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.49.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.49.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.49.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.49.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.49.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.49.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.49.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.49.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.49.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.49.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.49.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.49.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Micro 5.0:kernel-rt-4.12.14-10.49.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.49.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.49.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.49.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.49.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.49.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.49.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.49.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.49.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.49.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.49.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.49.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.49.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-14T15:37:23Z",
"details": "moderate"
}
],
"title": "CVE-2020-36386"
},
{
"cve": "CVE-2021-0129",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-0129"
}
],
"notes": [
{
"category": "general",
"text": "Improper access control in BlueZ may allow an authenticated user to potentially enable information disclosure via adjacent access.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Micro 5.0:kernel-rt-4.12.14-10.49.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.49.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.49.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.49.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.49.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.49.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.49.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.49.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.49.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.49.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.49.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.49.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.49.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-0129",
"url": "https://www.suse.com/security/cve/CVE-2021-0129"
},
{
"category": "external",
"summary": "SUSE Bug 1186463 for CVE-2021-0129",
"url": "https://bugzilla.suse.com/1186463"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Micro 5.0:kernel-rt-4.12.14-10.49.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.49.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.49.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.49.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.49.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.49.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.49.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.49.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.49.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.49.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.49.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.49.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.49.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Micro 5.0:kernel-rt-4.12.14-10.49.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.49.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.49.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.49.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.49.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.49.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.49.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.49.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.49.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.49.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.49.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.49.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.49.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-14T15:37:23Z",
"details": "moderate"
}
],
"title": "CVE-2021-0129"
},
{
"cve": "CVE-2021-0512",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-0512"
}
],
"notes": [
{
"category": "general",
"text": "In __hidinput_change_resolution_multipliers of hid-input.c, there is a possible out of bounds write due to a heap buffer overflow. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-173843328References: Upstream kernel",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Micro 5.0:kernel-rt-4.12.14-10.49.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.49.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.49.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.49.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.49.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.49.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.49.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.49.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.49.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.49.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.49.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.49.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.49.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-0512",
"url": "https://www.suse.com/security/cve/CVE-2021-0512"
},
{
"category": "external",
"summary": "SUSE Bug 1187595 for CVE-2021-0512",
"url": "https://bugzilla.suse.com/1187595"
},
{
"category": "external",
"summary": "SUSE Bug 1187597 for CVE-2021-0512",
"url": "https://bugzilla.suse.com/1187597"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Micro 5.0:kernel-rt-4.12.14-10.49.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.49.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.49.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.49.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.49.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.49.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.49.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.49.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.49.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.49.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.49.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.49.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.49.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Micro 5.0:kernel-rt-4.12.14-10.49.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.49.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.49.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.49.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.49.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.49.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.49.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.49.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.49.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.49.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.49.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.49.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.49.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-14T15:37:23Z",
"details": "important"
}
],
"title": "CVE-2021-0512"
},
{
"cve": "CVE-2021-0605",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-0605"
}
],
"notes": [
{
"category": "general",
"text": "In pfkey_dump of af_key.c, there is a possible out-of-bounds read due to a missing bounds check. This could lead to local information disclosure in the kernel with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-110373476",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Micro 5.0:kernel-rt-4.12.14-10.49.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.49.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.49.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.49.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.49.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.49.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.49.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.49.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.49.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.49.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.49.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.49.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.49.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-0605",
"url": "https://www.suse.com/security/cve/CVE-2021-0605"
},
{
"category": "external",
"summary": "SUSE Bug 1187601 for CVE-2021-0605",
"url": "https://bugzilla.suse.com/1187601"
},
{
"category": "external",
"summary": "SUSE Bug 1187687 for CVE-2021-0605",
"url": "https://bugzilla.suse.com/1187687"
},
{
"category": "external",
"summary": "SUSE Bug 1188381 for CVE-2021-0605",
"url": "https://bugzilla.suse.com/1188381"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Micro 5.0:kernel-rt-4.12.14-10.49.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.49.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.49.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.49.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.49.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.49.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.49.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.49.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.49.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.49.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.49.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.49.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.49.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Micro 5.0:kernel-rt-4.12.14-10.49.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.49.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.49.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.49.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.49.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.49.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.49.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.49.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.49.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.49.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.49.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.49.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.49.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-14T15:37:23Z",
"details": "important"
}
],
"title": "CVE-2021-0605"
},
{
"cve": "CVE-2021-33624",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-33624"
}
],
"notes": [
{
"category": "general",
"text": "In kernel/bpf/verifier.c in the Linux kernel before 5.12.13, a branch can be mispredicted (e.g., because of type confusion) and consequently an unprivileged BPF program can read arbitrary memory locations via a side-channel attack, aka CID-9183671af6db.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Micro 5.0:kernel-rt-4.12.14-10.49.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.49.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.49.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.49.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.49.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.49.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.49.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.49.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.49.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.49.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.49.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.49.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.49.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-33624",
"url": "https://www.suse.com/security/cve/CVE-2021-33624"
},
{
"category": "external",
"summary": "SUSE Bug 1187554 for CVE-2021-33624",
"url": "https://bugzilla.suse.com/1187554"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Micro 5.0:kernel-rt-4.12.14-10.49.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.49.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.49.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.49.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.49.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.49.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.49.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.49.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.49.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.49.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.49.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.49.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.49.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Micro 5.0:kernel-rt-4.12.14-10.49.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.49.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.49.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.49.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.49.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.49.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.49.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.49.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.49.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.49.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.49.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.49.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.49.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-14T15:37:23Z",
"details": "moderate"
}
],
"title": "CVE-2021-33624"
},
{
"cve": "CVE-2021-34693",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-34693"
}
],
"notes": [
{
"category": "general",
"text": "net/can/bcm.c in the Linux kernel through 5.12.10 allows local users to obtain sensitive information from kernel stack memory because parts of a data structure are uninitialized.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Micro 5.0:kernel-rt-4.12.14-10.49.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.49.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.49.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.49.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.49.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.49.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.49.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.49.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.49.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.49.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.49.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.49.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.49.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-34693",
"url": "https://www.suse.com/security/cve/CVE-2021-34693"
},
{
"category": "external",
"summary": "SUSE Bug 1187452 for CVE-2021-34693",
"url": "https://bugzilla.suse.com/1187452"
},
{
"category": "external",
"summary": "SUSE Bug 1192868 for CVE-2021-34693",
"url": "https://bugzilla.suse.com/1192868"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Micro 5.0:kernel-rt-4.12.14-10.49.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.49.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.49.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.49.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.49.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.49.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.49.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.49.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.49.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.49.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.49.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.49.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.49.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Micro 5.0:kernel-rt-4.12.14-10.49.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.49.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.49.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.49.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.49.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.49.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.49.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.49.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.49.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.49.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.49.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.49.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.49.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-14T15:37:23Z",
"details": "moderate"
}
],
"title": "CVE-2021-34693"
}
]
}
suse-su-2021:2202-1
Vulnerability from csaf_suse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel",
"title": "Title of the patch"
},
{
"category": "description",
"text": "The SUSE Linux Enterprise 15 SP3 azure kernel was updated to receive various security and bugfixes.\n\n\nThe following security bugs were fixed:\n\n- CVE-2020-26558: Bluetooth LE and BR/EDR secure pairing in Bluetooth Core Specification 2.1 may permit a nearby man-in-the-middle attacker to identify the Passkey used during pairing by reflection of the public key and the authentication evidence of the initiating device, potentially permitting this attacker to complete authenticated pairing with the responding device using the correct Passkey for the pairing session. (bnc#1179610 bnc#1186463)\n- CVE-2021-0129: Improper access control in BlueZ may have allowed an authenticated user to potentially enable information disclosure via adjacent access (bnc#1186463).\n- CVE-2020-36385: Fixed a use-after-free in drivers/infiniband/core/ucma.c which could be triggered if the ctx is reached via the ctx_list in some ucma_migrate_id situations where ucma_close is called (bnc#1187050).\n- CVE-2020-36386: Fixed a slab out-of-bounds read in hci_extended_inquiry_result_evt (bnc#1187038).\n\nThe following non-security bugs were fixed:\n\n- ACPICA: Clean up context mutex during object deletion (git-fixes).\n- ALSA: hda/cirrus: Set Initial DMIC volume to -26 dB (git-fixes).\n- ALSA: hda/realtek: fix mute/micmute LEDs and speaker for HP Elite Dragonfly G2 (git-fixes).\n- ALSA: hda/realtek: fix mute/micmute LEDs and speaker for HP EliteBook x360 1040 G8 (git-fixes).\n- ALSA: hda/realtek: fix mute/micmute LEDs for HP EliteBook 840 Aero G8 (git-fixes).\n- ALSA: hda/realtek: fix mute/micmute LEDs for HP ZBook Power G8 (git-fixes).\n- ALSA: hda/realtek: headphone and mic do not work on an Acer laptop (git-fixes).\n- ALSA: hda: Fix for mute key LED for HP Pavilion 15-CK0xx (git-fixes).\n- ALSA: hda: Fix for mute key LED for HP Pavilion 15-CK0xx (git-fixes).\n- ALSA: hda: update the power_state during the direct-complete (git-fixes).\n- ALSA: seq: Fix race of snd_seq_timer_open() (git-fixes).\n- ALSA: timer: Fix master timer notification (git-fixes).\n- ASoC: Intel: soc-acpi: remove TGL RVP mixed SoundWire/TDM config (git-fixes).\n- ASoC: amd: fix for pcm_read() error (git-fixes).\n- ASoC: cs43130: handle errors in cs43130_probe() properly (git-fixes).\n- ASoC: max98088: fix ni clock divider calculation (git-fixes).\n- Bluetooth: fix the erroneous flush_work() order (git-fixes).\n- Enable CONFIG_PCI_PF_STUB for Nvidia Ampere vGPU support (jsc#SLE-17882 jsc#ECO-3691)\n- HID: i2c-hid: Skip ELAN power-on command after reset (git-fixes).\n- HID: i2c-hid: fix format string mismatch (git-fixes).\n- HID: magicmouse: fix NULL-deref on disconnect (git-fixes).\n- HID: multitouch: require Finger field to mark Win8 reports as MT (git-fixes).\n- HID: pidff: fix error return code in hid_pidff_init() (git-fixes).\n- NFC: SUSE specific brutal fix for runtime PM (bsc#1185589).\n- NFS: Deal correctly with attribute generation counter overflow (git-fixes).\n- NFS: Do not corrupt the value of pg_bytes_written in nfs_do_recoalesce() (git-fixes).\n- NFS: Do not discard pNFS layout segments that are marked for return (git-fixes).\n- NFS: Do not gratuitously clear the inode cache when lookup failed (git-fixes).\n- NFS: Do not revalidate the directory permissions on a lookup failure (git-fixes).\n- NFS: Fix an Oopsable condition in __nfs_pageio_add_request() (git-fixes).\n- NFS: fix an incorrect limit in filelayout_decode_layout() (git-fixes).\n- NFSD: Repair misuse of sv_lock in 5.10.16-rt30 (git-fixes).\n- NFSv4.2 fix handling of sr_eof in SEEK\u0027s reply (git-fixes).\n- NFSv4.2: Always flush out writes in nfs42_proc_fallocate() (git-fixes).\n- NFSv4.2: fix return value of _nfs4_get_security_label() (git-fixes).\n- NFSv42: Copy offload should update the file size when appropriate (git-fixes).\n- NFSv4: Do not discard segments marked for return in _pnfs_return_layout() (git-fixes).\n- NFSv4: Fix a NULL pointer dereference in pnfs_mark_matching_lsegs_return() (git-fixes).\n- NFSv4: Fix v4.0/v4.1 SEEK_DATA return -ENOTSUPP when set NFS_V4_2 config (git-fixes).\n- PCI/LINK: Remove bandwidth notification (bsc#1183712).\n- PM: sleep: Add pm_debug_messages kernel command line option (bsc#1186752).\n- SUNRPC: Move fault injection call sites (git-fixes).\n- SUNRPC: Set memalloc_nofs_save() for sync tasks (git-fixes).\n- UCSI fixup of array of PDOs (git-fixes).\n- USB: f_ncm: ncm_bitrate (speed) is unsigned (git-fixes).\n- USB: serial: cp210x: fix alternate function for CP2102N QFN20 (git-fixes).\n- USB: serial: ftdi_sio: add IDs for IDS GmbH Products (git-fixes).\n- USB: serial: option: add Telit LE910-S1 compositions 0x7010, 0x7011 (git-fixes).\n- USB: serial: pl2303: add device id for ADLINK ND-6530 GC (git-fixes).\n- USB: serial: quatech2: fix control-request directions (git-fixes).\n- USB: serial: ti_usb_3410_5052: add startech.com device id (git-fixes).\n- USB: usbfs: Do not WARN about excessively large memory allocations (git-fixes).\n- ath6kl: return error code in ath6kl_wmi_set_roam_lrssi_cmd() (git-fixes).\n- bcache: Convert to DEFINE_SHOW_ATTRIBUTE (bsc#1187357).\n- bcache: Use 64-bit arithmetic instead of 32-bit (bsc#1187357).\n- bcache: avoid oversized read request in cache missing code path (bsc#1187357, bsc#1185570, bsc#1184631).\n- bcache: do not pass BIOSET_NEED_BVECS for the \u0027bio_set\u0027 embedded in \u0027cache_set\u0027 (bsc#1187357).\n- bcache: fix a regression of code compiling failure in debug.c (bsc#1187357).\n- bcache: inherit the optimal I/O size (bsc#1187357).\n- bcache: reduce redundant code in bch_cached_dev_run() (bsc#1187357).\n- bcache: remove PTR_CACHE (bsc#1187357).\n- bcache: remove bcache device self-defined readahead (bsc#1187357, bsc#1185570, bsc#1184631).\n- bcache: use NULL instead of using plain integer as pointer (bsc#1187357).\n- blk-settings: align max_sectors on \u0027logical_block_size\u0027 boundary (bsc#1185195).\n- block: return the correct bvec when checking for gaps (bsc#1187143).\n- block: return the correct bvec when checking for gaps (bsc#1187144).\n- brcmfmac: Add clm_blob firmware files to modinfo (bsc#1186677).\n- brcmfmac: properly check for bus register errors (git-fixes).\n- btrfs: open device without device_list_mutex (bsc#1176771).\n- bus: ti-sysc: Fix flakey idling of uarts and stop using swsup_sidle_act (git-fixes).\n- char: hpet: add checks after calling ioremap (git-fixes).\n- chelsio/chtls: unlock on error in chtls_pt_recvmsg() (jsc#SLE-15129).\n- cxgb4/ch_ktls: Clear resources when pf4 device is removed (jsc#SLE-15129).\n- cxgb4: avoid accessing registers when clearing filters (git-fixes).\n- cxgb4: avoid link re-train during TC-MQPRIO configuration (jsc#SLE-8389).\n- cxgb4: fix regression with HASH tc prio value update (jsc#SLE-15131).\n- devlink: Correct VIRTUAL port to not have phys_port attributes (jsc#SLE-15172).\n- dmaengine: idxd: Use cpu_feature_enabled() (git-fixes).\n- dmaengine: idxd: add missing dsa driver unregister (git-fixes).\n- dmaengine: qcom_hidma: comment platform_driver_register call (git-fixes).\n- drm/amd/amdgpu: fix a potential deadlock in gpu reset (git-fixes).\n- drm/amd/amdgpu: fix refcount leak (git-fixes).\n- drm/amd/display: Disconnect non-DP with no EDID (git-fixes).\n- drm/amd/display: Disconnect non-DP with no EDID (git-fixes).\n- drm/amdgpu/jpeg2.0: add cancel_delayed_work_sync before power gate (git-fixes).\n- drm/amdgpu/jpeg2.5: add cancel_delayed_work_sync before power gate (git-fixes).\n- drm/amdgpu/jpeg3: add cancel_delayed_work_sync before power gate (git-fixes).\n- drm/amdgpu/vcn1: add cancel_delayed_work_sync before power gate (git-fixes).\n- drm/amdgpu/vcn2.0: add cancel_delayed_work_sync before power gate (git-fixes).\n- drm/amdgpu/vcn2.5: add cancel_delayed_work_sync before power gate (git-fixes).\n- drm/amdgpu/vcn3: add cancel_delayed_work_sync before power gate (git-fixes).\n- drm/amdgpu: Do not query CE and UE errors (git-fixes).\n- drm/amdgpu: Fix a use-after-free (git-fixes).\n- drm/amdgpu: make sure we unpin the UVD BO (git-fixes).\n- drm/amdgpu: stop touching sched.ready in the backend (git-fixes).\n- drm/amdkfd: correct sienna_cichlid SDMA RLC register offset error (git-fixes).\n- drm/i915/selftests: Fix return value check in live_breadcrumbs_smoketest() (git-fixes).\n- drm/mcde: Fix off by 10^3 in calculation (git-fixes).\n- drm/msm/a6xx: fix incorrectly set uavflagprd_inv field for A650 (git-fixes).\n- drm/msm/a6xx: update/fix CP_PROTECT initialization (git-fixes).\n- efi/libstub: prevent read overflow in find_file_option() (git-fixes).\n- efi: Allow EFI_MEMORY_XP and EFI_MEMORY_RO both to be cleared (git-fixes).\n- efi: cper: fix snprintf() use in cper_dimm_err_location() (git-fixes).\n- fs/nfs: Use fatal_signal_pending instead of signal_pending (git-fixes).\n- gpio: cadence: Add missing MODULE_DEVICE_TABLE (git-fixes).\n- gpio: wcd934x: Fix shift-out-of-bounds error (git-fixes).\n- gve: Add NULL pointer checks when freeing irqs (git-fixes).\n- gve: Correct SKB queue index validation (git-fixes).\n- gve: Update mgmt_msix_idx if num_ntfy changes (git-fixes).\n- gve: Upgrade memory barrier in poll routine (git-fixes).\n- hwmon: (dell-smm-hwmon) Fix index values (git-fixes).\n- i2c: imx: fix reference leak when pm_runtime_get_sync fails (git-fixes).\n- i2c: qcom-geni: Suspend and resume the bus during SYSTEM_SLEEP_PM ops (git-fixes).\n- ice: Allow all LLDP packets from PF to Tx (jsc#SLE-7926).\n- ice: Fix VFR issues for AVF drivers that expect ATQLEN cleared (git-fixes).\n- ice: Fix allowing VF to request more/less queues via virtchnl (jsc#SLE-12878).\n- ice: handle the VF VSI rebuild failure (jsc#SLE-12878).\n- iommu/amd: Keep track of amd_iommu_irq_remap state (https://bugzilla.kernel.org/show_bug.cgi?id=212133).\n- iommu/virtio: Add missing MODULE_DEVICE_TABLE (bsc#1187345).\n- iommu/vt-d: Remove WO permissions on second-level paging entries (bsc#1187346).\n- iommu/vt-d: Report right snoop capability when using FL for IOVA (bsc#1187347).\n- iommu/vt-d: Use user privilege for RID2PASID translation (bsc#1187348).\n- iommu: Fix a boundary issue to avoid performance drop (bsc#1187344).\n- isdn: mISDN: correctly handle ph_info allocation failure in hfcsusb_ph_info (git-fixes).\n- isdn: mISDNinfineon: check/cleanup ioremap failure correctly in setup_io (git-fixes).\n- ixgbe: fix large MTU request from VF (git-fixes).\n- kABI workaround for rtw88 (git-fixes).\n- kABI workaround for struct lis3lv02d change (git-fixes).\n- lib: crc64: fix kernel-doc warning (bsc#1187357).\n- libertas: register sysfs groups properly (git-fixes).\n- locking/mutex: clear MUTEX_FLAGS if wait_list is empty due to signal (git-fixes).\n- md: Fix missing unused status line of /proc/mdstat (git-fixes).\n- md: bcache: Trivial typo fixes in the file journal.c (bsc#1187357).\n- md: bcache: avoid -Wempty-body warnings (bsc#1187357).\n- media: dvb: Add check on sp8870_readreg return (git-fixes).\n- media: dvb: Add check on sp8870_readreg return (git-fixes).\n- media: gspca: mt9m111: Check write_bridge for timeout (git-fixes).\n- media: gspca: mt9m111: Check write_bridge for timeout (git-fixes).\n- media: gspca: properly check for errors in po1030_probe() (git-fixes).\n- media: gspca: properly check for errors in po1030_probe() (git-fixes).\n- mei: request autosuspend after sending rx flow control (git-fixes).\n- mmc: sdhci: Clear unused bounce buffer at DMA mmap error path (bsc#1187039).\n- net/mlx4: Fix EEPROM dump support (git-fixes).\n- net/mlx5: DR, Create multi-destination flow table with level less than 64 (jsc#SLE-8464).\n- net/mlx5: Set reformat action when needed for termination rules (jsc#SLE-15172).\n- net/mlx5: Set term table as an unmanaged flow table (jsc#SLE-15172).\n- net/mlx5e: Fix error path of updating netdev queues (jsc#SLE-15172).\n- net/mlx5e: Fix incompatible casting (jsc#SLE-15172).\n- net/mlx5e: Fix multipath lag activation (git-fixes).\n- net/mlx5e: Fix null deref accessing lag dev (jsc#SLE-15172).\n- net/mlx5e: Fix nullptr in add_vlan_push_action() (git-fixes).\n- net/mlx5e: reset XPS on error flow if netdev isn\u0027t registered yet (jsc#SLE-15172).\n- net/sched: act_ct: Offload connections with commit action (jsc#SLE-15172).\n- net/sched: fq_pie: fix OOB access in the traffic path (jsc#SLE-15172).\n- net/sched: fq_pie: re-factor fix for fq_pie endless loop (jsc#SLE-15172).\n- net: bnx2: Fix error return code in bnx2_init_board() (git-fixes).\n- net: fix iteration for sctp transport seq_files (git-fixes).\n- net: hns3: Limiting the scope of vector_ring_chain variable (git-fixes).\n- net: hns3: fix incorrect resp_msg issue (jsc#SLE-14777).\n- net: hns3: put off calling register_netdev() until client initialize complete (bsc#1154353).\n- net: zero-initialize tc skb extension on allocation (bsc#1176447).\n- netfilter: nf_tables: missing error reporting for not selected expressions (bsc#1176447).\n- netfilter: nft_set_pipapo_avx2: Add irq_fpu_usable() check, fallback to non-AVX2 version (bsc#1176447).\n- nfc: fix NULL ptr dereference in llcp_sock_getname() after failed connect (git-fixes).\n- nfsd: register pernet ops last, unregister first (git-fixes).\n- nvme-multipath: fix double initialization of ANA state (bsc#1178612, bsc#1184259, bsc#1186155).\n- nvme: add new line after variable declatation (bsc#1184259, bsc#1178612, bsc#1186155).\n- nvme: do not check nvme_req flags for new req (bsc#1184259, bsc#1178612, bsc#1186155).\n- nvme: mark nvme_setup_passsthru() inline (bsc#1184259, bsc#1178612, bsc#1186155).\n- nvme: reduce checks for zero command effects (bsc#1184259, bsc#1178612, bsc#1186155).\n- nvme: rename nvme_init_identify() (bsc#1184259, bsc#1178612, bsc#1186155).\n- nvme: split init identify into helper (bsc#1184259, bsc#1178612, bsc#1186155).\n- nvme: use NVME_CTRL_CMIC_ANA macro (bsc#1184259, bsc#1178612, bsc#1186155).\n- nvmet: use new ana_log_size instead the old one (bsc#1178612, bsc#1184259, bsc#1186155).\n- pNFS/NFSv4: Fix a layout segment leak in pnfs_layout_process() (git-fixes).\n- pNFS/flexfiles: fix incorrect size check in decode_nfs_fh() (git-fixes).\n- pid: take a reference when initializing `cad_pid` (bsc#1152489).\n- platform/x86: hp-wireless: add AMD\u0027s hardware id to the supported list (git-fixes).\n- platform/x86: hp_accel: Avoid invoking _INI to speed up resume (git-fixes).\n- platform/x86: intel_punit_ipc: Append MODULE_DEVICE_TABLE for ACPI (git-fixes).\n- platform/x86: touchscreen_dmi: Add info for the Mediacom Winpad 7.0 W700 tablet (git-fixes).\n- powerpc/32: Fix boot failure with CONFIG_STACKPROTECTOR (jsc#SLE-13847 git-fixes).\n- powerpc/kprobes: Fix validation of prefixed instructions across page boundary (jsc#SLE-13847 git-fixes).\n- regulator: core: resolve supply for boot-on/always-on regulators (git-fixes).\n- regulator: max77620: Use device_set_of_node_from_dev() (git-fixes).\n- rtw88: 8822c: add LC calibration for RTL8822C (git-fixes).\n- scsi: aacraid: Fix an oops in error handling (bsc#1187072).\n- scsi: aacraid: Remove erroneous fallthrough annotation (bsc#1186950).\n- scsi: aacraid: Use memdup_user() as a cleanup (bsc#1186951).\n- scsi: acornscsi: Fix an error handling path in acornscsi_probe() (bsc#1186952).\n- scsi: be2iscsi: Fix a theoretical leak in beiscsi_create_eqs() (bsc#1186953).\n- scsi: be2iscsi: Revert \u0027Fix a theoretical leak in beiscsi_create_eqs()\u0027 (bsc#1187067).\n- scsi: bfa: Fix error return in bfad_pci_init() (bsc#1186954).\n- scsi: bnx2fc: Fix Kconfig warning \u0026 CNIC build errors (bsc#1186955).\n- scsi: bnx2i: Requires MMU (bsc#1186956).\n- scsi: csiostor: Fix wrong return value in csio_hw_prep_fw() (bsc#1186957).\n- scsi: cumana_2: Fix different dev_id between request_irq() and free_irq() (bsc#1186958).\n- scsi: cxgb3i: Fix some leaks in init_act_open() (bsc#1186959).\n- scsi: cxgb4i: Fix TLS dependency (bsc#1186960).\n- scsi: eesox: Fix different dev_id between request_irq() and free_irq() (bsc#1186961).\n- scsi: fnic: Fix error return code in fnic_probe() (bsc#1186962).\n- scsi: hisi_sas: Fix IRQ checks (bsc#1186963).\n- scsi: hisi_sas: Remove preemptible() (bsc#1186964).\n- scsi: jazz_esp: Add IRQ check (bsc#1186965).\n- scsi: libfc: Fix enum-conversion warning (bsc#1186966).\n- scsi: libsas: Fix error path in sas_notify_lldd_dev_found() (bsc#1186967).\n- scsi: libsas: Reset num_scatter if libata marks qc as NODATA (bsc#1187068).\n- scsi: libsas: Set data_dir as DMA_NONE if libata marks qc as NODATA (bsc#1186968).\n- scsi: lpfc: Fix ancient double free (bsc#1186969).\n- scsi: lpfc: Fix failure to transmit ABTS on FC link (git-fixes).\n- scsi: megaraid_sas: Check user-provided offsets (bsc#1186970).\n- scsi: megaraid_sas: Clear affinity hint (bsc#1186971).\n- scsi: megaraid_sas: Do not call disable_irq from process IRQ poll (bsc#1186972).\n- scsi: megaraid_sas: Fix MEGASAS_IOC_FIRMWARE regression (bsc#1186973).\n- scsi: megaraid_sas: Remove undefined ENABLE_IRQ_POLL macro (bsc#1186974).\n- scsi: mesh: Fix panic after host or bus reset (bsc#1186976).\n- scsi: mpt3sas: Do not use GFP_KERNEL in atomic context (bsc#1186977).\n- scsi: mpt3sas: Fix error return code of mpt3sas_base_attach() (bsc#1186978).\n- scsi: mpt3sas: Fix ioctl timeout (bsc#1186979).\n- scsi: myrs: Fix a double free in myrs_cleanup() (bsc#1186980).\n- scsi: pm80xx: Fix error return in pm8001_pci_probe() (bsc#1186981).\n- scsi: powertec: Fix different dev_id between request_irq() and free_irq() (bsc#1186982).\n- scsi: qedi: Check for buffer overflow in qedi_set_path() (bsc#1186983).\n- scsi: qedi: Fix error return code of qedi_alloc_global_queues() (bsc#1186984).\n- scsi: qedi: Fix missing destroy_workqueue() on error in __qedi_probe (bsc#1186985).\n- scsi: qla2xxx: Prevent PRLI in target mode (git-fixes).\n- scsi: qla4xxx: Fix an error handling path in \u0027qla4xxx_get_host_stats()\u0027 (bsc#1186986).\n- scsi: qla4xxx: Remove in_interrupt() (bsc#1186987).\n- scsi: scsi_debug: Add check for sdebug_max_queue during module init (bsc#1186988).\n- scsi: scsi_dh_alua: Retry RTPG on a different path after failure (bsc#1174978 bsc#1185701).\n- scsi: sd: Fix Opal support (bsc#1186989).\n- scsi: smartpqi: Add additional logging for LUN resets (bsc#1186472).\n- scsi: smartpqi: Add host level stream detection enable (bsc#1186472).\n- scsi: smartpqi: Add new PCI IDs (bsc#1186472).\n- scsi: smartpqi: Add phy ID support for the physical drives (bsc#1186472).\n- scsi: smartpqi: Add stream detection (bsc#1186472).\n- scsi: smartpqi: Add support for BMIC sense feature cmd and feature bits (bsc#1186472).\n- scsi: smartpqi: Add support for RAID1 writes (bsc#1186472).\n- scsi: smartpqi: Add support for RAID5 and RAID6 writes (bsc#1186472).\n- scsi: smartpqi: Add support for long firmware version (bsc#1186472).\n- scsi: smartpqi: Add support for new product ids (bsc#1186472).\n- scsi: smartpqi: Add support for wwid (bsc#1186472).\n- scsi: smartpqi: Align code with oob driver (bsc#1186472).\n- scsi: smartpqi: Convert snprintf() to scnprintf() (bsc#1186472).\n- scsi: smartpqi: Correct request leakage during reset operations (bsc#1186472).\n- scsi: smartpqi: Correct system hangs when resuming from hibernation (bsc#1186472).\n- scsi: smartpqi: Disable WRITE SAME for HBA NVMe disks (bsc#1186472).\n- scsi: smartpqi: Fix blocks_per_row static checker issue (bsc#1186472).\n- scsi: smartpqi: Fix device pointer variable reference static checker issue (bsc#1186472).\n- scsi: smartpqi: Fix driver synchronization issues (bsc#1186472).\n- scsi: smartpqi: Refactor aio submission code (bsc#1186472).\n- scsi: smartpqi: Refactor scatterlist code (bsc#1186472).\n- scsi: smartpqi: Remove timeouts from internal cmds (bsc#1186472).\n- scsi: smartpqi: Remove unused functions (bsc#1186472).\n- scsi: smartpqi: Synchronize device resets with mutex (bsc#1186472).\n- scsi: smartpqi: Update OFA management (bsc#1186472).\n- scsi: smartpqi: Update RAID bypass handling (bsc#1186472).\n- scsi: smartpqi: Update SAS initiator_port_protocols and target_port_protocols (bsc#1186472).\n- scsi: smartpqi: Update device scan operations (bsc#1186472).\n- scsi: smartpqi: Update enclosure identifier in sysfs (bsc#1186472).\n- scsi: smartpqi: Update event handler (bsc#1186472).\n- scsi: smartpqi: Update soft reset management for OFA (bsc#1186472).\n- scsi: smartpqi: Update suspend/resume and shutdown (bsc#1186472).\n- scsi: smartpqi: Update version to 2.1.8-045 (bsc#1186472).\n- scsi: smartpqi: Use host-wide tag space (bsc#1186472).\n- scsi: sni_53c710: Add IRQ check (bsc#1186990).\n- scsi: sun3x_esp: Add IRQ check (bsc#1186991).\n- scsi: ufs-qcom: Fix scheduling while atomic issue (bsc#1187002).\n- scsi: ufs: Add quirk to disallow reset of interrupt aggregation (bsc#1186992).\n- scsi: ufs: Add quirk to enable host controller without hce (bsc#1186993).\n- scsi: ufs: Add quirk to fix abnormal ocs fatal error (bsc#1186994).\n- scsi: ufs: Add quirk to fix mishandling utrlclr/utmrlclr (bsc#1186995).\n- scsi: ufs: Do not update urgent bkops level when toggling auto bkops (bsc#1186997).\n- scsi: ufs: Fix race between shutdown and runtime resume flow (bsc#1186998).\n- scsi: ufs: Introduce UFSHCD_QUIRK_PRDT_BYTE_GRAN quirk (bsc#1187000).\n- scsi: ufs: Make ufshcd_print_trs() consider UFSHCD_QUIRK_PRDT_BYTE_GRAN (bsc#1187069).\n- scsi: ufs: Properly release resources if a task is aborted successfully (bsc#1187001).\n- scsi: ufs: core: Narrow down fast path in system suspend path (bsc#1186996).\n- scsi: ufs: ufshcd-pltfrm: Fix deferred probing (bsc#1187003).\n- scsi: ufshcd: use an enum for quirks (bsc#1186999).\n- serial: 8250_pci: handle FL_NOIRQ board flag (git-fixes).\n- serial: max310x: unregister uart driver in case of failure and abort (git-fixes).\n- serial: rp2: use \u0027request_firmware\u0027 instead of \u0027request_firmware_nowait\u0027 (git-fixes).\n- staging: rtl8723bs: Fix uninitialized variables (git-fixes).\n- sunrpc: fix refcount leak for rpc auth modules (git-fixes).\n- svcrdma: disable timeouts on rdma backchannel (git-fixes).\n- thermal/drivers/intel: Initialize RW trip to THERMAL_TEMP_INVALID (git-fixes).\n- thunderbolt: usb4: Fix NVM read buffer bounds and offset issue (git-fixes).\n- tpm: fix error return code in tpm2_get_cc_attrs_tbl() (git-fixes).\n- ttyprintk: Add TTY hangup callback (git-fixes).\n- usb: chipidea: imx: Fix Battery Charger 1.2 CDP detection (git-fixes).\n- usb: core: reduce power-on-good delay time of root hub (git-fixes).\n- usb: fix various gadgets null ptr deref on 10gbps cabling (git-fixes).\n- usb: musb: fix MUSB_QUIRK_B_DISCONNECT_99 handling (git-fixes).\n- usb: pd: Set PD_T_SINK_WAIT_CAP to 310ms (git-fixes).\n- usb: typec: intel_pmc_mux: Put fwnode in error case during -\u003eprobe() (git-fixes).\n- usb: typec: mux: Fix copy-paste mistake in typec_mux_match (git-fixes).\n- usb: typec: mux: Fix matching with typec_altmode_desc (git-fixes).\n- usb: typec: tcpm: Use LE to CPU conversion when accessing msg-\u003eheader (git-fixes).\n- usb: typec: ucsi: Clear PPM capability data in ucsi_init() error path (git-fixes).\n- usb: typec: ucsi: Retrieve all the PDOs instead of just the first 4 (git-fixes).\n- usb: typec: wcove: Use LE to CPU conversion when accessing msg-\u003eheader (git-fixes).\n- vfio/pci: Fix error return code in vfio_ecap_init() (git-fixes).\n- vfio/pci: zap_vma_ptes() needs MMU (git-fixes).\n- vfio/platform: fix module_put call in error flow (git-fixes).\n- vmlinux.lds.h: Avoid orphan section with !SMP (git-fixes).\n- vsock/vmci: log once the failed queue pair allocation (git-fixes).\n- wireguard: allowedips: initialize list head in selftest (git-fixes).\n- wireguard: do not use -O3 (git-fixes).\n- wireguard: peer: allocate in kmem_cache (git-fixes).\n- wireguard: peer: put frequently used members above cache lines (git-fixes).\n- wireguard: queueing: get rid of per-peer ring buffers (git-fixes).\n- wireguard: selftests: make sure rp_filter is disabled on vethc (git-fixes).\n- wireguard: selftests: remove old conntrack kconfig value (git-fixes).\n- wireguard: use synchronize_net rather than synchronize_rcu (git-fixes).\n- x86/apic: Mark _all_ legacy interrupts when IO/APIC is missing (bsc#1152489).\n- x86/boot/64: Explicitly map boot_params and command line (jsc#SLE-14337).\n- x86/boot/compressed/64: Add 32-bit boot #VC handler (jsc#SLE-14337).\n- x86/boot/compressed/64: Add CPUID sanity check to 32-bit boot-path (jsc#SLE-14337).\n- x86/boot/compressed/64: Check SEV encryption in 64-bit boot-path (jsc#SLE-14337).\n- x86/boot/compressed/64: Check SEV encryption in the 32-bit boot-path (jsc#SLE-14337).\n- x86/boot/compressed/64: Cleanup exception handling before booting kernel (jsc#SLE-14337).\n- x86/boot/compressed/64: Introduce sev_status (jsc#SLE-14337).\n- x86/boot/compressed/64: Reload CS in startup_32 (jsc#SLE-14337).\n- x86/boot/compressed/64: Sanity-check CPUID results in the early #VC handler (jsc#SLE-14337).\n- x86/boot/compressed/64: Setup IDT in startup_32 boot path (jsc#SLE-14337).\n- x86/cpufeatures: Force disable X86_FEATURE_ENQCMD and remove update_pasid() (bsc#1178134).\n- x86/fault: Do not send SIGSEGV twice on SEGV_PKUERR (bsc#1152489).\n- x86/fpu: Prevent state corruption in __fpu__restore_sig() (bsc#1178134).\n- x86/head/64: Check SEV encryption before switching to kernel page-table (jsc#SLE-14337).\n- x86/head/64: Disable stack protection for head$(BITS).o (jsc#SLE-14337).\n- x86/ioremap: Map efi_mem_reserve() memory as encrypted for SEV (bsc#1186885).\n- x86/sev-es: Do not return NULL from sev_es_get_ghcb() (bsc#1187349).\n- x86/sev-es: Do not support MMIO to/from encrypted memory (jsc#SLE-14337).\n- x86/sev-es: Forward page-faults which happen during emulation (bsc#1187350).\n- x86/sev-es: Replace open-coded hlt-loops with sev_es_terminate() (jsc#SLE-14337).\n- x86/sev-es: Use __put_user()/__get_user() for data accesses (bsc#1187351).\n- x86/sev: Check SME/SEV support in CPUID first (jsc#SLE-14337).\n- x86/sev: Do not require Hypervisor CPUID bit for SEV guests (jsc#SLE-14337).\n- x86: fix seq_file iteration for pat.c (git-fixes).\n- xfrm: policy: Read seqcount outside of rcu-read side in xfrm_policy_lookup_bytype (bsc#1185675).\n- xprtrdma: Avoid Receive Queue wrapping (git-fixes).\n- xprtrdma: rpcrdma_mr_pop() already does list_del_init() (git-fixes).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2021-2202,SUSE-SLE-Module-Public-Cloud-15-SP3-2021-2202",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2021_2202-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2021:2202-1",
"url": "https://www.suse.com/support/update/announcement/2021/suse-su-20212202-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2021:2202-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2021-June/009101.html"
},
{
"category": "self",
"summary": "SUSE Bug 1152489",
"url": "https://bugzilla.suse.com/1152489"
},
{
"category": "self",
"summary": "SUSE Bug 1154353",
"url": "https://bugzilla.suse.com/1154353"
},
{
"category": "self",
"summary": "SUSE Bug 1174978",
"url": "https://bugzilla.suse.com/1174978"
},
{
"category": "self",
"summary": "SUSE Bug 1176447",
"url": "https://bugzilla.suse.com/1176447"
},
{
"category": "self",
"summary": "SUSE Bug 1176771",
"url": "https://bugzilla.suse.com/1176771"
},
{
"category": "self",
"summary": "SUSE Bug 1178134",
"url": "https://bugzilla.suse.com/1178134"
},
{
"category": "self",
"summary": "SUSE Bug 1178612",
"url": "https://bugzilla.suse.com/1178612"
},
{
"category": "self",
"summary": "SUSE Bug 1179610",
"url": "https://bugzilla.suse.com/1179610"
},
{
"category": "self",
"summary": "SUSE Bug 1183712",
"url": "https://bugzilla.suse.com/1183712"
},
{
"category": "self",
"summary": "SUSE Bug 1184259",
"url": "https://bugzilla.suse.com/1184259"
},
{
"category": "self",
"summary": "SUSE Bug 1184436",
"url": "https://bugzilla.suse.com/1184436"
},
{
"category": "self",
"summary": "SUSE Bug 1184631",
"url": "https://bugzilla.suse.com/1184631"
},
{
"category": "self",
"summary": "SUSE Bug 1185195",
"url": "https://bugzilla.suse.com/1185195"
},
{
"category": "self",
"summary": "SUSE Bug 1185570",
"url": "https://bugzilla.suse.com/1185570"
},
{
"category": "self",
"summary": "SUSE Bug 1185589",
"url": "https://bugzilla.suse.com/1185589"
},
{
"category": "self",
"summary": "SUSE Bug 1185675",
"url": "https://bugzilla.suse.com/1185675"
},
{
"category": "self",
"summary": "SUSE Bug 1185701",
"url": "https://bugzilla.suse.com/1185701"
},
{
"category": "self",
"summary": "SUSE Bug 1186155",
"url": "https://bugzilla.suse.com/1186155"
},
{
"category": "self",
"summary": "SUSE Bug 1186286",
"url": "https://bugzilla.suse.com/1186286"
},
{
"category": "self",
"summary": "SUSE Bug 1186463",
"url": "https://bugzilla.suse.com/1186463"
},
{
"category": "self",
"summary": "SUSE Bug 1186472",
"url": "https://bugzilla.suse.com/1186472"
},
{
"category": "self",
"summary": "SUSE Bug 1186672",
"url": "https://bugzilla.suse.com/1186672"
},
{
"category": "self",
"summary": "SUSE Bug 1186677",
"url": "https://bugzilla.suse.com/1186677"
},
{
"category": "self",
"summary": "SUSE Bug 1186752",
"url": "https://bugzilla.suse.com/1186752"
},
{
"category": "self",
"summary": "SUSE Bug 1186885",
"url": "https://bugzilla.suse.com/1186885"
},
{
"category": "self",
"summary": "SUSE Bug 1186928",
"url": "https://bugzilla.suse.com/1186928"
},
{
"category": "self",
"summary": "SUSE Bug 1186949",
"url": "https://bugzilla.suse.com/1186949"
},
{
"category": "self",
"summary": "SUSE Bug 1186950",
"url": "https://bugzilla.suse.com/1186950"
},
{
"category": "self",
"summary": "SUSE Bug 1186951",
"url": "https://bugzilla.suse.com/1186951"
},
{
"category": "self",
"summary": "SUSE Bug 1186952",
"url": "https://bugzilla.suse.com/1186952"
},
{
"category": "self",
"summary": "SUSE Bug 1186953",
"url": "https://bugzilla.suse.com/1186953"
},
{
"category": "self",
"summary": "SUSE Bug 1186954",
"url": "https://bugzilla.suse.com/1186954"
},
{
"category": "self",
"summary": "SUSE Bug 1186955",
"url": "https://bugzilla.suse.com/1186955"
},
{
"category": "self",
"summary": "SUSE Bug 1186956",
"url": "https://bugzilla.suse.com/1186956"
},
{
"category": "self",
"summary": "SUSE Bug 1186957",
"url": "https://bugzilla.suse.com/1186957"
},
{
"category": "self",
"summary": "SUSE Bug 1186958",
"url": "https://bugzilla.suse.com/1186958"
},
{
"category": "self",
"summary": "SUSE Bug 1186959",
"url": "https://bugzilla.suse.com/1186959"
},
{
"category": "self",
"summary": "SUSE Bug 1186960",
"url": "https://bugzilla.suse.com/1186960"
},
{
"category": "self",
"summary": "SUSE Bug 1186961",
"url": "https://bugzilla.suse.com/1186961"
},
{
"category": "self",
"summary": "SUSE Bug 1186962",
"url": "https://bugzilla.suse.com/1186962"
},
{
"category": "self",
"summary": "SUSE Bug 1186963",
"url": "https://bugzilla.suse.com/1186963"
},
{
"category": "self",
"summary": "SUSE Bug 1186964",
"url": "https://bugzilla.suse.com/1186964"
},
{
"category": "self",
"summary": "SUSE Bug 1186965",
"url": "https://bugzilla.suse.com/1186965"
},
{
"category": "self",
"summary": "SUSE Bug 1186966",
"url": "https://bugzilla.suse.com/1186966"
},
{
"category": "self",
"summary": "SUSE Bug 1186967",
"url": "https://bugzilla.suse.com/1186967"
},
{
"category": "self",
"summary": "SUSE Bug 1186968",
"url": "https://bugzilla.suse.com/1186968"
},
{
"category": "self",
"summary": "SUSE Bug 1186969",
"url": "https://bugzilla.suse.com/1186969"
},
{
"category": "self",
"summary": "SUSE Bug 1186970",
"url": "https://bugzilla.suse.com/1186970"
},
{
"category": "self",
"summary": "SUSE Bug 1186971",
"url": "https://bugzilla.suse.com/1186971"
},
{
"category": "self",
"summary": "SUSE Bug 1186972",
"url": "https://bugzilla.suse.com/1186972"
},
{
"category": "self",
"summary": "SUSE Bug 1186973",
"url": "https://bugzilla.suse.com/1186973"
},
{
"category": "self",
"summary": "SUSE Bug 1186974",
"url": "https://bugzilla.suse.com/1186974"
},
{
"category": "self",
"summary": "SUSE Bug 1186976",
"url": "https://bugzilla.suse.com/1186976"
},
{
"category": "self",
"summary": "SUSE Bug 1186977",
"url": "https://bugzilla.suse.com/1186977"
},
{
"category": "self",
"summary": "SUSE Bug 1186978",
"url": "https://bugzilla.suse.com/1186978"
},
{
"category": "self",
"summary": "SUSE Bug 1186979",
"url": "https://bugzilla.suse.com/1186979"
},
{
"category": "self",
"summary": "SUSE Bug 1186980",
"url": "https://bugzilla.suse.com/1186980"
},
{
"category": "self",
"summary": "SUSE Bug 1186981",
"url": "https://bugzilla.suse.com/1186981"
},
{
"category": "self",
"summary": "SUSE Bug 1186982",
"url": "https://bugzilla.suse.com/1186982"
},
{
"category": "self",
"summary": "SUSE Bug 1186983",
"url": "https://bugzilla.suse.com/1186983"
},
{
"category": "self",
"summary": "SUSE Bug 1186984",
"url": "https://bugzilla.suse.com/1186984"
},
{
"category": "self",
"summary": "SUSE Bug 1186985",
"url": "https://bugzilla.suse.com/1186985"
},
{
"category": "self",
"summary": "SUSE Bug 1186986",
"url": "https://bugzilla.suse.com/1186986"
},
{
"category": "self",
"summary": "SUSE Bug 1186987",
"url": "https://bugzilla.suse.com/1186987"
},
{
"category": "self",
"summary": "SUSE Bug 1186988",
"url": "https://bugzilla.suse.com/1186988"
},
{
"category": "self",
"summary": "SUSE Bug 1186989",
"url": "https://bugzilla.suse.com/1186989"
},
{
"category": "self",
"summary": "SUSE Bug 1186990",
"url": "https://bugzilla.suse.com/1186990"
},
{
"category": "self",
"summary": "SUSE Bug 1186991",
"url": "https://bugzilla.suse.com/1186991"
},
{
"category": "self",
"summary": "SUSE Bug 1186992",
"url": "https://bugzilla.suse.com/1186992"
},
{
"category": "self",
"summary": "SUSE Bug 1186993",
"url": "https://bugzilla.suse.com/1186993"
},
{
"category": "self",
"summary": "SUSE Bug 1186994",
"url": "https://bugzilla.suse.com/1186994"
},
{
"category": "self",
"summary": "SUSE Bug 1186995",
"url": "https://bugzilla.suse.com/1186995"
},
{
"category": "self",
"summary": "SUSE Bug 1186996",
"url": "https://bugzilla.suse.com/1186996"
},
{
"category": "self",
"summary": "SUSE Bug 1186997",
"url": "https://bugzilla.suse.com/1186997"
},
{
"category": "self",
"summary": "SUSE Bug 1186998",
"url": "https://bugzilla.suse.com/1186998"
},
{
"category": "self",
"summary": "SUSE Bug 1186999",
"url": "https://bugzilla.suse.com/1186999"
},
{
"category": "self",
"summary": "SUSE Bug 1187000",
"url": "https://bugzilla.suse.com/1187000"
},
{
"category": "self",
"summary": "SUSE Bug 1187001",
"url": "https://bugzilla.suse.com/1187001"
},
{
"category": "self",
"summary": "SUSE Bug 1187002",
"url": "https://bugzilla.suse.com/1187002"
},
{
"category": "self",
"summary": "SUSE Bug 1187003",
"url": "https://bugzilla.suse.com/1187003"
},
{
"category": "self",
"summary": "SUSE Bug 1187038",
"url": "https://bugzilla.suse.com/1187038"
},
{
"category": "self",
"summary": "SUSE Bug 1187039",
"url": "https://bugzilla.suse.com/1187039"
},
{
"category": "self",
"summary": "SUSE Bug 1187050",
"url": "https://bugzilla.suse.com/1187050"
},
{
"category": "self",
"summary": "SUSE Bug 1187052",
"url": "https://bugzilla.suse.com/1187052"
},
{
"category": "self",
"summary": "SUSE Bug 1187067",
"url": "https://bugzilla.suse.com/1187067"
},
{
"category": "self",
"summary": "SUSE Bug 1187068",
"url": "https://bugzilla.suse.com/1187068"
},
{
"category": "self",
"summary": "SUSE Bug 1187069",
"url": "https://bugzilla.suse.com/1187069"
},
{
"category": "self",
"summary": "SUSE Bug 1187072",
"url": "https://bugzilla.suse.com/1187072"
},
{
"category": "self",
"summary": "SUSE Bug 1187143",
"url": "https://bugzilla.suse.com/1187143"
},
{
"category": "self",
"summary": "SUSE Bug 1187144",
"url": "https://bugzilla.suse.com/1187144"
},
{
"category": "self",
"summary": "SUSE Bug 1187167",
"url": "https://bugzilla.suse.com/1187167"
},
{
"category": "self",
"summary": "SUSE Bug 1187334",
"url": "https://bugzilla.suse.com/1187334"
},
{
"category": "self",
"summary": "SUSE Bug 1187344",
"url": "https://bugzilla.suse.com/1187344"
},
{
"category": "self",
"summary": "SUSE Bug 1187345",
"url": "https://bugzilla.suse.com/1187345"
},
{
"category": "self",
"summary": "SUSE Bug 1187346",
"url": "https://bugzilla.suse.com/1187346"
},
{
"category": "self",
"summary": "SUSE Bug 1187347",
"url": "https://bugzilla.suse.com/1187347"
},
{
"category": "self",
"summary": "SUSE Bug 1187348",
"url": "https://bugzilla.suse.com/1187348"
},
{
"category": "self",
"summary": "SUSE Bug 1187349",
"url": "https://bugzilla.suse.com/1187349"
},
{
"category": "self",
"summary": "SUSE Bug 1187350",
"url": "https://bugzilla.suse.com/1187350"
},
{
"category": "self",
"summary": "SUSE Bug 1187351",
"url": "https://bugzilla.suse.com/1187351"
},
{
"category": "self",
"summary": "SUSE Bug 1187357",
"url": "https://bugzilla.suse.com/1187357"
},
{
"category": "self",
"summary": "SUSE Bug 1187711",
"url": "https://bugzilla.suse.com/1187711"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-26558 page",
"url": "https://www.suse.com/security/cve/CVE-2020-26558/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-36385 page",
"url": "https://www.suse.com/security/cve/CVE-2020-36385/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-36386 page",
"url": "https://www.suse.com/security/cve/CVE-2020-36386/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-0129 page",
"url": "https://www.suse.com/security/cve/CVE-2021-0129/"
}
],
"title": "Security update for the Linux Kernel",
"tracking": {
"current_release_date": "2021-06-29T11:11:24Z",
"generator": {
"date": "2021-06-29T11:11:24Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2021:2202-1",
"initial_release_date": "2021-06-29T11:11:24Z",
"revision_history": [
{
"date": "2021-06-29T11:11:24Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "kernel-devel-azure-5.3.18-38.8.1.noarch",
"product": {
"name": "kernel-devel-azure-5.3.18-38.8.1.noarch",
"product_id": "kernel-devel-azure-5.3.18-38.8.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-azure-5.3.18-38.8.1.noarch",
"product": {
"name": "kernel-source-azure-5.3.18-38.8.1.noarch",
"product_id": "kernel-source-azure-5.3.18-38.8.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-azure-5.3.18-38.8.1.x86_64",
"product": {
"name": "cluster-md-kmp-azure-5.3.18-38.8.1.x86_64",
"product_id": "cluster-md-kmp-azure-5.3.18-38.8.1.x86_64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-azure-5.3.18-38.8.1.x86_64",
"product": {
"name": "dlm-kmp-azure-5.3.18-38.8.1.x86_64",
"product_id": "dlm-kmp-azure-5.3.18-38.8.1.x86_64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-azure-5.3.18-38.8.1.x86_64",
"product": {
"name": "gfs2-kmp-azure-5.3.18-38.8.1.x86_64",
"product_id": "gfs2-kmp-azure-5.3.18-38.8.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-azure-5.3.18-38.8.1.x86_64",
"product": {
"name": "kernel-azure-5.3.18-38.8.1.x86_64",
"product_id": "kernel-azure-5.3.18-38.8.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-azure-devel-5.3.18-38.8.1.x86_64",
"product": {
"name": "kernel-azure-devel-5.3.18-38.8.1.x86_64",
"product_id": "kernel-azure-devel-5.3.18-38.8.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-azure-extra-5.3.18-38.8.1.x86_64",
"product": {
"name": "kernel-azure-extra-5.3.18-38.8.1.x86_64",
"product_id": "kernel-azure-extra-5.3.18-38.8.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-azure-livepatch-devel-5.3.18-38.8.1.x86_64",
"product": {
"name": "kernel-azure-livepatch-devel-5.3.18-38.8.1.x86_64",
"product_id": "kernel-azure-livepatch-devel-5.3.18-38.8.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-azure-optional-5.3.18-38.8.1.x86_64",
"product": {
"name": "kernel-azure-optional-5.3.18-38.8.1.x86_64",
"product_id": "kernel-azure-optional-5.3.18-38.8.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-syms-azure-5.3.18-38.8.1.x86_64",
"product": {
"name": "kernel-syms-azure-5.3.18-38.8.1.x86_64",
"product_id": "kernel-syms-azure-5.3.18-38.8.1.x86_64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-azure-5.3.18-38.8.1.x86_64",
"product": {
"name": "kselftests-kmp-azure-5.3.18-38.8.1.x86_64",
"product_id": "kselftests-kmp-azure-5.3.18-38.8.1.x86_64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-azure-5.3.18-38.8.1.x86_64",
"product": {
"name": "ocfs2-kmp-azure-5.3.18-38.8.1.x86_64",
"product_id": "ocfs2-kmp-azure-5.3.18-38.8.1.x86_64"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-azure-5.3.18-38.8.1.x86_64",
"product": {
"name": "reiserfs-kmp-azure-5.3.18-38.8.1.x86_64",
"product_id": "reiserfs-kmp-azure-5.3.18-38.8.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Public Cloud 15 SP3",
"product": {
"name": "SUSE Linux Enterprise Module for Public Cloud 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-public-cloud:15:sp3"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-azure-5.3.18-38.8.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.8.1.x86_64"
},
"product_reference": "kernel-azure-5.3.18-38.8.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-azure-devel-5.3.18-38.8.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.8.1.x86_64"
},
"product_reference": "kernel-azure-devel-5.3.18-38.8.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-azure-5.3.18-38.8.1.noarch as component of SUSE Linux Enterprise Module for Public Cloud 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.8.1.noarch"
},
"product_reference": "kernel-devel-azure-5.3.18-38.8.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-azure-5.3.18-38.8.1.noarch as component of SUSE Linux Enterprise Module for Public Cloud 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.8.1.noarch"
},
"product_reference": "kernel-source-azure-5.3.18-38.8.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-azure-5.3.18-38.8.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.8.1.x86_64"
},
"product_reference": "kernel-syms-azure-5.3.18-38.8.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP3"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2020-26558",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-26558"
}
],
"notes": [
{
"category": "general",
"text": "Bluetooth LE and BR/EDR secure pairing in Bluetooth Core Specification 2.1 through 5.2 may permit a nearby man-in-the-middle attacker to identify the Passkey used during pairing (in the Passkey authentication procedure) by reflection of the public key and the authentication evidence of the initiating device, potentially permitting this attacker to complete authenticated pairing with the responding device using the correct Passkey for the pairing session. The attack methodology determines the Passkey value one bit at a time.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.8.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.8.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.8.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.8.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-26558",
"url": "https://www.suse.com/security/cve/CVE-2020-26558"
},
{
"category": "external",
"summary": "SUSE Bug 1179610 for CVE-2020-26558",
"url": "https://bugzilla.suse.com/1179610"
},
{
"category": "external",
"summary": "SUSE Bug 1186463 for CVE-2020-26558",
"url": "https://bugzilla.suse.com/1186463"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.8.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.8.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.8.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.8.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.8.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.8.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.8.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.8.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-29T11:11:24Z",
"details": "moderate"
}
],
"title": "CVE-2020-26558"
},
{
"cve": "CVE-2020-36385",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-36385"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel before 5.10. drivers/infiniband/core/ucma.c has a use-after-free because the ctx is reached via the ctx_list in some ucma_migrate_id situations where ucma_close is called, aka CID-f5449e74802c.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.8.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.8.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.8.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.8.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-36385",
"url": "https://www.suse.com/security/cve/CVE-2020-36385"
},
{
"category": "external",
"summary": "SUSE Bug 1187050 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1187050"
},
{
"category": "external",
"summary": "SUSE Bug 1187052 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1187052"
},
{
"category": "external",
"summary": "SUSE Bug 1189302 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1189302"
},
{
"category": "external",
"summary": "SUSE Bug 1196174 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1196174"
},
{
"category": "external",
"summary": "SUSE Bug 1196810 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1196810"
},
{
"category": "external",
"summary": "SUSE Bug 1196914 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1196914"
},
{
"category": "external",
"summary": "SUSE Bug 1200084 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1200084"
},
{
"category": "external",
"summary": "SUSE Bug 1201734 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1201734"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.8.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.8.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.8.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.8.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.8.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.8.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.8.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.8.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-29T11:11:24Z",
"details": "important"
}
],
"title": "CVE-2020-36385"
},
{
"cve": "CVE-2020-36386",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-36386"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel before 5.8.1. net/bluetooth/hci_event.c has a slab out-of-bounds read in hci_extended_inquiry_result_evt, aka CID-51c19bf3d5cf.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.8.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.8.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.8.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.8.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-36386",
"url": "https://www.suse.com/security/cve/CVE-2020-36386"
},
{
"category": "external",
"summary": "SUSE Bug 1187038 for CVE-2020-36386",
"url": "https://bugzilla.suse.com/1187038"
},
{
"category": "external",
"summary": "SUSE Bug 1192868 for CVE-2020-36386",
"url": "https://bugzilla.suse.com/1192868"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.8.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.8.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.8.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.8.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.8.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.8.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.8.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.8.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-29T11:11:24Z",
"details": "moderate"
}
],
"title": "CVE-2020-36386"
},
{
"cve": "CVE-2021-0129",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-0129"
}
],
"notes": [
{
"category": "general",
"text": "Improper access control in BlueZ may allow an authenticated user to potentially enable information disclosure via adjacent access.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.8.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.8.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.8.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.8.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-0129",
"url": "https://www.suse.com/security/cve/CVE-2021-0129"
},
{
"category": "external",
"summary": "SUSE Bug 1186463 for CVE-2021-0129",
"url": "https://bugzilla.suse.com/1186463"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.8.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.8.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.8.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.8.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.8.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.8.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.8.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.8.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-29T11:11:24Z",
"details": "moderate"
}
],
"title": "CVE-2021-0129"
}
]
}
suse-su-2021:2303-1
Vulnerability from csaf_suse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel",
"title": "Title of the patch"
},
{
"category": "description",
"text": "The SUSE Linux Enterprise 15 SP2 Azure kernel was updated to receive various security and bugfixes.\n\n\nThe following security bugs were fixed:\n\n- CVE-2021-3573: Fixed an UAF vulnerability in function that can allow attackers to corrupt kernel heaps and adopt further exploitations. (bsc#1186666)\n- CVE-2021-0605: Fixed an out-of-bounds read which could lead to local information disclosure in the kernel with System execution privileges needed. (bsc#1187601)\n- CVE-2021-0512: Fixed a possible out-of-bounds write which could lead to local escalation of privilege with no additional execution privileges needed. (bsc#1187595)\n- CVE-2021-33624: Fixed a bug which allows unprivileged BPF program to leak the contents of arbitrary kernel memory (and therefore, of all physical memory) via a side-channel. (bsc#1187554)\n- CVE-2021-34693: Fixed a bug in net/can/bcm.c which could allow local users to obtain sensitive information from kernel stack memory because parts of a data structure are uninitialized. (bsc#1187452)\n- CVE-2021-0129: Fixed improper access control in BlueZ that may have allowed an authenticated user to potentially enable information disclosure via adjacent access (bnc#1186463).\n- CVE-2020-36385: Fixed a use-after-free via the ctx_list in some ucma_migrate_id situations where ucma_close is called (bnc#1187050).\n- CVE-2020-26558: Fixed Bluetooth LE and BR/EDR secure pairing in Bluetooth Core Specification 2.1 (bnc#1179610, bnc#1186463).\n- CVE-2020-36386: Fixed an out-of-bounds read issue in hci_extended_inquiry_result_evt (bnc#1187038).\n\nThe following non-security bugs were fixed:\n\n- acpica: Clean up context mutex during object deletion (git-fixes).\n- alsa: hda/cirrus: Set Initial DMIC volume to -26 dB (git-fixes).\n- alsa: hda: Fix for mute key LED for HP Pavilion 15-CK0xx (git-fixes).\n- alsa: timer: Fix master timer notification (git-fixes).\n- alx: Fix an error handling path in \u0027alx_probe()\u0027 (git-fixes).\n- arch: Add arch-dependent support markers in supported.conf (bsc#1186672)\n- arch: Add the support for kernel-FLAVOR-optional subpackage (jsc#SLE-11796)\n- ASoC: Intel: bytcr_rt5640: Add quirk for the Glavey TM800A550L tablet (git-fixes).\n- ASoC: Intel: bytcr_rt5640: Add quirk for the Lenovo Miix 3-830 tablet (git-fixes).\n- ASoC: max98088: fix ni clock divider calculation (git-fixes).\n- ASoC: rt5659: Fix the lost powers for the HDA header (git-fixes).\n- ASoC: sti-sas: add missing MODULE_DEVICE_TABLE (git-fixes).\n- ath6kl: return error code in ath6kl_wmi_set_roam_lrssi_cmd() (git-fixes).\n- batman-adv: Avoid WARN_ON timing related checks (git-fixes).\n- be2net: Fix an error handling path in \u0027be_probe()\u0027 (git-fixes).\n- blk-settings: align max_sectors on \u0027logical_block_size\u0027 boundary (bsc#1185195).\n- block: Discard page cache of zone reset target range (bsc#1187402).\n- block: return the correct bvec when checking for gaps (bsc#1187143).\n- block: return the correct bvec when checking for gaps (bsc#1187144).\n- bluetooth: fix the erroneous flush_work() order (git-fixes).\n- bluetooth: use correct lock to prevent UAF of hdev object (git-fixes).\n- bnxt_en: Call bnxt_ethtool_free() in bnxt_init_one() error path (jsc#SLE-8371 bsc#1153274).\n- bnxt_en: Fix TQM fastpath ring backing store computation (jsc#SLE-8371 bsc#1153274).\n- bnxt_en: Rediscover PHY capabilities after firmware reset (jsc#SLE-8371 bsc#1153274).\n- bpfilter: Specify the log level for the kmsg message (bsc#1155518).\n- brcmfmac: properly check for bus register errors (git-fixes).\n- btrfs: open device without device_list_mutex (bsc#1176771).\n- bus: ti-sysc: Fix flakey idling of uarts and stop using swsup_sidle_act (git-fixes).\n- can: mcba_usb: fix memory leak in mcba_usb (git-fixes).\n- ceph: must hold snap_rwsem when filling inode for async create (bsc#1187927).\n- cfg80211: avoid double free of PMSR request (git-fixes).\n- cfg80211: make certificate generation more robust (git-fixes).\n- cgroup1: do not allow \u0027\\n\u0027 in renaming (bsc#1187972).\n- char: hpet: add checks after calling ioremap (git-fixes).\n- CPU: Startup failed when SNC (sub-numa cluster) is enabled with 3 NIC add-on cards installed (bsc#1187263).\n- cxgb4: avoid accessing registers when clearing filters (git-fixes).\n- cxgb4: avoid link re-train during TC-MQPRIO configuration (jsc#SLE-8389).\n- cxgb4: fix wrong shift (git-fixes).\n- dax: Add a wakeup mode parameter to put_unlocked_entry() (bsc#1187411).\n- dax: Add an enum for specifying dax wakup mode (bsc#1187411).\n- dax: fix ENOMEM handling in grab_mapping_entry() (bsc#1184212).\n- dax: Wake up all waiters after invalidating dax entry (bsc#1187411).\n- dmaengine: ALTERA_MSGDMA depends on HAS_IOMEM (git-fixes).\n- dmaengine: pl330: fix wrong usage of spinlock flags in dma_cyclc (git-fixes).\n- dmaengine: qcom_hidma: comment platform_driver_register call (git-fixes).\n- dmaengine: QCOM_HIDMA_MGMT depends on HAS_IOMEM (git-fixes).\n- dmaengine: stedma40: add missing iounmap() on error in d40_probe() (git-fixes).\n- drm/amd/amdgpu: fix a potential deadlock in gpu reset (git-fixes).\n- drm/amd/amdgpu: fix refcount leak (git-fixes).\n- drm/amd/display: Allow bandwidth validation for 0 streams (git-fixes).\n- drm/amd/display: Disconnect non-DP with no EDID (git-fixes).\n- drm/amdgpu: Fix a use-after-free (git-fixes).\n- drm/amdgpu: make sure we unpin the UVD BO (git-fixes).\n- drm/tegra: sor: Do not leak runtime PM reference (git-fixes).\n- drm: Fix use-after-free read in drm_getunique() (git-fixes).\n- drm: Lock pointer access in drm_master_release() (git-fixes).\n- dt-bindings: reset: meson8b: fix duplicate reset IDs (git-fixes).\n- efi: Allow EFI_MEMORY_XP and EFI_MEMORY_RO both to be cleared (git-fixes).\n- efi: cper: fix snprintf() use in cper_dimm_err_location() (git-fixes).\n- ext4: fix bug on in ext4_es_cache_extent as ext4_split_extent_at failed (bsc#1187408).\n- ext4: fix check to prevent false positive report of incorrect used inodes (bsc#1187404).\n- ext4: fix error code in ext4_commit_super (bsc#1187407).\n- ext4: fix memory leak in ext4_fill_super (bsc#1187409).\n- FCOE: fcoe_wwn_from_mac kABI fix (bsc#1187886).\n- fs/nfs: Use fatal_signal_pending instead of signal_pending (git-fixes).\n- fs: fix reporting supported extra file attributes for statx() (bsc#1187410).\n- ftrace: Do not blindly read the ip address in ftrace_bug() (git-fixes).\n- ftrace: Free the trampoline when ftrace_startup() fails (git-fixes).\n- fuse: BUG_ON correction in fuse_dev_splice_write() (bsc#1187356).\n- gpio: cadence: Add missing MODULE_DEVICE_TABLE (git-fixes).\n- gpu: Enable CONFIG_PCI_PF_STUB for Nvidia Ampere vGPU support (jsc#SLE-17882 jsc#ECO-3691)\n- gve: Add NULL pointer checks when freeing irqs (git-fixes).\n- gve: Correct SKB queue index validation (git-fixes).\n- gve: Upgrade memory barrier in poll routine (git-fixes).\n- HID: Add BUS_VIRTUAL to hid_connect logging (git-fixes).\n- HID: gt683r: add missing MODULE_DEVICE_TABLE (git-fixes).\n- HID: hid-input: add mapping for emoji picker key (git-fixes).\n- HID: hid-sensor-hub: Return error for hid_set_field() failure (git-fixes).\n- HID: i2c-hid: fix format string mismatch (git-fixes).\n- HID: i2c-hid: Skip ELAN power-on command after reset (git-fixes).\n- HID: magicmouse: fix NULL-deref on disconnect (git-fixes).\n- HID: multitouch: require Finger field to mark Win8 reports as MT (git-fixes).\n- HID: pidff: fix error return code in hid_pidff_init() (git-fixes).\n- HID: quirks: Set INCREMENT_USAGE_ON_DUPLICATE for Saitek X65 (git-fixes).\n- HID: usbhid: fix info leak in hid_submit_ctrl (git-fixes).\n- HID: usbhid: Fix race between usbhid_close() and usbhid_stop() (git-fixes).\n- hwmon: (dell-smm-hwmon) Fix index values (git-fixes).\n- hwmon: (scpi-hwmon) shows the negative temperature properly (git-fixes).\n- i2c: mpc: Make use of i2c_recover_bus() (git-fixes).\n- i2c: qcom-geni: Suspend and resume the bus during SYSTEM_SLEEP_PM ops (git-fixes).\n- ice: add ndo_bpf callback for safe mode netdev ops (jsc#SLE-7926).\n- ice: Allow all LLDP packets from PF to Tx (jsc#SLE-7926).\n- ice: Fix VFR issues for AVF drivers that expect ATQLEN cleared (git-fixes).\n- isdn: mISDN: correctly handle ph_info allocation failure in hfcsusb_ph_info (git-fixes).\n- isdn: mISDN: netjet: Fix crash in nj_probe: (git-fixes).\n- isdn: mISDNinfineon: check/cleanup ioremap failure correctly in setup_io (git-fixes).\n- ixgbe: fix large MTU request from VF (git-fixes).\n- kABI workaround for struct lis3lv02d change (git-fixes).\n- kernel-binary.spec.in: Add Supplements: for -extra package on Leap kernel-$flavor-extra should supplement kernel-$flavor on Leap, like it does on SLED, and like the kernel-$flavor-optional package does.\n- kernel-binary.spec.in: build-id check requires elfutils.\n- kernel-binary.spec.in: Regenerate makefile when not using mkmakefile.\n- kernel-binary.spec: Only use mkmakefile when it exists Linux 5.13 no longer had a mkmakefile script\n- kernel: kexec_file: fix error return code of kexec_calculate_store_digests() (git-fixes).\n- kthread: prevent deadlock when kthread_mod_delayed_work() races with kthread_cancel_delayed_work_sync() (bsc#1187867).\n- kthread_worker: split code for canceling the delayed work timer (bsc#1187867).\n- kyber: fix out of bounds access when preempted (bsc#1187403).\n- lib: vdso: Remove CROSS_COMPILE_COMPAT_VDSO (bsc#1164648,jsc#SLE-11493).\n- libertas: register sysfs groups properly (git-fixes).\n- locking/mutex: clear MUTEX_FLAGS if wait_list is empty due to signal (git-fixes).\n- md: Fix missing unused status line of /proc/mdstat (git-fixes).\n- media: dvb: Add check on sp8870_readreg return (git-fixes).\n- media: dvb: Add check on sp8870_readreg return (git-fixes).\n- media: gspca: mt9m111: Check write_bridge for timeout (git-fixes).\n- media: gspca: mt9m111: Check write_bridge for timeout (git-fixes).\n- media: gspca: properly check for errors in po1030_probe() (git-fixes).\n- media: gspca: properly check for errors in po1030_probe() (git-fixes).\n- media: mtk-mdp: Check return value of of_clk_get (git-fixes).\n- media: mtk-mdp: Fix a refcounting bug on error in init (git-fixes).\n- media: s5p-g2d: Fix a memory leak in an error handling path in \u0027g2d_probe()\u0027 (git-fixes).\n- mei: request autosuspend after sending rx flow control (git-fixes).\n- mmc: meson-gx: use memcpy_to/fromio for dram-access-quirk (git-fixes).\n- module: limit enabling module.sig_enforce (git-fixes).\n- net/mlx4: Fix EEPROM dump support (git-fixes).\n- net/mlx5: Consider RoCE cap before init RDMA resources (git-fixes).\n- net/mlx5: DR, Create multi-destination flow table with level less than 64 (jsc#SLE-8464).\n- net/mlx5: Fix PBMC register mapping (git-fixes).\n- net/mlx5: Fix placement of log_max_flow_counter (git-fixes).\n- net/mlx5: Fix sleep while atomic in mlx5_eswitch_get_vepa (git-fixes).\n- net/mlx5e: Block offload of outer header csum for UDP tunnels (git-fixes).\n- net/mlx5e: Fix multipath lag activation (git-fixes).\n- net/mlx5e: Fix nullptr in add_vlan_push_action() (git-fixes).\n- net/mlx5e: Fix page reclaim for dead peer hairpin (git-fixes).\n- net/mlx5e: Remove dependency in IPsec initialization flows (git-fixes).\n- net/nfc/rawsock.c: fix a permission check bug (git-fixes).\n- net/sched: act_ct: handle DNAT tuple collision (bsc#1154353).\n- net/x25: Return the correct errno code (git-fixes).\n- net: bnx2: Fix error return code in bnx2_init_board() (git-fixes).\n- net: fix iteration for sctp transport seq_files (git-fixes).\n- net: hns3: Limiting the scope of vector_ring_chain variable (git-fixes).\n- net: hns3: put off calling register_netdev() until client initialize complete (bsc#1154353).\n- net: mvpp2: add mvpp2_phylink_to_port() helper (bsc#1187171).\n- netxen_nic: Fix an error handling path in \u0027netxen_nic_probe()\u0027 (git-fixes).\n- nfc: fix NULL ptr dereference in llcp_sock_getname() after failed connect (git-fixes).\n- NFC: SUSE specific brutal fix for runtime PM (bsc#1185589).\n- NFS: Deal correctly with attribute generation counter overflow (git-fixes).\n- NFS: Do not corrupt the value of pg_bytes_written in nfs_do_recoalesce() (git-fixes).\n- NFS: Do not discard pNFS layout segments that are marked for return (git-fixes).\n- NFS: Do not gratuitously clear the inode cache when lookup failed (git-fixes).\n- NFS: Do not revalidate the directory permissions on a lookup failure (git-fixes).\n- NFS: Fix a potential NULL dereference in nfs_get_client() (git-fixes).\n- NFS: fix an incorrect limit in filelayout_decode_layout() (git-fixes).\n- NFS: Fix an Oopsable condition in __nfs_pageio_add_request() (git-fixes).\n- NFS: Fix use-after-free in nfs4_init_client() (git-fixes).\n- nfsd: register pernet ops last, unregister first (git-fixes).\n- NFSD: Repair misuse of sv_lock in 5.10.16-rt30 (git-fixes).\n- NFSv4.2 fix handling of sr_eof in SEEK\u0027s reply (git-fixes).\n- NFSv4.2: Always flush out writes in nfs42_proc_fallocate() (git-fixes).\n- NFSv4.2: fix return value of _nfs4_get_security_label() (git-fixes).\n- NFSv4: Do not discard segments marked for return in _pnfs_return_layout() (git-fixes).\n- NFSv4: Fix a NULL pointer dereference in pnfs_mark_matching_lsegs_return() (git-fixes).\n- NFSv4: Fix deadlock between nfs4_evict_inode() and nfs4_opendata_get_inode() (git-fixes).\n- NFSv4: Fix v4.0/v4.1 SEEK_DATA return -ENOTSUPP when set NFS_V4_2 config (git-fixes).\n- ocfs2: fix data corruption by fallocate (bsc#1187412).\n- PCI/LINK: Remove bandwidth notification (bsc#1183712).\n- PCI: aardvark: Do not rely on jiffies while holding spinlock (git-fixes).\n- PCI: aardvark: Fix kernel panic during PIO transfer (git-fixes).\n- PCI: Add ACS quirk for Broadcom BCM57414 NIC (git-fixes).\n- PCI: Mark some NVIDIA GPUs to avoid bus reset (git-fixes).\n- PCI: Mark TI C667X to avoid bus reset (git-fixes).\n- PCI: Work around Huawei Intelligent NIC VF FLR erratum (git-fixes).\n- perf/x86/intel/uncore: Remove uncore extra PCI dev HSWEP_PCI_PCU_3 (bsc#1184685).\n- pid: take a reference when initializing `cad_pid` (bsc#1152489).\n- platform/x86: hp-wireless: add AMD\u0027s hardware id to the supported list (git-fixes).\n- platform/x86: hp_accel: Avoid invoking _INI to speed up resume (git-fixes).\n- platform/x86: intel_punit_ipc: Append MODULE_DEVICE_TABLE for ACPI (git-fixes).\n- platform/x86: touchscreen_dmi: Add info for the Mediacom Winpad 7.0 W700 tablet (git-fixes).\n- PM: sleep: Add pm_debug_messages kernel command line option (bsc#1186752).\n- pNFS/flexfiles: fix incorrect size check in decode_nfs_fh() (git-fixes).\n- pNFS/NFSv4: Fix a layout segment leak in pnfs_layout_process() (git-fixes).\n- qla2xxx: synchronize rport dev_loss_tmo setting (bsc#1182470 bsc#1185486).\n- qlcnic: Fix an error handling path in \u0027qlcnic_probe()\u0027 (git-fixes).\n- radeon: use memcpy_to/fromio for UVD fw upload (git-fixes).\n- regulator: bd70528: Fix off-by-one for buck123 .n_voltages setting (git-fixes).\n- regulator: core: resolve supply for boot-on/always-on regulators (git-fixes).\n- regulator: max77620: Use device_set_of_node_from_dev() (git-fixes).\n- Revert \u0027ath6kl: return error code in ath6kl_wmi_set_roam_lrssi_cmd()\u0027 (git-fixes).\n- Revert \u0027brcmfmac: add a check for the status of usb_register\u0027 (git-fixes).\n- Revert \u0027char: hpet: fix a missing check of ioremap\u0027 (git-fixes).\n- Revert \u0027char: hpet: fix a missing check of ioremap\u0027 (git-fixes).\n- Revert \u0027dmaengine: qcom_hidma: Check for driver register failure\u0027 (git-fixes).\n- Revert \u0027ecryptfs: replace BUG_ON with error handling code\u0027 (bsc#1187413).\n- Revert \u0027ibmvnic: simplify reset_long_term_buff function\u0027 (bsc#1186206 ltc#191041).\n- Revert \u0027isdn: mISDN: Fix potential NULL pointer dereference of kzalloc\u0027 (git-fixes).\n- Revert \u0027isdn: mISDNinfineon: fix potential NULL pointer dereference\u0027 (git-fixes).\n- Revert \u0027libertas: add checks for the return value of sysfs_create_group\u0027 (git-fixes).\n- Revert \u0027media: dvb: Add check on sp8870_readreg\u0027 (git-fixes).\n- Revert \u0027media: dvb: Add check on sp8870_readreg\u0027 (git-fixes).\n- Revert \u0027media: gspca: Check the return value of write_bridge for timeout\u0027 (git-fixes).\n- Revert \u0027media: gspca: Check the return value of write_bridge for timeout\u0027 (git-fixes).\n- Revert \u0027media: gspca: mt9m111: Check write_bridge for timeout\u0027 (git-fixes).\n- Revert \u0027media: gspca: mt9m111: Check write_bridge for timeout\u0027 (git-fixes).\n- Revert \u0027media: usb: gspca: add a missed check for goto_low_power\u0027 (git-fixes).\n- Revert \u0027net: liquidio: fix a NULL pointer dereference\u0027 (git-fixes).\n- Revert \u0027PCI: PM: Do not read power state in pci_enable_device_flags()\u0027 (git-fixes).\n- Revert \u0027qlcnic: Avoid potential NULL pointer dereference\u0027 (git-fixes).\n- Revert \u0027scsi: core: run queue if SCSI device queue isn\u0027t ready and queue is idle\u0027 (bsc#1186949).\n- Revert \u0027serial: max310x: pass return value of spi_register_driver\u0027 (git-fixes).\n- Revert \u0027video: hgafb: fix potential NULL pointer dereference\u0027 (git-fixes).\n- Revert \u0027video: imsttfb: fix potential NULL pointer dereferences\u0027 (bsc#1152489)\n- rpm/kernel-binary.spec.in: Correct Supplements in optional subpkg (jsc#SLE-11796)\n- rpm/kernel-binary.spec.in: Fix handling of +arch marker (bsc#1186672)\n- rpm/split-modules: Avoid errors even if Module.* are not present\n- s390/stack: fix possible register corruption with stack switch helper (bsc#1185677).\n- sched/debug: Fix cgroup_path[] serialization (git-fixes)\n- sched/fair: Keep load_avg and load_sum synced (git-fixes)\n- scsi: aacraid: Fix an oops in error handling (bsc#1187072).\n- scsi: aacraid: Remove erroneous fallthrough annotation (bsc#1186950).\n- scsi: aacraid: Use memdup_user() as a cleanup (bsc#1186951).\n- scsi: acornscsi: Fix an error handling path in acornscsi_probe() (bsc#1186952).\n- scsi: be2iscsi: Fix a theoretical leak in beiscsi_create_eqs() (bsc#1186953).\n- scsi: be2iscsi: Revert \u0027Fix a theoretical leak in beiscsi_create_eqs()\u0027 (bsc#1187067).\n- scsi: bfa: Fix error return in bfad_pci_init() (bsc#1186954).\n- scsi: bnx2fc: Fix Kconfig warning and CNIC build errors (bsc#1186955).\n- scsi: bnx2i: Requires MMU (bsc#1186956).\n- scsi: core: Fix race between handling STS_RESOURCE and completion (bsc#1187883).\n- scsi: csiostor: Fix wrong return value in csio_hw_prep_fw() (bsc#1186957).\n- scsi: cumana_2: Fix different dev_id between request_irq() and free_irq() (bsc#1186958).\n- scsi: cxgb3i: Fix some leaks in init_act_open() (bsc#1186959).\n- scsi: cxgb4i: Fix TLS dependency (bsc#1186960).\n- scsi: eesox: Fix different dev_id between request_irq() and free_irq() (bsc#1186961).\n- scsi: fcoe: Fix mismatched fcoe_wwn_from_mac declaration (bsc#1187886).\n- scsi: fnic: Fix error return code in fnic_probe() (bsc#1186962).\n- scsi: hisi_sas: Fix IRQ checks (bsc#1186963).\n- scsi: hisi_sas: Remove preemptible() (bsc#1186964).\n- scsi: jazz_esp: Add IRQ check (bsc#1186965).\n- scsi: libfc: Fix enum-conversion warning (bsc#1186966).\n- scsi: libsas: Fix error path in sas_notify_lldd_dev_found() (bsc#1186967).\n- scsi: libsas: Reset num_scatter if libata marks qc as NODATA (bsc#1187068).\n- scsi: libsas: Set data_dir as DMA_NONE if libata marks qc as NODATA (bsc#1186968).\n- scsi: lpfc: Fix ancient double free (bsc#1186969).\n- scsi: lpfc: Fix failure to transmit ABTS on FC link (git-fixes).\n- scsi: megaraid_sas: Check user-provided offsets (bsc#1186970).\n- scsi: megaraid_sas: Clear affinity hint (bsc#1186971).\n- scsi: megaraid_sas: Do not call disable_irq from process IRQ poll (bsc#1186972).\n- scsi: megaraid_sas: Fix MEGASAS_IOC_FIRMWARE regression (bsc#1186973).\n- scsi: megaraid_sas: Remove undefined ENABLE_IRQ_POLL macro (bsc#1186974).\n- scsi: mesh: Fix panic after host or bus reset (bsc#1186976).\n- scsi: mpt3sas: Do not use GFP_KERNEL in atomic context (bsc#1186977).\n- scsi: mpt3sas: Fix error return code of mpt3sas_base_attach() (bsc#1186978).\n- scsi: mpt3sas: Fix ioctl timeout (bsc#1186979).\n- scsi: myrs: Fix a double free in myrs_cleanup() (bsc#1186980).\n- scsi: pm80xx: Fix error return in pm8001_pci_probe() (bsc#1186981).\n- scsi: powertec: Fix different dev_id between request_irq() and free_irq() (bsc#1186982).\n- scsi: qedi: Check for buffer overflow in qedi_set_path() (bsc#1186983).\n- scsi: qedi: Fix error return code of qedi_alloc_global_queues() (bsc#1186984).\n- scsi: qedi: Fix missing destroy_workqueue() on error in __qedi_probe (bsc#1186985).\n- scsi: qla2xxx: Prevent PRLI in target mode (git-fixes).\n- scsi: qla4xxx: Fix an error handling path in \u0027qla4xxx_get_host_stats()\u0027 (bsc#1186986).\n- scsi: qla4xxx: Remove in_interrupt() (bsc#1186987).\n- scsi: scsi_debug: Add check for sdebug_max_queue during module init (bsc#1186988).\n- scsi: scsi_dh_alua: Retry RTPG on a different path after failure (bsc#1174978 bsc#1185701).\n- scsi: sd: Fix Opal support (bsc#1186989).\n- scsi: sni_53c710: Add IRQ check (bsc#1186990).\n- scsi: sun3x_esp: Add IRQ check (bsc#1186991).\n- scsi: ufs-qcom: Fix scheduling while atomic issue (bsc#1187002).\n- scsi: ufs: Add quirk to disallow reset of interrupt aggregation (bsc#1186992).\n- scsi: ufs: Add quirk to enable host controller without hce (bsc#1186993).\n- scsi: ufs: Add quirk to fix abnormal ocs fatal error (bsc#1186994).\n- scsi: ufs: Add quirk to fix mishandling utrlclr/utmrlclr (bsc#1186995).\n- scsi: ufs: core: Narrow down fast path in system suspend path (bsc#1186996).\n- scsi: ufs: Do not update urgent bkops level when toggling auto bkops (bsc#1186997).\n- scsi: ufs: Fix imprecise load calculation in devfreq window (bsc#1187795).\n- SCSI: ufs: fix ktime_t kabi change (bsc#1187795).\n- scsi: ufs: Fix race between shutdown and runtime resume flow (bsc#1186998).\n- scsi: ufs: Introduce UFSHCD_QUIRK_PRDT_BYTE_GRAN quirk (bsc#1187000).\n- scsi: ufs: Make ufshcd_print_trs() consider UFSHCD_QUIRK_PRDT_BYTE_GRAN (bsc#1187069).\n- scsi: ufs: Properly release resources if a task is aborted successfully (bsc#1187001).\n- scsi: ufs: ufshcd-pltfrm depends on HAS_IOMEM (bsc#1187980).\n- scsi: ufs: ufshcd-pltfrm: Fix deferred probing (bsc#1187003).\n- scsi: ufshcd: use an enum for quirks (bsc#1186999).\n- serial: max310x: unregister uart driver in case of failure and abort (git-fixes).\n- serial: rp2: use \u0027request_firmware\u0027 instead of \u0027request_firmware_nowait\u0027 (git-fixes).\n- spi: spi-nxp-fspi: move the register operation after the clock enable (git-fixes).\n- spi: sprd: Add missing MODULE_DEVICE_TABLE (git-fixes).\n- spi: stm32-qspi: Always wait BUSY bit to be cleared in stm32_qspi_wait_cmd() (git-fixes).\n- staging: rtl8723bs: Fix uninitialized variables (git-fixes).\n- sunrpc: fix refcount leak for rpc auth modules (git-fixes).\n- SUNRPC: Handle major timeout in xprt_adjust_timeout() (git-fixes).\n- SUNRPC: Move fault injection call sites (git-fixes).\n- SUNRPC: Set memalloc_nofs_save() for sync tasks (git-fixes).\n- svcrdma: disable timeouts on rdma backchannel (git-fixes).\n- thermal/drivers/intel: Initialize RW trip to THERMAL_TEMP_INVALID (git-fixes).\n- tpm: fix error return code in tpm2_get_cc_attrs_tbl() (git-fixes).\n- tracing: Correct the length check which causes memory corruption (git-fixes).\n- tracing: Do no increment trace_clock_global() by one (git-fixes).\n- tracing: Do not stop recording cmdlines when tracing is off (git-fixes).\n- tracing: Do not stop recording comms if the trace file is being read (git-fixes).\n- tracing: Restructure trace_clock_global() to never block (git-fixes).\n- ttyprintk: Add TTY hangup callback (git-fixes).\n- usb: core: hub: Disable autosuspend for Cypress CY7C65632 (git-fixes).\n- usb: core: reduce power-on-good delay time of root hub (git-fixes).\n- usb: dwc3: core: fix kernel panic when do reboot (git-fixes).\n- usb: dwc3: core: fix kernel panic when do reboot (git-fixes).\n- usb: dwc3: debugfs: Add and remove endpoint dirs dynamically (git-fixes).\n- usb: dwc3: ep0: fix NULL pointer exception (git-fixes).\n- USB: f_ncm: ncm_bitrate (speed) is unsigned (git-fixes).\n- usb: f_ncm: only first packet of aggregate needs to start timer (git-fixes).\n- usb: f_ncm: only first packet of aggregate needs to start timer (git-fixes).\n- usb: fix various gadget panics on 10gbps cabling (git-fixes).\n- usb: fix various gadget panics on 10gbps cabling (git-fixes).\n- usb: fix various gadgets null ptr deref on 10gbps cabling (git-fixes).\n- usb: gadget: eem: fix wrong eem header operation (git-fixes).\n- usb: gadget: eem: fix wrong eem header operation (git-fixes).\n- usb: gadget: f_fs: Ensure io_completion_wq is idle during unbind (git-fixes).\n- usb: gadget: f_fs: Ensure io_completion_wq is idle during unbind (git-fixes).\n- usb: musb: fix MUSB_QUIRK_B_DISCONNECT_99 handling (git-fixes).\n- usb: pd: Set PD_T_SINK_WAIT_CAP to 310ms (git-fixes).\n- USB: serial: cp210x: fix alternate function for CP2102N QFN20 (git-fixes).\n- USB: serial: ftdi_sio: add IDs for IDS GmbH Products (git-fixes).\n- USB: serial: ftdi_sio: add NovaTech OrionMX product ID (git-fixes).\n- USB: serial: ftdi_sio: add NovaTech OrionMX product ID (git-fixes).\n- USB: serial: omninet: add device id for Zyxel Omni 56K Plus (git-fixes).\n- USB: serial: omninet: add device id for Zyxel Omni 56K Plus (git-fixes).\n- USB: serial: option: add Telit LE910-S1 compositions 0x7010, 0x7011 (git-fixes).\n- USB: serial: pl2303: add device id for ADLINK ND-6530 GC (git-fixes).\n- USB: serial: quatech2: fix control-request directions (git-fixes).\n- USB: serial: ti_usb_3410_5052: add startech.com device id (git-fixes).\n- usb: typec: mux: Fix copy-paste mistake in typec_mux_match (git-fixes).\n- usb: typec: mux: Fix matching with typec_altmode_desc (git-fixes).\n- usb: typec: tcpm: Use LE to CPU conversion when accessing msg-\u003eheader (git-fixes).\n- usb: typec: ucsi: Clear PPM capability data in ucsi_init() error path (git-fixes).\n- usb: typec: wcove: Use LE to CPU conversion when accessing msg-\u003eheader (git-fixes).\n- USB: usbfs: Do not WARN about excessively large memory allocations (git-fixes).\n- vfio/pci: Fix error return code in vfio_ecap_init() (git-fixes).\n- vfio/pci: zap_vma_ptes() needs MMU (git-fixes).\n- vfio/platform: fix module_put call in error flow (git-fixes).\n- video: hgafb: correctly handle card detect failure during probe (git-fixes).\n- video: hgafb: fix potential NULL pointer dereference (git-fixes).\n- vmlinux.lds.h: Avoid orphan section with !SMP (git-fixes).\n- vrf: fix maximum MTU (git-fixes).\n- vsock/vmci: log once the failed queue pair allocation (git-fixes).\n- wireguard: allowedips: initialize list head in selftest (git-fixes).\n- wireguard: do not use -O3 (git-fixes).\n- wireguard: peer: allocate in kmem_cache (git-fixes).\n- wireguard: peer: put frequently used members above cache lines (git-fixes).\n- wireguard: queueing: get rid of per-peer ring buffers (git-fixes).\n- wireguard: selftests: make sure rp_filter is disabled on vethc (git-fixes).\n- wireguard: selftests: remove old conntrack kconfig value (git-fixes).\n- wireguard: use synchronize_net rather than synchronize_rcu (git-fixes).\n- x86/apic: Mark _all_ legacy interrupts when IO/APIC is missing (bsc#1152489).\n- x86/fault: Do not send SIGSEGV twice on SEGV_PKUERR (bsc#1152489).\n- x86/pkru: Write hardware init value to PKRU when xstate is init (bsc#1152489).\n- x86/process: Check PF_KTHREAD and not current-\u003emm for kernel threads (bsc#1152489).\n- x86: fix seq_file iteration for pat.c (git-fixes).\n- xen-blkback: fix compatibility bug with single page rings (git-fixes).\n- xen-pciback: reconfigure also from backend watch handler (git-fixes).\n- xen-pciback: redo VF placement in the virtual topology (git-fixes).\n- xen/evtchn: Change irq_info lock to raw_spinlock_t (git-fixes).\n- xfrm: policy: Read seqcount outside of rcu-read side in xfrm_policy_lookup_bytype (bsc#1185675).\n- xprtrdma: Avoid Receive Queue wrapping (git-fixes).\n- xprtrdma: rpcrdma_mr_pop() already does list_del_init() (git-fixes).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2021-2303,SUSE-SLE-Module-Public-Cloud-15-SP2-2021-2303",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2021_2303-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2021:2303-1",
"url": "https://www.suse.com/support/update/announcement/2021/suse-su-20212303-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2021:2303-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2021-July/009127.html"
},
{
"category": "self",
"summary": "SUSE Bug 1152489",
"url": "https://bugzilla.suse.com/1152489"
},
{
"category": "self",
"summary": "SUSE Bug 1153274",
"url": "https://bugzilla.suse.com/1153274"
},
{
"category": "self",
"summary": "SUSE Bug 1154353",
"url": "https://bugzilla.suse.com/1154353"
},
{
"category": "self",
"summary": "SUSE Bug 1155518",
"url": "https://bugzilla.suse.com/1155518"
},
{
"category": "self",
"summary": "SUSE Bug 1164648",
"url": "https://bugzilla.suse.com/1164648"
},
{
"category": "self",
"summary": "SUSE Bug 1174978",
"url": "https://bugzilla.suse.com/1174978"
},
{
"category": "self",
"summary": "SUSE Bug 1176771",
"url": "https://bugzilla.suse.com/1176771"
},
{
"category": "self",
"summary": "SUSE Bug 1179610",
"url": "https://bugzilla.suse.com/1179610"
},
{
"category": "self",
"summary": "SUSE Bug 1182470",
"url": "https://bugzilla.suse.com/1182470"
},
{
"category": "self",
"summary": "SUSE Bug 1183712",
"url": "https://bugzilla.suse.com/1183712"
},
{
"category": "self",
"summary": "SUSE Bug 1184212",
"url": "https://bugzilla.suse.com/1184212"
},
{
"category": "self",
"summary": "SUSE Bug 1184685",
"url": "https://bugzilla.suse.com/1184685"
},
{
"category": "self",
"summary": "SUSE Bug 1185195",
"url": "https://bugzilla.suse.com/1185195"
},
{
"category": "self",
"summary": "SUSE Bug 1185486",
"url": "https://bugzilla.suse.com/1185486"
},
{
"category": "self",
"summary": "SUSE Bug 1185589",
"url": "https://bugzilla.suse.com/1185589"
},
{
"category": "self",
"summary": "SUSE Bug 1185675",
"url": "https://bugzilla.suse.com/1185675"
},
{
"category": "self",
"summary": "SUSE Bug 1185677",
"url": "https://bugzilla.suse.com/1185677"
},
{
"category": "self",
"summary": "SUSE Bug 1185701",
"url": "https://bugzilla.suse.com/1185701"
},
{
"category": "self",
"summary": "SUSE Bug 1186206",
"url": "https://bugzilla.suse.com/1186206"
},
{
"category": "self",
"summary": "SUSE Bug 1186463",
"url": "https://bugzilla.suse.com/1186463"
},
{
"category": "self",
"summary": "SUSE Bug 1186666",
"url": "https://bugzilla.suse.com/1186666"
},
{
"category": "self",
"summary": "SUSE Bug 1186672",
"url": "https://bugzilla.suse.com/1186672"
},
{
"category": "self",
"summary": "SUSE Bug 1186752",
"url": "https://bugzilla.suse.com/1186752"
},
{
"category": "self",
"summary": "SUSE Bug 1186949",
"url": "https://bugzilla.suse.com/1186949"
},
{
"category": "self",
"summary": "SUSE Bug 1186950",
"url": "https://bugzilla.suse.com/1186950"
},
{
"category": "self",
"summary": "SUSE Bug 1186951",
"url": "https://bugzilla.suse.com/1186951"
},
{
"category": "self",
"summary": "SUSE Bug 1186952",
"url": "https://bugzilla.suse.com/1186952"
},
{
"category": "self",
"summary": "SUSE Bug 1186953",
"url": "https://bugzilla.suse.com/1186953"
},
{
"category": "self",
"summary": "SUSE Bug 1186954",
"url": "https://bugzilla.suse.com/1186954"
},
{
"category": "self",
"summary": "SUSE Bug 1186955",
"url": "https://bugzilla.suse.com/1186955"
},
{
"category": "self",
"summary": "SUSE Bug 1186956",
"url": "https://bugzilla.suse.com/1186956"
},
{
"category": "self",
"summary": "SUSE Bug 1186957",
"url": "https://bugzilla.suse.com/1186957"
},
{
"category": "self",
"summary": "SUSE Bug 1186958",
"url": "https://bugzilla.suse.com/1186958"
},
{
"category": "self",
"summary": "SUSE Bug 1186959",
"url": "https://bugzilla.suse.com/1186959"
},
{
"category": "self",
"summary": "SUSE Bug 1186960",
"url": "https://bugzilla.suse.com/1186960"
},
{
"category": "self",
"summary": "SUSE Bug 1186961",
"url": "https://bugzilla.suse.com/1186961"
},
{
"category": "self",
"summary": "SUSE Bug 1186962",
"url": "https://bugzilla.suse.com/1186962"
},
{
"category": "self",
"summary": "SUSE Bug 1186963",
"url": "https://bugzilla.suse.com/1186963"
},
{
"category": "self",
"summary": "SUSE Bug 1186964",
"url": "https://bugzilla.suse.com/1186964"
},
{
"category": "self",
"summary": "SUSE Bug 1186965",
"url": "https://bugzilla.suse.com/1186965"
},
{
"category": "self",
"summary": "SUSE Bug 1186966",
"url": "https://bugzilla.suse.com/1186966"
},
{
"category": "self",
"summary": "SUSE Bug 1186967",
"url": "https://bugzilla.suse.com/1186967"
},
{
"category": "self",
"summary": "SUSE Bug 1186968",
"url": "https://bugzilla.suse.com/1186968"
},
{
"category": "self",
"summary": "SUSE Bug 1186969",
"url": "https://bugzilla.suse.com/1186969"
},
{
"category": "self",
"summary": "SUSE Bug 1186970",
"url": "https://bugzilla.suse.com/1186970"
},
{
"category": "self",
"summary": "SUSE Bug 1186971",
"url": "https://bugzilla.suse.com/1186971"
},
{
"category": "self",
"summary": "SUSE Bug 1186972",
"url": "https://bugzilla.suse.com/1186972"
},
{
"category": "self",
"summary": "SUSE Bug 1186973",
"url": "https://bugzilla.suse.com/1186973"
},
{
"category": "self",
"summary": "SUSE Bug 1186974",
"url": "https://bugzilla.suse.com/1186974"
},
{
"category": "self",
"summary": "SUSE Bug 1186976",
"url": "https://bugzilla.suse.com/1186976"
},
{
"category": "self",
"summary": "SUSE Bug 1186977",
"url": "https://bugzilla.suse.com/1186977"
},
{
"category": "self",
"summary": "SUSE Bug 1186978",
"url": "https://bugzilla.suse.com/1186978"
},
{
"category": "self",
"summary": "SUSE Bug 1186979",
"url": "https://bugzilla.suse.com/1186979"
},
{
"category": "self",
"summary": "SUSE Bug 1186980",
"url": "https://bugzilla.suse.com/1186980"
},
{
"category": "self",
"summary": "SUSE Bug 1186981",
"url": "https://bugzilla.suse.com/1186981"
},
{
"category": "self",
"summary": "SUSE Bug 1186982",
"url": "https://bugzilla.suse.com/1186982"
},
{
"category": "self",
"summary": "SUSE Bug 1186983",
"url": "https://bugzilla.suse.com/1186983"
},
{
"category": "self",
"summary": "SUSE Bug 1186984",
"url": "https://bugzilla.suse.com/1186984"
},
{
"category": "self",
"summary": "SUSE Bug 1186985",
"url": "https://bugzilla.suse.com/1186985"
},
{
"category": "self",
"summary": "SUSE Bug 1186986",
"url": "https://bugzilla.suse.com/1186986"
},
{
"category": "self",
"summary": "SUSE Bug 1186987",
"url": "https://bugzilla.suse.com/1186987"
},
{
"category": "self",
"summary": "SUSE Bug 1186988",
"url": "https://bugzilla.suse.com/1186988"
},
{
"category": "self",
"summary": "SUSE Bug 1186989",
"url": "https://bugzilla.suse.com/1186989"
},
{
"category": "self",
"summary": "SUSE Bug 1186990",
"url": "https://bugzilla.suse.com/1186990"
},
{
"category": "self",
"summary": "SUSE Bug 1186991",
"url": "https://bugzilla.suse.com/1186991"
},
{
"category": "self",
"summary": "SUSE Bug 1186992",
"url": "https://bugzilla.suse.com/1186992"
},
{
"category": "self",
"summary": "SUSE Bug 1186993",
"url": "https://bugzilla.suse.com/1186993"
},
{
"category": "self",
"summary": "SUSE Bug 1186994",
"url": "https://bugzilla.suse.com/1186994"
},
{
"category": "self",
"summary": "SUSE Bug 1186995",
"url": "https://bugzilla.suse.com/1186995"
},
{
"category": "self",
"summary": "SUSE Bug 1186996",
"url": "https://bugzilla.suse.com/1186996"
},
{
"category": "self",
"summary": "SUSE Bug 1186997",
"url": "https://bugzilla.suse.com/1186997"
},
{
"category": "self",
"summary": "SUSE Bug 1186998",
"url": "https://bugzilla.suse.com/1186998"
},
{
"category": "self",
"summary": "SUSE Bug 1186999",
"url": "https://bugzilla.suse.com/1186999"
},
{
"category": "self",
"summary": "SUSE Bug 1187000",
"url": "https://bugzilla.suse.com/1187000"
},
{
"category": "self",
"summary": "SUSE Bug 1187001",
"url": "https://bugzilla.suse.com/1187001"
},
{
"category": "self",
"summary": "SUSE Bug 1187002",
"url": "https://bugzilla.suse.com/1187002"
},
{
"category": "self",
"summary": "SUSE Bug 1187003",
"url": "https://bugzilla.suse.com/1187003"
},
{
"category": "self",
"summary": "SUSE Bug 1187038",
"url": "https://bugzilla.suse.com/1187038"
},
{
"category": "self",
"summary": "SUSE Bug 1187050",
"url": "https://bugzilla.suse.com/1187050"
},
{
"category": "self",
"summary": "SUSE Bug 1187067",
"url": "https://bugzilla.suse.com/1187067"
},
{
"category": "self",
"summary": "SUSE Bug 1187068",
"url": "https://bugzilla.suse.com/1187068"
},
{
"category": "self",
"summary": "SUSE Bug 1187069",
"url": "https://bugzilla.suse.com/1187069"
},
{
"category": "self",
"summary": "SUSE Bug 1187072",
"url": "https://bugzilla.suse.com/1187072"
},
{
"category": "self",
"summary": "SUSE Bug 1187143",
"url": "https://bugzilla.suse.com/1187143"
},
{
"category": "self",
"summary": "SUSE Bug 1187144",
"url": "https://bugzilla.suse.com/1187144"
},
{
"category": "self",
"summary": "SUSE Bug 1187171",
"url": "https://bugzilla.suse.com/1187171"
},
{
"category": "self",
"summary": "SUSE Bug 1187263",
"url": "https://bugzilla.suse.com/1187263"
},
{
"category": "self",
"summary": "SUSE Bug 1187356",
"url": "https://bugzilla.suse.com/1187356"
},
{
"category": "self",
"summary": "SUSE Bug 1187402",
"url": "https://bugzilla.suse.com/1187402"
},
{
"category": "self",
"summary": "SUSE Bug 1187403",
"url": "https://bugzilla.suse.com/1187403"
},
{
"category": "self",
"summary": "SUSE Bug 1187404",
"url": "https://bugzilla.suse.com/1187404"
},
{
"category": "self",
"summary": "SUSE Bug 1187407",
"url": "https://bugzilla.suse.com/1187407"
},
{
"category": "self",
"summary": "SUSE Bug 1187408",
"url": "https://bugzilla.suse.com/1187408"
},
{
"category": "self",
"summary": "SUSE Bug 1187409",
"url": "https://bugzilla.suse.com/1187409"
},
{
"category": "self",
"summary": "SUSE Bug 1187410",
"url": "https://bugzilla.suse.com/1187410"
},
{
"category": "self",
"summary": "SUSE Bug 1187411",
"url": "https://bugzilla.suse.com/1187411"
},
{
"category": "self",
"summary": "SUSE Bug 1187412",
"url": "https://bugzilla.suse.com/1187412"
},
{
"category": "self",
"summary": "SUSE Bug 1187413",
"url": "https://bugzilla.suse.com/1187413"
},
{
"category": "self",
"summary": "SUSE Bug 1187452",
"url": "https://bugzilla.suse.com/1187452"
},
{
"category": "self",
"summary": "SUSE Bug 1187554",
"url": "https://bugzilla.suse.com/1187554"
},
{
"category": "self",
"summary": "SUSE Bug 1187595",
"url": "https://bugzilla.suse.com/1187595"
},
{
"category": "self",
"summary": "SUSE Bug 1187601",
"url": "https://bugzilla.suse.com/1187601"
},
{
"category": "self",
"summary": "SUSE Bug 1187795",
"url": "https://bugzilla.suse.com/1187795"
},
{
"category": "self",
"summary": "SUSE Bug 1187867",
"url": "https://bugzilla.suse.com/1187867"
},
{
"category": "self",
"summary": "SUSE Bug 1187883",
"url": "https://bugzilla.suse.com/1187883"
},
{
"category": "self",
"summary": "SUSE Bug 1187886",
"url": "https://bugzilla.suse.com/1187886"
},
{
"category": "self",
"summary": "SUSE Bug 1187927",
"url": "https://bugzilla.suse.com/1187927"
},
{
"category": "self",
"summary": "SUSE Bug 1187972",
"url": "https://bugzilla.suse.com/1187972"
},
{
"category": "self",
"summary": "SUSE Bug 1187980",
"url": "https://bugzilla.suse.com/1187980"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-26558 page",
"url": "https://www.suse.com/security/cve/CVE-2020-26558/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-36385 page",
"url": "https://www.suse.com/security/cve/CVE-2020-36385/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-36386 page",
"url": "https://www.suse.com/security/cve/CVE-2020-36386/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-0129 page",
"url": "https://www.suse.com/security/cve/CVE-2021-0129/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-0512 page",
"url": "https://www.suse.com/security/cve/CVE-2021-0512/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-0605 page",
"url": "https://www.suse.com/security/cve/CVE-2021-0605/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-33624 page",
"url": "https://www.suse.com/security/cve/CVE-2021-33624/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-34693 page",
"url": "https://www.suse.com/security/cve/CVE-2021-34693/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3573 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3573/"
}
],
"title": "Security update for the Linux Kernel",
"tracking": {
"current_release_date": "2021-07-13T07:46:29Z",
"generator": {
"date": "2021-07-13T07:46:29Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2021:2303-1",
"initial_release_date": "2021-07-13T07:46:29Z",
"revision_history": [
{
"date": "2021-07-13T07:46:29Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "kernel-devel-azure-5.3.18-18.53.1.noarch",
"product": {
"name": "kernel-devel-azure-5.3.18-18.53.1.noarch",
"product_id": "kernel-devel-azure-5.3.18-18.53.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-azure-5.3.18-18.53.1.noarch",
"product": {
"name": "kernel-source-azure-5.3.18-18.53.1.noarch",
"product_id": "kernel-source-azure-5.3.18-18.53.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-azure-5.3.18-18.53.1.x86_64",
"product": {
"name": "cluster-md-kmp-azure-5.3.18-18.53.1.x86_64",
"product_id": "cluster-md-kmp-azure-5.3.18-18.53.1.x86_64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-azure-5.3.18-18.53.1.x86_64",
"product": {
"name": "dlm-kmp-azure-5.3.18-18.53.1.x86_64",
"product_id": "dlm-kmp-azure-5.3.18-18.53.1.x86_64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-azure-5.3.18-18.53.1.x86_64",
"product": {
"name": "gfs2-kmp-azure-5.3.18-18.53.1.x86_64",
"product_id": "gfs2-kmp-azure-5.3.18-18.53.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-azure-5.3.18-18.53.1.x86_64",
"product": {
"name": "kernel-azure-5.3.18-18.53.1.x86_64",
"product_id": "kernel-azure-5.3.18-18.53.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-azure-devel-5.3.18-18.53.1.x86_64",
"product": {
"name": "kernel-azure-devel-5.3.18-18.53.1.x86_64",
"product_id": "kernel-azure-devel-5.3.18-18.53.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-azure-extra-5.3.18-18.53.1.x86_64",
"product": {
"name": "kernel-azure-extra-5.3.18-18.53.1.x86_64",
"product_id": "kernel-azure-extra-5.3.18-18.53.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-azure-livepatch-devel-5.3.18-18.53.1.x86_64",
"product": {
"name": "kernel-azure-livepatch-devel-5.3.18-18.53.1.x86_64",
"product_id": "kernel-azure-livepatch-devel-5.3.18-18.53.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-syms-azure-5.3.18-18.53.1.x86_64",
"product": {
"name": "kernel-syms-azure-5.3.18-18.53.1.x86_64",
"product_id": "kernel-syms-azure-5.3.18-18.53.1.x86_64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-azure-5.3.18-18.53.1.x86_64",
"product": {
"name": "kselftests-kmp-azure-5.3.18-18.53.1.x86_64",
"product_id": "kselftests-kmp-azure-5.3.18-18.53.1.x86_64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-azure-5.3.18-18.53.1.x86_64",
"product": {
"name": "ocfs2-kmp-azure-5.3.18-18.53.1.x86_64",
"product_id": "ocfs2-kmp-azure-5.3.18-18.53.1.x86_64"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-azure-5.3.18-18.53.1.x86_64",
"product": {
"name": "reiserfs-kmp-azure-5.3.18-18.53.1.x86_64",
"product_id": "reiserfs-kmp-azure-5.3.18-18.53.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Public Cloud 15 SP2",
"product": {
"name": "SUSE Linux Enterprise Module for Public Cloud 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP2",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-public-cloud:15:sp2"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-azure-5.3.18-18.53.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.53.1.x86_64"
},
"product_reference": "kernel-azure-5.3.18-18.53.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-azure-devel-5.3.18-18.53.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.53.1.x86_64"
},
"product_reference": "kernel-azure-devel-5.3.18-18.53.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-azure-5.3.18-18.53.1.noarch as component of SUSE Linux Enterprise Module for Public Cloud 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.53.1.noarch"
},
"product_reference": "kernel-devel-azure-5.3.18-18.53.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-azure-5.3.18-18.53.1.noarch as component of SUSE Linux Enterprise Module for Public Cloud 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.53.1.noarch"
},
"product_reference": "kernel-source-azure-5.3.18-18.53.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-azure-5.3.18-18.53.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.53.1.x86_64"
},
"product_reference": "kernel-syms-azure-5.3.18-18.53.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP2"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2020-26558",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-26558"
}
],
"notes": [
{
"category": "general",
"text": "Bluetooth LE and BR/EDR secure pairing in Bluetooth Core Specification 2.1 through 5.2 may permit a nearby man-in-the-middle attacker to identify the Passkey used during pairing (in the Passkey authentication procedure) by reflection of the public key and the authentication evidence of the initiating device, potentially permitting this attacker to complete authenticated pairing with the responding device using the correct Passkey for the pairing session. The attack methodology determines the Passkey value one bit at a time.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.53.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.53.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.53.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.53.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.53.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-26558",
"url": "https://www.suse.com/security/cve/CVE-2020-26558"
},
{
"category": "external",
"summary": "SUSE Bug 1179610 for CVE-2020-26558",
"url": "https://bugzilla.suse.com/1179610"
},
{
"category": "external",
"summary": "SUSE Bug 1186463 for CVE-2020-26558",
"url": "https://bugzilla.suse.com/1186463"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.53.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.53.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.53.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.53.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.53.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.53.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.53.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.53.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.53.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.53.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-13T07:46:29Z",
"details": "moderate"
}
],
"title": "CVE-2020-26558"
},
{
"cve": "CVE-2020-36385",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-36385"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel before 5.10. drivers/infiniband/core/ucma.c has a use-after-free because the ctx is reached via the ctx_list in some ucma_migrate_id situations where ucma_close is called, aka CID-f5449e74802c.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.53.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.53.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.53.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.53.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.53.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-36385",
"url": "https://www.suse.com/security/cve/CVE-2020-36385"
},
{
"category": "external",
"summary": "SUSE Bug 1187050 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1187050"
},
{
"category": "external",
"summary": "SUSE Bug 1187052 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1187052"
},
{
"category": "external",
"summary": "SUSE Bug 1189302 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1189302"
},
{
"category": "external",
"summary": "SUSE Bug 1196174 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1196174"
},
{
"category": "external",
"summary": "SUSE Bug 1196810 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1196810"
},
{
"category": "external",
"summary": "SUSE Bug 1196914 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1196914"
},
{
"category": "external",
"summary": "SUSE Bug 1200084 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1200084"
},
{
"category": "external",
"summary": "SUSE Bug 1201734 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1201734"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.53.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.53.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.53.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.53.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.53.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.53.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.53.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.53.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.53.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.53.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-13T07:46:29Z",
"details": "important"
}
],
"title": "CVE-2020-36385"
},
{
"cve": "CVE-2020-36386",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-36386"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel before 5.8.1. net/bluetooth/hci_event.c has a slab out-of-bounds read in hci_extended_inquiry_result_evt, aka CID-51c19bf3d5cf.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.53.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.53.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.53.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.53.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.53.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-36386",
"url": "https://www.suse.com/security/cve/CVE-2020-36386"
},
{
"category": "external",
"summary": "SUSE Bug 1187038 for CVE-2020-36386",
"url": "https://bugzilla.suse.com/1187038"
},
{
"category": "external",
"summary": "SUSE Bug 1192868 for CVE-2020-36386",
"url": "https://bugzilla.suse.com/1192868"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.53.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.53.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.53.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.53.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.53.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.53.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.53.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.53.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.53.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.53.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-13T07:46:29Z",
"details": "moderate"
}
],
"title": "CVE-2020-36386"
},
{
"cve": "CVE-2021-0129",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-0129"
}
],
"notes": [
{
"category": "general",
"text": "Improper access control in BlueZ may allow an authenticated user to potentially enable information disclosure via adjacent access.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.53.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.53.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.53.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.53.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.53.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-0129",
"url": "https://www.suse.com/security/cve/CVE-2021-0129"
},
{
"category": "external",
"summary": "SUSE Bug 1186463 for CVE-2021-0129",
"url": "https://bugzilla.suse.com/1186463"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.53.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.53.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.53.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.53.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.53.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.53.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.53.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.53.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.53.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.53.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-13T07:46:29Z",
"details": "moderate"
}
],
"title": "CVE-2021-0129"
},
{
"cve": "CVE-2021-0512",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-0512"
}
],
"notes": [
{
"category": "general",
"text": "In __hidinput_change_resolution_multipliers of hid-input.c, there is a possible out of bounds write due to a heap buffer overflow. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-173843328References: Upstream kernel",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.53.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.53.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.53.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.53.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.53.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-0512",
"url": "https://www.suse.com/security/cve/CVE-2021-0512"
},
{
"category": "external",
"summary": "SUSE Bug 1187595 for CVE-2021-0512",
"url": "https://bugzilla.suse.com/1187595"
},
{
"category": "external",
"summary": "SUSE Bug 1187597 for CVE-2021-0512",
"url": "https://bugzilla.suse.com/1187597"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.53.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.53.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.53.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.53.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.53.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.53.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.53.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.53.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.53.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.53.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-13T07:46:29Z",
"details": "important"
}
],
"title": "CVE-2021-0512"
},
{
"cve": "CVE-2021-0605",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-0605"
}
],
"notes": [
{
"category": "general",
"text": "In pfkey_dump of af_key.c, there is a possible out-of-bounds read due to a missing bounds check. This could lead to local information disclosure in the kernel with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-110373476",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.53.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.53.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.53.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.53.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.53.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-0605",
"url": "https://www.suse.com/security/cve/CVE-2021-0605"
},
{
"category": "external",
"summary": "SUSE Bug 1187601 for CVE-2021-0605",
"url": "https://bugzilla.suse.com/1187601"
},
{
"category": "external",
"summary": "SUSE Bug 1187687 for CVE-2021-0605",
"url": "https://bugzilla.suse.com/1187687"
},
{
"category": "external",
"summary": "SUSE Bug 1188381 for CVE-2021-0605",
"url": "https://bugzilla.suse.com/1188381"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.53.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.53.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.53.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.53.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.53.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.53.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.53.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.53.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.53.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.53.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-13T07:46:29Z",
"details": "important"
}
],
"title": "CVE-2021-0605"
},
{
"cve": "CVE-2021-33624",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-33624"
}
],
"notes": [
{
"category": "general",
"text": "In kernel/bpf/verifier.c in the Linux kernel before 5.12.13, a branch can be mispredicted (e.g., because of type confusion) and consequently an unprivileged BPF program can read arbitrary memory locations via a side-channel attack, aka CID-9183671af6db.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.53.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.53.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.53.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.53.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.53.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-33624",
"url": "https://www.suse.com/security/cve/CVE-2021-33624"
},
{
"category": "external",
"summary": "SUSE Bug 1187554 for CVE-2021-33624",
"url": "https://bugzilla.suse.com/1187554"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.53.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.53.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.53.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.53.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.53.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.53.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.53.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.53.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.53.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.53.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-13T07:46:29Z",
"details": "moderate"
}
],
"title": "CVE-2021-33624"
},
{
"cve": "CVE-2021-34693",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-34693"
}
],
"notes": [
{
"category": "general",
"text": "net/can/bcm.c in the Linux kernel through 5.12.10 allows local users to obtain sensitive information from kernel stack memory because parts of a data structure are uninitialized.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.53.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.53.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.53.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.53.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.53.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-34693",
"url": "https://www.suse.com/security/cve/CVE-2021-34693"
},
{
"category": "external",
"summary": "SUSE Bug 1187452 for CVE-2021-34693",
"url": "https://bugzilla.suse.com/1187452"
},
{
"category": "external",
"summary": "SUSE Bug 1192868 for CVE-2021-34693",
"url": "https://bugzilla.suse.com/1192868"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.53.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.53.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.53.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.53.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.53.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.53.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.53.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.53.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.53.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.53.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-13T07:46:29Z",
"details": "moderate"
}
],
"title": "CVE-2021-34693"
},
{
"cve": "CVE-2021-3573",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3573"
}
],
"notes": [
{
"category": "general",
"text": "A use-after-free in function hci_sock_bound_ioctl() of the Linux kernel HCI subsystem was found in the way user calls ioct HCIUNBLOCKADDR or other way triggers race condition of the call hci_unregister_dev() together with one of the calls hci_sock_blacklist_add(), hci_sock_blacklist_del(), hci_get_conn_info(), hci_get_auth_info(). A privileged local user could use this flaw to crash the system or escalate their privileges on the system. This flaw affects the Linux kernel versions prior to 5.13-rc5.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.53.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.53.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.53.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.53.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.53.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3573",
"url": "https://www.suse.com/security/cve/CVE-2021-3573"
},
{
"category": "external",
"summary": "SUSE Bug 1186666 for CVE-2021-3573",
"url": "https://bugzilla.suse.com/1186666"
},
{
"category": "external",
"summary": "SUSE Bug 1187054 for CVE-2021-3573",
"url": "https://bugzilla.suse.com/1187054"
},
{
"category": "external",
"summary": "SUSE Bug 1188172 for CVE-2021-3573",
"url": "https://bugzilla.suse.com/1188172"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.53.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.53.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.53.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.53.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.53.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.53.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.53.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.53.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.53.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.53.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-13T07:46:29Z",
"details": "important"
}
],
"title": "CVE-2021-3573"
}
]
}
rhsa-2021:4356
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n* kernel: out-of-bounds reads in pinctrl subsystem (CVE-2020-0427)\n* kernel: Improper input validation in some Intel(R) Ethernet E810 Adapter drivers (CVE-2020-24502)\n* kernel: Insufficient access control in some Intel(R) Ethernet E810 Adapter drivers (CVE-2020-24503)\n* kernel: Uncontrolled resource consumption in some Intel(R) Ethernet E810 Adapter drivers (CVE-2020-24504)\n* kernel: Fragmentation cache not cleared on reconnection (CVE-2020-24586)\n* kernel: Reassembling fragments encrypted under different keys (CVE-2020-24587)\n* kernel: wifi frame payload being parsed incorrectly as an L2 frame (CVE-2020-24588)\n* kernel: Forwarding EAPOL from unauthenticated wifi client (CVE-2020-26139)\n* kernel: accepting plaintext data frames in protected networks (CVE-2020-26140)\n* kernel: not verifying TKIP MIC of fragmented frames (CVE-2020-26141)\n* kernel: accepting fragmented plaintext frames in protected networks (CVE-2020-26143)\n* kernel: accepting unencrypted A-MSDU frames that start with RFC1042 header (CVE-2020-26144)\n* kernel: accepting plaintext broadcast fragments as full frames (CVE-2020-26145)\n* kernel: powerpc: RTAS calls can be used to compromise kernel integrity (CVE-2020-27777)\n* kernel: locking inconsistency in tty_io.c and tty_jobctrl.c can lead to a read-after-free (CVE-2020-29660)\n* kernel: buffer overflow in mwifiex_cmd_802_11_ad_hoc_start function via a long SSID value (CVE-2020-36158)\n* kernel: slab out-of-bounds read in hci_extended_inquiry_result_evt() (CVE-2020-36386)\n* kernel: Improper access control in BlueZ may allow information disclosure vulnerability. (CVE-2021-0129)\n* kernel: Use-after-free in ndb_queue_rq() in drivers/block/nbd.c (CVE-2021-3348)\n* kernel: Linux kernel eBPF RINGBUF map oversized allocation (CVE-2021-3489)\n* kernel: double free in bluetooth subsystem when the HCI device initialization fails (CVE-2021-3564)\n* kernel: use-after-free in function hci_sock_bound_ioctl() (CVE-2021-3573)\n* kernel: eBPF 32-bit source register truncation on div/mod (CVE-2021-3600)\n* kernel: DoS in rb_per_cpu_empty() (CVE-2021-3679)\n* kernel: Mounting overlayfs inside an unprivileged user namespace can reveal files (CVE-2021-3732)\n* kernel: heap overflow in __cgroup_bpf_run_filter_getsockopt() (CVE-2021-20194)\n* kernel: Race condition in sctp_destroy_sock list_del (CVE-2021-23133)\n* kernel: fuse: stall on CPU can occur because a retry loop continually finds the same bad inode (CVE-2021-28950)\n* kernel: System crash in intel_pmu_drain_pebs_nhm in arch/x86/events/intel/ds.c (CVE-2021-28971)\n* kernel: protection can be bypassed to leak content of kernel memory (CVE-2021-29155)\n* kernel: improper input validation in tipc_nl_retrieve_key function in net/tipc/node.c (CVE-2021-29646)\n* kernel: lack a full memory barrier may lead to DoS (CVE-2021-29650)\n* kernel: local escalation of privileges in handling of eBPF programs (CVE-2021-31440)\n* kernel: protection of stack pointer against speculative pointer arithmetic can be bypassed to leak content of kernel memory (CVE-2021-31829)\n* kernel: out-of-bounds reads and writes due to enforcing incorrect limits for pointer arithmetic operations by BPF verifier (CVE-2021-33200)\n* kernel: reassembling encrypted fragments with non-consecutive packet numbers (CVE-2020-26146)\n* kernel: reassembling mixed encrypted/plaintext fragments (CVE-2020-26147)\n* kernel: the copy-on-write implementation can grant unintended write access because of a race condition in a THP mapcount check (CVE-2020-29368)\n* kernel: flowtable list del corruption with kernel BUG at lib/list_debug.c:50 (CVE-2021-3635)\n* kernel: NULL pointer dereference in llsec_key_alloc() in net/mac802154/llsec.c (CVE-2021-3659)\n* kernel: setsockopt System Call Untrusted Pointer Dereference Information Disclosure (CVE-2021-20239)\n* kernel: out of bounds array access in drivers/md/dm-ioctl.c (CVE-2021-31916)",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2021:4356",
"url": "https://access.redhat.com/errata/RHSA-2021:4356"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.5_release_notes/",
"url": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.5_release_notes/"
},
{
"category": "external",
"summary": "1509204",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1509204"
},
{
"category": "external",
"summary": "1793880",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1793880"
},
{
"category": "external",
"summary": "1816493",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1816493"
},
{
"category": "external",
"summary": "1894101",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1894101"
},
{
"category": "external",
"summary": "1900844",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1900844"
},
{
"category": "external",
"summary": "1903244",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1903244"
},
{
"category": "external",
"summary": "1906522",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1906522"
},
{
"category": "external",
"summary": "1912683",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1912683"
},
{
"category": "external",
"summary": "1913348",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1913348"
},
{
"category": "external",
"summary": "1915825",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1915825"
},
{
"category": "external",
"summary": "1919893",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1919893"
},
{
"category": "external",
"summary": "1921958",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1921958"
},
{
"category": "external",
"summary": "1923636",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1923636"
},
{
"category": "external",
"summary": "1930376",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1930376"
},
{
"category": "external",
"summary": "1930379",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1930379"
},
{
"category": "external",
"summary": "1930381",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1930381"
},
{
"category": "external",
"summary": "1933527",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1933527"
},
{
"category": "external",
"summary": "1939341",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1939341"
},
{
"category": "external",
"summary": "1941762",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1941762"
},
{
"category": "external",
"summary": "1941784",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1941784"
},
{
"category": "external",
"summary": "1945345",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1945345"
},
{
"category": "external",
"summary": "1945388",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1945388"
},
{
"category": "external",
"summary": "1946965",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1946965"
},
{
"category": "external",
"summary": "1948772",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1948772"
},
{
"category": "external",
"summary": "1951595",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1951595"
},
{
"category": "external",
"summary": "1953847",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1953847"
},
{
"category": "external",
"summary": "1954588",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1954588"
},
{
"category": "external",
"summary": "1957788",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1957788"
},
{
"category": "external",
"summary": "1959559",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1959559"
},
{
"category": "external",
"summary": "1959642",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1959642"
},
{
"category": "external",
"summary": "1959654",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1959654"
},
{
"category": "external",
"summary": "1959657",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1959657"
},
{
"category": "external",
"summary": "1959663",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1959663"
},
{
"category": "external",
"summary": "1960490",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1960490"
},
{
"category": "external",
"summary": "1960492",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1960492"
},
{
"category": "external",
"summary": "1960496",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1960496"
},
{
"category": "external",
"summary": "1960498",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1960498"
},
{
"category": "external",
"summary": "1960500",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1960500"
},
{
"category": "external",
"summary": "1960502",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1960502"
},
{
"category": "external",
"summary": "1960504",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1960504"
},
{
"category": "external",
"summary": "1960708",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1960708"
},
{
"category": "external",
"summary": "1964028",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1964028"
},
{
"category": "external",
"summary": "1964139",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1964139"
},
{
"category": "external",
"summary": "1965038",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965038"
},
{
"category": "external",
"summary": "1965360",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965360"
},
{
"category": "external",
"summary": "1965458",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965458"
},
{
"category": "external",
"summary": "1966578",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1966578"
},
{
"category": "external",
"summary": "1969489",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1969489"
},
{
"category": "external",
"summary": "1971101",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1971101"
},
{
"category": "external",
"summary": "1972278",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1972278"
},
{
"category": "external",
"summary": "1974627",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1974627"
},
{
"category": "external",
"summary": "1975182",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1975182"
},
{
"category": "external",
"summary": "1975949",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1975949"
},
{
"category": "external",
"summary": "1976679",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1976679"
},
{
"category": "external",
"summary": "1976699",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1976699"
},
{
"category": "external",
"summary": "1976946",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1976946"
},
{
"category": "external",
"summary": "1976969",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1976969"
},
{
"category": "external",
"summary": "1977162",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1977162"
},
{
"category": "external",
"summary": "1977422",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1977422"
},
{
"category": "external",
"summary": "1977537",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1977537"
},
{
"category": "external",
"summary": "1977850",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1977850"
},
{
"category": "external",
"summary": "1978369",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1978369"
},
{
"category": "external",
"summary": "1979070",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1979070"
},
{
"category": "external",
"summary": "1979680",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1979680"
},
{
"category": "external",
"summary": "1981954",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1981954"
},
{
"category": "external",
"summary": "1986138",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986138"
},
{
"category": "external",
"summary": "1989165",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1989165"
},
{
"category": "external",
"summary": "1989999",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1989999"
},
{
"category": "external",
"summary": "1991976",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1991976"
},
{
"category": "external",
"summary": "1992700",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1992700"
},
{
"category": "external",
"summary": "1995249",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1995249"
},
{
"category": "external",
"summary": "1996854",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1996854"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_4356.json"
}
],
"title": "Red Hat Security Advisory: kernel security, bug fix, and enhancement update",
"tracking": {
"current_release_date": "2025-10-28T19:33:53+00:00",
"generator": {
"date": "2025-10-28T19:33:53+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.10"
}
},
"id": "RHSA-2021:4356",
"initial_release_date": "2021-11-09T18:06:54+00:00",
"revision_history": [
{
"date": "2021-11-09T18:06:54+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2021-11-09T18:06:54+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-28T19:33:53+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux BaseOS (v. 8)",
"product": {
"name": "Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:8::baseos"
}
}
},
{
"category": "product_name",
"name": "Red Hat CodeReady Linux Builder (v. 8)",
"product": {
"name": "Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:8::crb"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:4.18.0-348.el8.aarch64",
"product": {
"name": "bpftool-0:4.18.0-348.el8.aarch64",
"product_id": "bpftool-0:4.18.0-348.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@4.18.0-348.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.18.0-348.el8.aarch64",
"product": {
"name": "kernel-0:4.18.0-348.el8.aarch64",
"product_id": "kernel-0:4.18.0-348.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-348.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:4.18.0-348.el8.aarch64",
"product": {
"name": "kernel-core-0:4.18.0-348.el8.aarch64",
"product_id": "kernel-core-0:4.18.0-348.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@4.18.0-348.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"product": {
"name": "kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"product_id": "kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-348.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.18.0-348.el8.aarch64",
"product": {
"name": "kernel-debug-0:4.18.0-348.el8.aarch64",
"product_id": "kernel-debug-0:4.18.0-348.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.18.0-348.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:4.18.0-348.el8.aarch64",
"product": {
"name": "kernel-debug-core-0:4.18.0-348.el8.aarch64",
"product_id": "kernel-debug-core-0:4.18.0-348.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-348.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"product": {
"name": "kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"product_id": "kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-348.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"product": {
"name": "kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"product_id": "kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-348.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"product": {
"name": "kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"product_id": "kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-348.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.18.0-348.el8.aarch64",
"product": {
"name": "kernel-devel-0:4.18.0-348.el8.aarch64",
"product_id": "kernel-devel-0:4.18.0-348.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.18.0-348.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:4.18.0-348.el8.aarch64",
"product": {
"name": "kernel-headers-0:4.18.0-348.el8.aarch64",
"product_id": "kernel-headers-0:4.18.0-348.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@4.18.0-348.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:4.18.0-348.el8.aarch64",
"product": {
"name": "kernel-modules-0:4.18.0-348.el8.aarch64",
"product_id": "kernel-modules-0:4.18.0-348.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@4.18.0-348.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"product": {
"name": "kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"product_id": "kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-348.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:4.18.0-348.el8.aarch64",
"product": {
"name": "kernel-tools-0:4.18.0-348.el8.aarch64",
"product_id": "kernel-tools-0:4.18.0-348.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@4.18.0-348.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"product": {
"name": "kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"product_id": "kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-348.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.18.0-348.el8.aarch64",
"product": {
"name": "perf-0:4.18.0-348.el8.aarch64",
"product_id": "perf-0:4.18.0-348.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.18.0-348.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:4.18.0-348.el8.aarch64",
"product": {
"name": "python3-perf-0:4.18.0-348.el8.aarch64",
"product_id": "python3-perf-0:4.18.0-348.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@4.18.0-348.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"product": {
"name": "bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"product_id": "bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-348.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"product": {
"name": "kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"product_id": "kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-348.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"product": {
"name": "kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"product_id": "kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-348.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"product": {
"name": "kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"product_id": "kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-aarch64@4.18.0-348.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"product": {
"name": "kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"product_id": "kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-348.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.18.0-348.el8.aarch64",
"product": {
"name": "perf-debuginfo-0:4.18.0-348.el8.aarch64",
"product_id": "perf-debuginfo-0:4.18.0-348.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-348.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"product": {
"name": "python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"product_id": "python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-348.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"product": {
"name": "kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"product_id": "kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.18.0-348.el8?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:4.18.0-348.el8.ppc64le",
"product": {
"name": "bpftool-0:4.18.0-348.el8.ppc64le",
"product_id": "bpftool-0:4.18.0-348.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@4.18.0-348.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.18.0-348.el8.ppc64le",
"product": {
"name": "kernel-0:4.18.0-348.el8.ppc64le",
"product_id": "kernel-0:4.18.0-348.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-348.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:4.18.0-348.el8.ppc64le",
"product": {
"name": "kernel-core-0:4.18.0-348.el8.ppc64le",
"product_id": "kernel-core-0:4.18.0-348.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@4.18.0-348.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"product": {
"name": "kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"product_id": "kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-348.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.18.0-348.el8.ppc64le",
"product": {
"name": "kernel-debug-0:4.18.0-348.el8.ppc64le",
"product_id": "kernel-debug-0:4.18.0-348.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.18.0-348.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"product": {
"name": "kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"product_id": "kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-348.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"product": {
"name": "kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"product_id": "kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-348.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"product": {
"name": "kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"product_id": "kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-348.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"product": {
"name": "kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"product_id": "kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-348.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.18.0-348.el8.ppc64le",
"product": {
"name": "kernel-devel-0:4.18.0-348.el8.ppc64le",
"product_id": "kernel-devel-0:4.18.0-348.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.18.0-348.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:4.18.0-348.el8.ppc64le",
"product": {
"name": "kernel-headers-0:4.18.0-348.el8.ppc64le",
"product_id": "kernel-headers-0:4.18.0-348.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@4.18.0-348.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:4.18.0-348.el8.ppc64le",
"product": {
"name": "kernel-modules-0:4.18.0-348.el8.ppc64le",
"product_id": "kernel-modules-0:4.18.0-348.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@4.18.0-348.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"product": {
"name": "kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"product_id": "kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-348.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:4.18.0-348.el8.ppc64le",
"product": {
"name": "kernel-tools-0:4.18.0-348.el8.ppc64le",
"product_id": "kernel-tools-0:4.18.0-348.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@4.18.0-348.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"product": {
"name": "kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"product_id": "kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-348.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.18.0-348.el8.ppc64le",
"product": {
"name": "perf-0:4.18.0-348.el8.ppc64le",
"product_id": "perf-0:4.18.0-348.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.18.0-348.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:4.18.0-348.el8.ppc64le",
"product": {
"name": "python3-perf-0:4.18.0-348.el8.ppc64le",
"product_id": "python3-perf-0:4.18.0-348.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@4.18.0-348.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"product": {
"name": "bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"product_id": "bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-348.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"product": {
"name": "kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"product_id": "kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-348.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"product": {
"name": "kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"product_id": "kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-348.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"product": {
"name": "kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"product_id": "kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64le@4.18.0-348.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"product": {
"name": "kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"product_id": "kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-348.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"product": {
"name": "perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"product_id": "perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-348.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"product": {
"name": "python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"product_id": "python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-348.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"product": {
"name": "kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"product_id": "kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.18.0-348.el8?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:4.18.0-348.el8.x86_64",
"product": {
"name": "bpftool-0:4.18.0-348.el8.x86_64",
"product_id": "bpftool-0:4.18.0-348.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@4.18.0-348.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.18.0-348.el8.x86_64",
"product": {
"name": "kernel-0:4.18.0-348.el8.x86_64",
"product_id": "kernel-0:4.18.0-348.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-348.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:4.18.0-348.el8.x86_64",
"product": {
"name": "kernel-core-0:4.18.0-348.el8.x86_64",
"product_id": "kernel-core-0:4.18.0-348.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@4.18.0-348.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"product": {
"name": "kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"product_id": "kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-348.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.18.0-348.el8.x86_64",
"product": {
"name": "kernel-debug-0:4.18.0-348.el8.x86_64",
"product_id": "kernel-debug-0:4.18.0-348.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.18.0-348.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:4.18.0-348.el8.x86_64",
"product": {
"name": "kernel-debug-core-0:4.18.0-348.el8.x86_64",
"product_id": "kernel-debug-core-0:4.18.0-348.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-348.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"product": {
"name": "kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"product_id": "kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-348.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"product": {
"name": "kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"product_id": "kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-348.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"product": {
"name": "kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"product_id": "kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-348.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.18.0-348.el8.x86_64",
"product": {
"name": "kernel-devel-0:4.18.0-348.el8.x86_64",
"product_id": "kernel-devel-0:4.18.0-348.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.18.0-348.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:4.18.0-348.el8.x86_64",
"product": {
"name": "kernel-headers-0:4.18.0-348.el8.x86_64",
"product_id": "kernel-headers-0:4.18.0-348.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@4.18.0-348.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:4.18.0-348.el8.x86_64",
"product": {
"name": "kernel-modules-0:4.18.0-348.el8.x86_64",
"product_id": "kernel-modules-0:4.18.0-348.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@4.18.0-348.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"product": {
"name": "kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"product_id": "kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-348.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:4.18.0-348.el8.x86_64",
"product": {
"name": "kernel-tools-0:4.18.0-348.el8.x86_64",
"product_id": "kernel-tools-0:4.18.0-348.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@4.18.0-348.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"product": {
"name": "kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"product_id": "kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-348.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.18.0-348.el8.x86_64",
"product": {
"name": "perf-0:4.18.0-348.el8.x86_64",
"product_id": "perf-0:4.18.0-348.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.18.0-348.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:4.18.0-348.el8.x86_64",
"product": {
"name": "python3-perf-0:4.18.0-348.el8.x86_64",
"product_id": "python3-perf-0:4.18.0-348.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@4.18.0-348.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"product": {
"name": "bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"product_id": "bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-348.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"product": {
"name": "kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"product_id": "kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-348.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"product": {
"name": "kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"product_id": "kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-348.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"product": {
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"product_id": "kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@4.18.0-348.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"product": {
"name": "kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"product_id": "kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-348.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.18.0-348.el8.x86_64",
"product": {
"name": "perf-debuginfo-0:4.18.0-348.el8.x86_64",
"product_id": "perf-debuginfo-0:4.18.0-348.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-348.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"product": {
"name": "python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"product_id": "python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-348.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"product": {
"name": "kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"product_id": "kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.18.0-348.el8?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:4.18.0-348.el8.s390x",
"product": {
"name": "bpftool-0:4.18.0-348.el8.s390x",
"product_id": "bpftool-0:4.18.0-348.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@4.18.0-348.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.18.0-348.el8.s390x",
"product": {
"name": "kernel-0:4.18.0-348.el8.s390x",
"product_id": "kernel-0:4.18.0-348.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-348.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:4.18.0-348.el8.s390x",
"product": {
"name": "kernel-core-0:4.18.0-348.el8.s390x",
"product_id": "kernel-core-0:4.18.0-348.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@4.18.0-348.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:4.18.0-348.el8.s390x",
"product": {
"name": "kernel-cross-headers-0:4.18.0-348.el8.s390x",
"product_id": "kernel-cross-headers-0:4.18.0-348.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-348.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.18.0-348.el8.s390x",
"product": {
"name": "kernel-debug-0:4.18.0-348.el8.s390x",
"product_id": "kernel-debug-0:4.18.0-348.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.18.0-348.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:4.18.0-348.el8.s390x",
"product": {
"name": "kernel-debug-core-0:4.18.0-348.el8.s390x",
"product_id": "kernel-debug-core-0:4.18.0-348.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-348.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.18.0-348.el8.s390x",
"product": {
"name": "kernel-debug-devel-0:4.18.0-348.el8.s390x",
"product_id": "kernel-debug-devel-0:4.18.0-348.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-348.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:4.18.0-348.el8.s390x",
"product": {
"name": "kernel-debug-modules-0:4.18.0-348.el8.s390x",
"product_id": "kernel-debug-modules-0:4.18.0-348.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-348.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"product": {
"name": "kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"product_id": "kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-348.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.18.0-348.el8.s390x",
"product": {
"name": "kernel-devel-0:4.18.0-348.el8.s390x",
"product_id": "kernel-devel-0:4.18.0-348.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.18.0-348.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:4.18.0-348.el8.s390x",
"product": {
"name": "kernel-headers-0:4.18.0-348.el8.s390x",
"product_id": "kernel-headers-0:4.18.0-348.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@4.18.0-348.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:4.18.0-348.el8.s390x",
"product": {
"name": "kernel-modules-0:4.18.0-348.el8.s390x",
"product_id": "kernel-modules-0:4.18.0-348.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@4.18.0-348.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:4.18.0-348.el8.s390x",
"product": {
"name": "kernel-modules-extra-0:4.18.0-348.el8.s390x",
"product_id": "kernel-modules-extra-0:4.18.0-348.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-348.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:4.18.0-348.el8.s390x",
"product": {
"name": "kernel-tools-0:4.18.0-348.el8.s390x",
"product_id": "kernel-tools-0:4.18.0-348.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@4.18.0-348.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"product": {
"name": "kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"product_id": "kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump@4.18.0-348.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"product": {
"name": "kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"product_id": "kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-core@4.18.0-348.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"product": {
"name": "kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"product_id": "kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-devel@4.18.0-348.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"product": {
"name": "kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"product_id": "kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-modules@4.18.0-348.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"product": {
"name": "kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"product_id": "kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-modules-extra@4.18.0-348.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.18.0-348.el8.s390x",
"product": {
"name": "perf-0:4.18.0-348.el8.s390x",
"product_id": "perf-0:4.18.0-348.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.18.0-348.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:4.18.0-348.el8.s390x",
"product": {
"name": "python3-perf-0:4.18.0-348.el8.s390x",
"product_id": "python3-perf-0:4.18.0-348.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@4.18.0-348.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"product": {
"name": "bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"product_id": "bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-348.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"product": {
"name": "kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"product_id": "kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-348.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.18.0-348.el8.s390x",
"product": {
"name": "kernel-debuginfo-0:4.18.0-348.el8.s390x",
"product_id": "kernel-debuginfo-0:4.18.0-348.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-348.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"product": {
"name": "kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"product_id": "kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-s390x@4.18.0-348.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"product": {
"name": "kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"product_id": "kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-348.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"product": {
"name": "kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"product_id": "kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-debuginfo@4.18.0-348.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.18.0-348.el8.s390x",
"product": {
"name": "perf-debuginfo-0:4.18.0-348.el8.s390x",
"product_id": "perf-debuginfo-0:4.18.0-348.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-348.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"product": {
"name": "python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"product_id": "python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-348.el8?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:4.18.0-348.el8.src",
"product": {
"name": "kernel-0:4.18.0-348.el8.src",
"product_id": "kernel-0:4.18.0-348.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-348.el8?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"product": {
"name": "kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"product_id": "kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-abi-stablelists@4.18.0-348.el8?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "kernel-doc-0:4.18.0-348.el8.noarch",
"product": {
"name": "kernel-doc-0:4.18.0-348.el8.noarch",
"product_id": "kernel-doc-0:4.18.0-348.el8.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-doc@4.18.0-348.el8?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-348.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64"
},
"product_reference": "bpftool-0:4.18.0-348.el8.aarch64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-348.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le"
},
"product_reference": "bpftool-0:4.18.0-348.el8.ppc64le",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-348.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x"
},
"product_reference": "bpftool-0:4.18.0-348.el8.s390x",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-348.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64"
},
"product_reference": "bpftool-0:4.18.0-348.el8.x86_64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-348.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-348.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-348.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-348.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-348.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64"
},
"product_reference": "kernel-0:4.18.0-348.el8.aarch64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-348.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le"
},
"product_reference": "kernel-0:4.18.0-348.el8.ppc64le",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-348.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x"
},
"product_reference": "kernel-0:4.18.0-348.el8.s390x",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-348.el8.src as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src"
},
"product_reference": "kernel-0:4.18.0-348.el8.src",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-348.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64"
},
"product_reference": "kernel-0:4.18.0-348.el8.x86_64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-stablelists-0:4.18.0-348.el8.noarch as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch"
},
"product_reference": "kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-348.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64"
},
"product_reference": "kernel-core-0:4.18.0-348.el8.aarch64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-348.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le"
},
"product_reference": "kernel-core-0:4.18.0-348.el8.ppc64le",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-348.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x"
},
"product_reference": "kernel-core-0:4.18.0-348.el8.s390x",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-348.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64"
},
"product_reference": "kernel-core-0:4.18.0-348.el8.x86_64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-348.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64"
},
"product_reference": "kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-348.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le"
},
"product_reference": "kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-348.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x"
},
"product_reference": "kernel-cross-headers-0:4.18.0-348.el8.s390x",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-348.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64"
},
"product_reference": "kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-348.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64"
},
"product_reference": "kernel-debug-0:4.18.0-348.el8.aarch64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-348.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le"
},
"product_reference": "kernel-debug-0:4.18.0-348.el8.ppc64le",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-348.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x"
},
"product_reference": "kernel-debug-0:4.18.0-348.el8.s390x",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-348.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64"
},
"product_reference": "kernel-debug-0:4.18.0-348.el8.x86_64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-348.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64"
},
"product_reference": "kernel-debug-core-0:4.18.0-348.el8.aarch64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-348.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le"
},
"product_reference": "kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-348.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x"
},
"product_reference": "kernel-debug-core-0:4.18.0-348.el8.s390x",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-348.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64"
},
"product_reference": "kernel-debug-core-0:4.18.0-348.el8.x86_64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-348.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-348.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64"
},
"product_reference": "kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-348.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le"
},
"product_reference": "kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-348.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x"
},
"product_reference": "kernel-debug-devel-0:4.18.0-348.el8.s390x",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-348.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64"
},
"product_reference": "kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-348.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64"
},
"product_reference": "kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-348.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le"
},
"product_reference": "kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-348.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x"
},
"product_reference": "kernel-debug-modules-0:4.18.0-348.el8.s390x",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-348.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64"
},
"product_reference": "kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-348.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-348.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64"
},
"product_reference": "kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-348.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le"
},
"product_reference": "kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-348.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x"
},
"product_reference": "kernel-debuginfo-0:4.18.0-348.el8.s390x",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-348.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64"
},
"product_reference": "kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64"
},
"product_reference": "kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-348.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64"
},
"product_reference": "kernel-devel-0:4.18.0-348.el8.aarch64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-348.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le"
},
"product_reference": "kernel-devel-0:4.18.0-348.el8.ppc64le",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-348.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x"
},
"product_reference": "kernel-devel-0:4.18.0-348.el8.s390x",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-348.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64"
},
"product_reference": "kernel-devel-0:4.18.0-348.el8.x86_64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:4.18.0-348.el8.noarch as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch"
},
"product_reference": "kernel-doc-0:4.18.0-348.el8.noarch",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-348.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64"
},
"product_reference": "kernel-headers-0:4.18.0-348.el8.aarch64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-348.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le"
},
"product_reference": "kernel-headers-0:4.18.0-348.el8.ppc64le",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-348.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x"
},
"product_reference": "kernel-headers-0:4.18.0-348.el8.s390x",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-348.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
},
"product_reference": "kernel-headers-0:4.18.0-348.el8.x86_64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-348.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64"
},
"product_reference": "kernel-modules-0:4.18.0-348.el8.aarch64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-348.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le"
},
"product_reference": "kernel-modules-0:4.18.0-348.el8.ppc64le",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-348.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x"
},
"product_reference": "kernel-modules-0:4.18.0-348.el8.s390x",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-348.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64"
},
"product_reference": "kernel-modules-0:4.18.0-348.el8.x86_64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-348.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64"
},
"product_reference": "kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-348.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le"
},
"product_reference": "kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-348.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x"
},
"product_reference": "kernel-modules-extra-0:4.18.0-348.el8.s390x",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-348.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64"
},
"product_reference": "kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-348.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64"
},
"product_reference": "kernel-tools-0:4.18.0-348.el8.aarch64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-348.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le"
},
"product_reference": "kernel-tools-0:4.18.0-348.el8.ppc64le",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-348.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x"
},
"product_reference": "kernel-tools-0:4.18.0-348.el8.s390x",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-348.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64"
},
"product_reference": "kernel-tools-0:4.18.0-348.el8.x86_64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-348.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-348.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64"
},
"product_reference": "kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-348.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le"
},
"product_reference": "kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-348.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64"
},
"product_reference": "kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-0:4.18.0-348.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x"
},
"product_reference": "kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-core-0:4.18.0-348.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x"
},
"product_reference": "kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x"
},
"product_reference": "kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x"
},
"product_reference": "kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x"
},
"product_reference": "kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x"
},
"product_reference": "kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-348.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64"
},
"product_reference": "perf-0:4.18.0-348.el8.aarch64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-348.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le"
},
"product_reference": "perf-0:4.18.0-348.el8.ppc64le",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-348.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x"
},
"product_reference": "perf-0:4.18.0-348.el8.s390x",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-348.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64"
},
"product_reference": "perf-0:4.18.0-348.el8.x86_64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-348.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64"
},
"product_reference": "perf-debuginfo-0:4.18.0-348.el8.aarch64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-348.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le"
},
"product_reference": "perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-348.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x"
},
"product_reference": "perf-debuginfo-0:4.18.0-348.el8.s390x",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-348.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64"
},
"product_reference": "perf-debuginfo-0:4.18.0-348.el8.x86_64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-348.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64"
},
"product_reference": "python3-perf-0:4.18.0-348.el8.aarch64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-348.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le"
},
"product_reference": "python3-perf-0:4.18.0-348.el8.ppc64le",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-348.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x"
},
"product_reference": "python3-perf-0:4.18.0-348.el8.s390x",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-348.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64"
},
"product_reference": "python3-perf-0:4.18.0-348.el8.x86_64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-348.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-348.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-348.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-348.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64"
},
"product_reference": "bpftool-0:4.18.0-348.el8.aarch64",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-348.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le"
},
"product_reference": "bpftool-0:4.18.0-348.el8.ppc64le",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-348.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x"
},
"product_reference": "bpftool-0:4.18.0-348.el8.s390x",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-348.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64"
},
"product_reference": "bpftool-0:4.18.0-348.el8.x86_64",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-348.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-348.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-348.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-348.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-348.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64"
},
"product_reference": "kernel-0:4.18.0-348.el8.aarch64",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-348.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le"
},
"product_reference": "kernel-0:4.18.0-348.el8.ppc64le",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-348.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x"
},
"product_reference": "kernel-0:4.18.0-348.el8.s390x",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-348.el8.src as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src"
},
"product_reference": "kernel-0:4.18.0-348.el8.src",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-348.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64"
},
"product_reference": "kernel-0:4.18.0-348.el8.x86_64",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-stablelists-0:4.18.0-348.el8.noarch as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch"
},
"product_reference": "kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-348.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64"
},
"product_reference": "kernel-core-0:4.18.0-348.el8.aarch64",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-348.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le"
},
"product_reference": "kernel-core-0:4.18.0-348.el8.ppc64le",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-348.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x"
},
"product_reference": "kernel-core-0:4.18.0-348.el8.s390x",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-348.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64"
},
"product_reference": "kernel-core-0:4.18.0-348.el8.x86_64",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-348.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64"
},
"product_reference": "kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-348.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le"
},
"product_reference": "kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-348.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x"
},
"product_reference": "kernel-cross-headers-0:4.18.0-348.el8.s390x",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-348.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64"
},
"product_reference": "kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-348.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64"
},
"product_reference": "kernel-debug-0:4.18.0-348.el8.aarch64",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-348.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le"
},
"product_reference": "kernel-debug-0:4.18.0-348.el8.ppc64le",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-348.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x"
},
"product_reference": "kernel-debug-0:4.18.0-348.el8.s390x",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-348.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64"
},
"product_reference": "kernel-debug-0:4.18.0-348.el8.x86_64",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-348.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64"
},
"product_reference": "kernel-debug-core-0:4.18.0-348.el8.aarch64",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-348.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le"
},
"product_reference": "kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-348.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x"
},
"product_reference": "kernel-debug-core-0:4.18.0-348.el8.s390x",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-348.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64"
},
"product_reference": "kernel-debug-core-0:4.18.0-348.el8.x86_64",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-348.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-348.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64"
},
"product_reference": "kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-348.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le"
},
"product_reference": "kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-348.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x"
},
"product_reference": "kernel-debug-devel-0:4.18.0-348.el8.s390x",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-348.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64"
},
"product_reference": "kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-348.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64"
},
"product_reference": "kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-348.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le"
},
"product_reference": "kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-348.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x"
},
"product_reference": "kernel-debug-modules-0:4.18.0-348.el8.s390x",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-348.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64"
},
"product_reference": "kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-348.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-348.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64"
},
"product_reference": "kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-348.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le"
},
"product_reference": "kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-348.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x"
},
"product_reference": "kernel-debuginfo-0:4.18.0-348.el8.s390x",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-348.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64"
},
"product_reference": "kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64"
},
"product_reference": "kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-348.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64"
},
"product_reference": "kernel-devel-0:4.18.0-348.el8.aarch64",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-348.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le"
},
"product_reference": "kernel-devel-0:4.18.0-348.el8.ppc64le",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-348.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x"
},
"product_reference": "kernel-devel-0:4.18.0-348.el8.s390x",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-348.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64"
},
"product_reference": "kernel-devel-0:4.18.0-348.el8.x86_64",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:4.18.0-348.el8.noarch as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch"
},
"product_reference": "kernel-doc-0:4.18.0-348.el8.noarch",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-348.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64"
},
"product_reference": "kernel-headers-0:4.18.0-348.el8.aarch64",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-348.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le"
},
"product_reference": "kernel-headers-0:4.18.0-348.el8.ppc64le",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-348.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x"
},
"product_reference": "kernel-headers-0:4.18.0-348.el8.s390x",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-348.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
},
"product_reference": "kernel-headers-0:4.18.0-348.el8.x86_64",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-348.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64"
},
"product_reference": "kernel-modules-0:4.18.0-348.el8.aarch64",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-348.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le"
},
"product_reference": "kernel-modules-0:4.18.0-348.el8.ppc64le",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-348.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x"
},
"product_reference": "kernel-modules-0:4.18.0-348.el8.s390x",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-348.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64"
},
"product_reference": "kernel-modules-0:4.18.0-348.el8.x86_64",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-348.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64"
},
"product_reference": "kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-348.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le"
},
"product_reference": "kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-348.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x"
},
"product_reference": "kernel-modules-extra-0:4.18.0-348.el8.s390x",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-348.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64"
},
"product_reference": "kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-348.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64"
},
"product_reference": "kernel-tools-0:4.18.0-348.el8.aarch64",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-348.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le"
},
"product_reference": "kernel-tools-0:4.18.0-348.el8.ppc64le",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-348.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x"
},
"product_reference": "kernel-tools-0:4.18.0-348.el8.s390x",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-348.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64"
},
"product_reference": "kernel-tools-0:4.18.0-348.el8.x86_64",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-348.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-348.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64"
},
"product_reference": "kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-348.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le"
},
"product_reference": "kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-348.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64"
},
"product_reference": "kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-0:4.18.0-348.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x"
},
"product_reference": "kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-core-0:4.18.0-348.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x"
},
"product_reference": "kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x"
},
"product_reference": "kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x"
},
"product_reference": "kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x"
},
"product_reference": "kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x"
},
"product_reference": "kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-348.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64"
},
"product_reference": "perf-0:4.18.0-348.el8.aarch64",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-348.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le"
},
"product_reference": "perf-0:4.18.0-348.el8.ppc64le",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-348.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x"
},
"product_reference": "perf-0:4.18.0-348.el8.s390x",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-348.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64"
},
"product_reference": "perf-0:4.18.0-348.el8.x86_64",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-348.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64"
},
"product_reference": "perf-debuginfo-0:4.18.0-348.el8.aarch64",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-348.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le"
},
"product_reference": "perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-348.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x"
},
"product_reference": "perf-debuginfo-0:4.18.0-348.el8.s390x",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-348.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64"
},
"product_reference": "perf-debuginfo-0:4.18.0-348.el8.x86_64",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-348.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64"
},
"product_reference": "python3-perf-0:4.18.0-348.el8.aarch64",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-348.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le"
},
"product_reference": "python3-perf-0:4.18.0-348.el8.ppc64le",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-348.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x"
},
"product_reference": "python3-perf-0:4.18.0-348.el8.s390x",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-348.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64"
},
"product_reference": "python3-perf-0:4.18.0-348.el8.x86_64",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-348.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-348.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-348.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"relates_to_product_reference": "CRB-8.5.0.GA"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2019-14615",
"cwe": {
"id": "CWE-212",
"name": "Improper Removal of Sensitive Information Before Storage or Transfer"
},
"discovery_date": "2020-01-09T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1789209"
}
],
"notes": [
{
"category": "description",
"text": "An information disclosure flaw was found in the Linux kernel. The i915 graphics driver lacks control of flow for data structures which may allow a local, authenticated user to disclose information when using ioctl commands with an attached i915 device. The highest threat from this vulnerability is to data confidentiality.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Intel graphics card information leak.",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue affects the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 6, 7, 8 and Red Hat Enterprise MRG 2. Future kernel updates for Red Hat Enterprise Linux 6, 7, and 8 may address this issue.\n\nThis has been rated as having Moderate security impact and is not currently planned to be addressed in future updates of Red Hat Enterprise MRG 2.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-14615"
},
{
"category": "external",
"summary": "RHBZ#1789209",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1789209"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-14615",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14615"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-14615",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-14615"
}
],
"release_date": "2020-01-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T18:06:54+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4356"
},
{
"category": "workaround",
"details": "Preventing loading of the i915 kernel module will prevent attackers from using this exploit against the system; however, the power management functionality of the card will be disabled and the system may draw additional power. See the kcs \u201cHow do I blacklist a kernel module to prevent it from loading automatically?\u201c (https://access.redhat.com/solutions/41278) for instructions on how to disable a kernel module from autoloading. Graphical displays may also be at low resolution or not work correctly.\n\nThis mitigation may not be suitable if the graphical login functionality is required.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: Intel graphics card information leak."
},
{
"cve": "CVE-2019-15794",
"cwe": {
"id": "CWE-672",
"name": "Operation on a Resource after Expiration or Release"
},
"discovery_date": "2020-05-04T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1831055"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel. In Overlayfs, vma-\u003evm_file was replaced in the mmap handlers and, on errors, the original value is not restored. A local attacker with special user privilege (or root) can cause a kernel internal information leak. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Overlayfs in the Linux kernel and shiftfs not restoring original value on error leading to a refcount underflow",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-15794"
},
{
"category": "external",
"summary": "RHBZ#1831055",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1831055"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-15794",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-15794"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-15794",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-15794"
}
],
"release_date": "2019-11-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T18:06:54+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4356"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: Overlayfs in the Linux kernel and shiftfs not restoring original value on error leading to a refcount underflow"
},
{
"cve": "CVE-2020-0427",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2021-01-24T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1919893"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux pinctrl system. It is possible to trigger an of bounds read due to a use after free. This could lead to local information disclosure with no additional execution privileges needed.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: out-of-bounds reads in pinctrl subsystem.",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-0427"
},
{
"category": "external",
"summary": "RHBZ#1919893",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1919893"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-0427",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0427"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-0427",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-0427"
}
],
"release_date": "2020-11-22T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T18:06:54+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4356"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: out-of-bounds reads in pinctrl subsystem."
},
{
"cve": "CVE-2020-24502",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2021-02-17T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1930379"
}
],
"notes": [
{
"category": "description",
"text": "Improper input validation in some Intel(R) Ethernet E810 Adapter drivers for Linux may allow an authenticated user to potentially enable a denial of service via local access.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Improper input validation in some Intel(R) Ethernet E810 Adapter drivers",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-24502"
},
{
"category": "external",
"summary": "RHBZ#1930379",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1930379"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-24502",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24502"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-24502",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-24502"
}
],
"release_date": "2021-02-17T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T18:06:54+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4356"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: Improper input validation in some Intel(R) Ethernet E810 Adapter drivers"
},
{
"cve": "CVE-2020-24503",
"cwe": {
"id": "CWE-863",
"name": "Incorrect Authorization"
},
"discovery_date": "2021-02-17T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1930381"
}
],
"notes": [
{
"category": "description",
"text": "Insufficient access control in some Intel(R) Ethernet E810 Adapter drivers for Linux may allow an authenticated user to potentially enable information disclosure via local access.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Insufficient access control in some Intel(R) Ethernet E810 Adapter drivers",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-24503"
},
{
"category": "external",
"summary": "RHBZ#1930381",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1930381"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-24503",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24503"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-24503",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-24503"
}
],
"release_date": "2021-02-17T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T18:06:54+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4356"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: Insufficient access control in some Intel(R) Ethernet E810 Adapter drivers"
},
{
"cve": "CVE-2020-24504",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2021-02-17T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1930376"
}
],
"notes": [
{
"category": "description",
"text": "An uncontrolled resource consumption in some Intel(R) Ethernet E810 Adapter drivers for Linux may allow an authenticated user to potentially cause a denial of service via local access.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Uncontrolled resource consumption in some Intel(R) Ethernet E810 Adapter drivers",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-24504"
},
{
"category": "external",
"summary": "RHBZ#1930376",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1930376"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-24504",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24504"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-24504",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-24504"
},
{
"category": "external",
"summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00462.html",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00462.html"
}
],
"release_date": "2021-02-17T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T18:06:54+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4356"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: Uncontrolled resource consumption in some Intel(R) Ethernet E810 Adapter drivers"
},
{
"cve": "CVE-2020-24586",
"cwe": {
"id": "CWE-212",
"name": "Improper Removal of Sensitive Information Before Storage or Transfer"
},
"discovery_date": "2021-05-12T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1959642"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernels implementation of wifi fragmentation handling. An attacker with the ability to transmit within the wireless transmission range of an access point can abuse a flaw where previous contents of wifi fragments can be unintentionally transmitted to another device.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Fragmentation cache not cleared on reconnection",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-24586"
},
{
"category": "external",
"summary": "RHBZ#1959642",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1959642"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-24586",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24586"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-24586",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-24586"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-wireless/20210511200110.3f8290e59823.I622a67769ed39257327a362cfc09c812320eb979@changeid/",
"url": "https://lore.kernel.org/linux-wireless/20210511200110.3f8290e59823.I622a67769ed39257327a362cfc09c812320eb979@changeid/"
}
],
"release_date": "2021-05-12T01:20:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T18:06:54+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4356"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options does not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: Fragmentation cache not cleared on reconnection"
},
{
"cve": "CVE-2020-24587",
"cwe": {
"id": "CWE-345",
"name": "Insufficient Verification of Data Authenticity"
},
"discovery_date": "2021-05-12T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1959654"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel\u0027s WiFi implementation. An attacker within the wireless range can abuse a logic flaw in the WiFi implementation by reassembling packets from multiple fragments under different keys, treating them as valid. This flaw allows an attacker to send a fragment under an incorrect key, treating them as a valid fragment under the new key. The highest threat from this vulnerability is to confidentiality.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Reassembling fragments encrypted under different keys",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-24587"
},
{
"category": "external",
"summary": "RHBZ#1959654",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1959654"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-24587",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24587"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-24587",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-24587"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-wireless/20210511200110.3f8290e59823.I622a67769ed39257327a362cfc09c812320eb979@changeid/",
"url": "https://lore.kernel.org/linux-wireless/20210511200110.3f8290e59823.I622a67769ed39257327a362cfc09c812320eb979@changeid/"
}
],
"release_date": "2021-05-11T14:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T18:06:54+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4356"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options does not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "NONE",
"baseScore": 3.1,
"baseSeverity": "LOW",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: Reassembling fragments encrypted under different keys"
},
{
"cve": "CVE-2020-24588",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2021-05-12T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1959657"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernels wifi implementation. An attacker within wireless broadcast range can inject custom data into the wireless communication circumventing checks on the data. This can cause the frame to pass checks and be considered a valid frame of a different type.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: wifi frame payload being parsed incorrectly as an L2 frame",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-24588"
},
{
"category": "external",
"summary": "RHBZ#1959657",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1959657"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-24588",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24588"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-24588",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-24588"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-wireless/20210511200110.25d93176ddaf.I9e265b597f2cd23eb44573f35b625947b386a9de@changeid/",
"url": "https://lore.kernel.org/linux-wireless/20210511200110.25d93176ddaf.I9e265b597f2cd23eb44573f35b625947b386a9de@changeid/"
}
],
"release_date": "2021-05-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T18:06:54+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4356"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options does not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: wifi frame payload being parsed incorrectly as an L2 frame"
},
{
"cve": "CVE-2020-26139",
"cwe": {
"id": "CWE-829",
"name": "Inclusion of Functionality from Untrusted Control Sphere"
},
"discovery_date": "2021-05-12T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1959663"
}
],
"notes": [
{
"category": "description",
"text": "Frames used for authentication and key management between the AP and connected clients. Some clients may take these redirected frames masquerading as control mechanisms from the AP.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Forwarding EAPOL from unauthenticated wifi client",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-26139"
},
{
"category": "external",
"summary": "RHBZ#1959663",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1959663"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-26139",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26139"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-26139",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-26139"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-wireless/20210511200110.cb327ed0cabe.Ib7dcffa2a31f0913d660de65ba3c8aca75b1d10f@changeid/",
"url": "https://lore.kernel.org/linux-wireless/20210511200110.cb327ed0cabe.Ib7dcffa2a31f0913d660de65ba3c8aca75b1d10f@changeid/"
}
],
"release_date": "2021-05-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T18:06:54+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4356"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options does not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "NONE",
"baseScore": 3.5,
"baseSeverity": "LOW",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: Forwarding EAPOL from unauthenticated wifi client"
},
{
"cve": "CVE-2020-26140",
"cwe": {
"id": "CWE-346",
"name": "Origin Validation Error"
},
"discovery_date": "2021-05-07T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1960490"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in Linux kernel. Where the WiFi implementations accept plaintext frames in a protected WiFi network. An adversary can abuse this to inject arbitrary data frames independent of the network configuration.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: accepting plaintext data frames in protected networks",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-26140"
},
{
"category": "external",
"summary": "RHBZ#1960490",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1960490"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-26140",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26140"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-26140",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-26140"
}
],
"release_date": "2021-05-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T18:06:54+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4356"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: accepting plaintext data frames in protected networks"
},
{
"cve": "CVE-2020-26141",
"cwe": {
"id": "CWE-863",
"name": "Incorrect Authorization"
},
"discovery_date": "2021-05-07T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1960492"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in Linux kernel\u0027s WiFi implementation. An attacker within wireless range can inject a control packet fragment where the kernel does not verify the Message Integrity Check (authenticity) of fragmented TKIP frames.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: not verifying TKIP MIC of fragmented frames",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-26141"
},
{
"category": "external",
"summary": "RHBZ#1960492",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1960492"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-26141",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26141"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-26141",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-26141"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-wireless/20210511200110.c3f1d42c6746.I795593fcaae941c471425b8c7d5f7bb185d29142@changeid/",
"url": "https://lore.kernel.org/linux-wireless/20210511200110.c3f1d42c6746.I795593fcaae941c471425b8c7d5f7bb185d29142@changeid/"
}
],
"release_date": "2021-05-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T18:06:54+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4356"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options does not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: not verifying TKIP MIC of fragmented frames"
},
{
"cve": "CVE-2020-26143",
"cwe": {
"id": "CWE-346",
"name": "Origin Validation Error"
},
"discovery_date": "2021-05-07T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1960496"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in Linux kernel, where the WiFi implementations assemble fragments even though some of them were sent in plaintext. This vulnerability can be abused to inject packets and/or exfiltrate selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP data-confidentiality protocol is used.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: accepting fragmented plaintext frames in protected networks",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-26143"
},
{
"category": "external",
"summary": "RHBZ#1960496",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1960496"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-26143",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26143"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-26143",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-26143"
}
],
"release_date": "2021-05-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T18:06:54+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4356"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: accepting fragmented plaintext frames in protected networks"
},
{
"cve": "CVE-2020-26144",
"cwe": {
"id": "CWE-290",
"name": "Authentication Bypass by Spoofing"
},
"discovery_date": "2021-05-07T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1960498"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel, where the WiFi implementations accept plaintext A-MSDU frames as long as the first 8 bytes correspond to a valid RFC1042 (ex., LLC/SNAP) header for EAPOL. The highest threat from this vulnerability is to integrity.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: accepting unencrypted A-MSDU frames that start with RFC1042 header",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-26144"
},
{
"category": "external",
"summary": "RHBZ#1960498",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1960498"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-26144",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26144"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-26144",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-26144"
}
],
"release_date": "2021-05-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T18:06:54+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4356"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options does not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: accepting unencrypted A-MSDU frames that start with RFC1042 header"
},
{
"cve": "CVE-2020-26145",
"cwe": {
"id": "CWE-307",
"name": "Improper Restriction of Excessive Authentication Attempts"
},
"discovery_date": "2021-05-07T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1960500"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in ath10k_htt_rx_proc_rx_frag_ind_hl in drivers/net/wireless/ath/ath10k/htt_rx.c in the Linux kernel WiFi implementations, where it accepts a second (or subsequent) broadcast fragments even when sent in plaintext and then process them as full unfragmented frames. The highest threat from this vulnerability is to integrity.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: accepting plaintext broadcast fragments as full frames",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-26145"
},
{
"category": "external",
"summary": "RHBZ#1960500",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1960500"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-26145",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26145"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-26145",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-26145"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-wireless/20210511200110.9ca6ca7945a9.I1e18b514590af17c155bda86699bc3a971a8dcf4@changeid/",
"url": "https://lore.kernel.org/linux-wireless/20210511200110.9ca6ca7945a9.I1e18b514590af17c155bda86699bc3a971a8dcf4@changeid/"
}
],
"release_date": "2021-05-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T18:06:54+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4356"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options does not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: accepting plaintext broadcast fragments as full frames"
},
{
"cve": "CVE-2020-26146",
"cwe": {
"id": "CWE-307",
"name": "Improper Restriction of Excessive Authentication Attempts"
},
"discovery_date": "2021-05-07T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1960502"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in Linux kernel, where the WiFi implementation reassemble fragments with non-consecutive packet numbers. An adversary can abuse this to exfiltrate selected fragments. This vulnerability is exploitable when another device sends fragmented frames and the WEP, CCMP, or GCMP data-confidentiality protocol is used. Note that WEP is vulnerable to this attack by design.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: reassembling encrypted fragments with non-consecutive packet numbers",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-26146"
},
{
"category": "external",
"summary": "RHBZ#1960502",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1960502"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-26146",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26146"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-26146",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-26146"
}
],
"release_date": "2021-05-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T18:06:54+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4356"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: reassembling encrypted fragments with non-consecutive packet numbers"
},
{
"cve": "CVE-2020-26147",
"cwe": {
"id": "CWE-307",
"name": "Improper Restriction of Excessive Authentication Attempts"
},
"discovery_date": "2021-05-07T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1960504"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in ieee80211_rx_h_defragment in net/mac80211/rx.c in the Linux Kernel\u0027s WiFi implementation. This vulnerability can be abused to inject packets or exfiltrate selected fragments when another device sends fragmented frames, and the WEP, CCMP, or GCMP data-confidentiality protocol is used. The highest threat from this vulnerability is to integrity.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: reassembling mixed encrypted/plaintext fragments",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-26147"
},
{
"category": "external",
"summary": "RHBZ#1960504",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1960504"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-26147",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26147"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-26147",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-26147"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-wireless/20210511200110.30c4394bb835.I5acfdb552cc1d20c339c262315950b3eac491397@changeid/",
"url": "https://lore.kernel.org/linux-wireless/20210511200110.30c4394bb835.I5acfdb552cc1d20c339c262315950b3eac491397@changeid/"
}
],
"release_date": "2021-05-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T18:06:54+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4356"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options does not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:L/I:H/A:N",
"version": "3.1"
},
"products": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: reassembling mixed encrypted/plaintext fragments"
},
{
"acknowledgments": [
{
"names": [
"Daniel Axtens"
],
"organization": "IBM"
}
],
"cve": "CVE-2020-27777",
"cwe": {
"id": "CWE-862",
"name": "Missing Authorization"
},
"discovery_date": "2020-10-09T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1900844"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the way RTAS handled memory accesses in userspace to kernel communication. On a locked down (usually due to Secure Boot) guest system running on top of PowerVM or KVM hypervisors (pseries platform) a root like local user could use this flaw to further increase their privileges to that of a running kernel.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: powerpc: RTAS calls can be used to compromise kernel integrity",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue is rated as having Moderate impact due to the required privileges and hardware dependencies.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-27777"
},
{
"category": "external",
"summary": "RHBZ#1900844",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1900844"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-27777",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27777"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-27777",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-27777"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/powerpc/linux.git/commit/?h=next\u0026id=bd59380c5ba4147dcbaad3e582b55ccfd120b764",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/powerpc/linux.git/commit/?h=next\u0026id=bd59380c5ba4147dcbaad3e582b55ccfd120b764"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2020/10/09/1",
"url": "https://www.openwall.com/lists/oss-security/2020/10/09/1"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2020/11/23/2",
"url": "https://www.openwall.com/lists/oss-security/2020/11/23/2"
}
],
"release_date": "2020-10-08T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T18:06:54+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4356"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: powerpc: RTAS calls can be used to compromise kernel integrity"
},
{
"cve": "CVE-2020-29368",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2020-12-01T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1903244"
}
],
"notes": [
{
"category": "description",
"text": "An issue was discovered in __split_huge_pmd in mm/huge_memory.c in the Linux kernel. The copy-on-write implementation can grant unintended write access because of a race condition in a THP mapcount check.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: the copy-on-write implementation can grant unintended write access because of a race condition in a THP mapcount check",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw has been rated as having Moderateimpact because, based on Red Hat\u0027s assessment, this issue is hard to exploit in practice because the race window is too small for it to be reliable.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-29368"
},
{
"category": "external",
"summary": "RHBZ#1903244",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1903244"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-29368",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-29368"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-29368",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-29368"
}
],
"release_date": "2020-06-03T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T18:06:54+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4356"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: the copy-on-write implementation can grant unintended write access because of a race condition in a THP mapcount check"
},
{
"cve": "CVE-2020-29660",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2020-12-09T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1906522"
}
],
"notes": [
{
"category": "description",
"text": "A locking inconsistency issue was discovered in the tty subsystem of the Linux kernel. A local user could use this flaw to read numerical value from memory after free.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: locking inconsistency in drivers/tty/tty_io.c and drivers/tty/tty_jobctrl.c can lead to a read-after-free",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw is rated as having Low impact (Red Hat Enterprise Linux 7) because of the need to have CAP_SYS_TTY_CONFIG privileges.\n\nThis flaw is rated as having Moderate (Red Hat Enterprise Linux 8) impact because of the need to have CAP_SYS_TTY_CONFIG privileges. Red Hat Enterprise Linux 8 enabled unprivileged user/network namespaces by default which can be used to exercise this vulnerability.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-29660"
},
{
"category": "external",
"summary": "RHBZ#1906522",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1906522"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-29660",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-29660"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-29660",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-29660"
}
],
"release_date": "2020-12-04T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T18:06:54+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4356"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: locking inconsistency in drivers/tty/tty_io.c and drivers/tty/tty_jobctrl.c can lead to a read-after-free"
},
{
"cve": "CVE-2020-36158",
"cwe": {
"id": "CWE-120",
"name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)"
},
"discovery_date": "2021-01-05T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1913348"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel. The marvell wifi driver could allow a local attacker to execute arbitrary code via a long SSID value in mwifiex_cmd_802_11_ad_hoc_start function. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: buffer overflow in mwifiex_cmd_802_11_ad_hoc_start function in drivers/net/wireless/marvell/mwifiex/join.c via a long SSID value",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue is rated as having Moderate impact because the attacker needs to be local and privileged enough to be able to initiate ad-hoc WIFI network creation.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-36158"
},
{
"category": "external",
"summary": "RHBZ#1913348",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1913348"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-36158",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36158"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-36158",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-36158"
}
],
"release_date": "2020-12-08T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T18:06:54+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4356"
},
{
"category": "workaround",
"details": "To mitigate this issue, prevent the module mwifiex from being loaded. Please see https://access.redhat.com/solutions/41278 for information on how to blacklist a kernel module to prevent it from loading automatically.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: buffer overflow in mwifiex_cmd_802_11_ad_hoc_start function in drivers/net/wireless/marvell/mwifiex/join.c via a long SSID value"
},
{
"cve": "CVE-2020-36312",
"cwe": {
"id": "CWE-772",
"name": "Missing Release of Resource after Effective Lifetime"
},
"discovery_date": "2021-04-07T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1947991"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the KVM hypervisor of the Linux kernel. A memory leak could occur in kvm_io_bus_unregister_dev() upon a kmalloc failure. The highest threat from this vulnerability is to system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: memory leak upon a kmalloc failure in kvm_io_bus_unregister_dev function in virt/kvm/kvm_main.c",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-36312"
},
{
"category": "external",
"summary": "RHBZ#1947991",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1947991"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-36312",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36312"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-36312",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-36312"
}
],
"release_date": "2020-09-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T18:06:54+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4356"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 3.3,
"baseSeverity": "LOW",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: memory leak upon a kmalloc failure in kvm_io_bus_unregister_dev function in virt/kvm/kvm_main.c"
},
{
"cve": "CVE-2020-36386",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"discovery_date": "2021-06-07T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1969489"
}
],
"notes": [
{
"category": "description",
"text": "A flaw out of bounds memory access in the Linux kernel bluetooth subsystem was found in the way when some data being read about the bluetooth device with the hci_extended_inquiry_result_evt call. A local user could use this flaw to crash the system or read some data out of memory bounds that can lead to data confidentiality threat.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: slab out-of-bounds read in hci_extended_inquiry_result_evt() in net/bluetooth/hci_event.c",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw is rated as having a Moderate impact because even the data being read out of memory bounds is written to some cache, it was known before that this data from non-safe source and as result no any sensitive dependencies on this data.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-36386"
},
{
"category": "external",
"summary": "RHBZ#1969489",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1969489"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-36386",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36386"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-36386",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-36386"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=51c19bf3d5cfaa66571e4b88ba2a6f6295311101",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=51c19bf3d5cfaa66571e4b88ba2a6f6295311101"
}
],
"release_date": "2020-07-10T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T18:06:54+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4356"
},
{
"category": "workaround",
"details": "To mitigate this issue, prevent the module bluetooth from being loaded (if Bluetooth not required for the system). Please see https://access.redhat.com/solutions/41278 for information on how to blacklist a kernel module to prevent it from loading automatically.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: slab out-of-bounds read in hci_extended_inquiry_result_evt() in net/bluetooth/hci_event.c"
},
{
"cve": "CVE-2021-0129",
"cwe": {
"id": "CWE-287",
"name": "Improper Authentication"
},
"discovery_date": "2021-05-26T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1965038"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel. Improper access control in BlueZ may allow an authenticated user to potentially enable information disclosure via adjacent access. The highest threat from this vulnerability is to data confidentiality and integrity.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Improper access control in BlueZ may allow information disclosure vulnerability.",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-0129"
},
{
"category": "external",
"summary": "RHBZ#1965038",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965038"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-0129",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0129"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-0129",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-0129"
}
],
"release_date": "2021-06-08T03:30:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T18:06:54+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4356"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: Improper access control in BlueZ may allow information disclosure vulnerability."
},
{
"cve": "CVE-2021-3348",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2021-01-28T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1921958"
}
],
"notes": [
{
"category": "description",
"text": "A use after free flaw in the Linux kernel network block device (NBD) subsystem was found in the way user calls an ioctl NBD_SET_SOCK at a certain point during device setup.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Use-after-free in ndb_queue_rq() in drivers/block/nbd.c",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw is rated as having a Moderate impact because in the default configuration, the issue can only be triggered by a privileged local user (with access to the nbd device).",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-3348"
},
{
"category": "external",
"summary": "RHBZ#1921958",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1921958"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-3348",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3348"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3348",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3348"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-block/24dff677353e2e30a71d8b66c4dffdbdf77c4dbd.1611595239.git.josef@toxicpanda.com/",
"url": "https://lore.kernel.org/linux-block/24dff677353e2e30a71d8b66c4dffdbdf77c4dbd.1611595239.git.josef@toxicpanda.com/"
}
],
"release_date": "2021-01-28T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T18:06:54+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4356"
},
{
"category": "workaround",
"details": "To mitigate this issue, prevent the module nbd from being loaded. Please see https://access.redhat.com/solutions/41278 for information on how to blacklist a kernel module to prevent it from loading automatically.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: Use-after-free in ndb_queue_rq() in drivers/block/nbd.c"
},
{
"cve": "CVE-2021-3444",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2021-03-23T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1942667"
}
],
"notes": [
{
"category": "description",
"text": "An out-of-bounds access flaw was found in the Linux kernel\u0027s implementation of the eBPF code verifier in the way a user running the eBPF script uses mod32 destination register truncation when the source register was known to be 0. This flaw allows a local user to crash the system or possibly escalate their privileges. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: bpf verifier incorrect mod32 truncation",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw is rated as having Moderate impact because of the need to have elevated privileges or non-standard configuration for running BPF script.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-3444"
},
{
"category": "external",
"summary": "RHBZ#1942667",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1942667"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-3444",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3444"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3444",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3444"
}
],
"release_date": "2021-02-13T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T18:06:54+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4356"
},
{
"category": "workaround",
"details": "The default Red Hat Enterprise Linux kernel prevents unprivileged users from being able to use eBPF by the kernel.unprivileged_bpf_disabled sysctl. This would require a privileged user with CAP_SYS_ADMIN or root to be able to abuse this flaw reducing its attack space.\n\nFor the Red Hat Enterprise Linux 7 the eBPF for unprivileged users is always disabled.\nFor the Red Hat Enterprise Linux 8 to confirm the current state, inspect the sysctl with the command:\n\n# cat /proc/sys/kernel/unprivileged_bpf_disabled\n\nThe setting of 1 would mean that unprivileged users can not use eBPF, mitigating the flaw.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: bpf verifier incorrect mod32 truncation"
},
{
"acknowledgments": [
{
"names": [
"Ryota Shiga"
]
}
],
"cve": "CVE-2021-3489",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"discovery_date": "2021-05-11T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1959559"
}
],
"notes": [
{
"category": "description",
"text": "A flaw out of bound memory write in the Linux kernel BPF subsystem was found in the way user writes to BPF ring buffer too fast, so larger buffer than available memory could be allocated. A local user could use this flaw to crash the system or possibly escalate their privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Linux kernel eBPF RINGBUF map oversized allocation",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-3489"
},
{
"category": "external",
"summary": "RHBZ#1959559",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1959559"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-3489",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3489"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3489",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3489"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf.git/commit/?id=4b81ccebaeee885ab1aa1438133f2991e3a2b6ea",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf.git/commit/?id=4b81ccebaeee885ab1aa1438133f2991e3a2b6ea"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2021/05/11/10",
"url": "https://www.openwall.com/lists/oss-security/2021/05/11/10"
}
],
"release_date": "2021-05-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T18:06:54+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4356"
},
{
"category": "workaround",
"details": "The default Red Hat Enterprise Linux kernel prevents unprivileged users from being able to use eBPF by the kernel.unprivileged_bpf_disabled sysctl. This would require a privileged user with CAP_SYS_ADMIN or root to be able to abuse this flaw reducing its attack space.\n\nFor the Red Hat Enterprise Linux 7 the eBPF for unprivileged users is always disabled.\nFor the Red Hat Enterprise Linux 8 to confirm the current state, inspect the sysctl with the command:\n\n# cat /proc/sys/kernel/unprivileged_bpf_disabled\n\nThe setting of 1 would mean that unprivileged users can not use eBPF, mitigating the flaw.\n\nA kernel update will be required to mitigate the flaw for the root or users with CAP_SYS_ADMIN capabilities.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: Linux kernel eBPF RINGBUF map oversized allocation"
},
{
"acknowledgments": [
{
"names": [
"HaoXiong, LinMa"
],
"organization": "ckSec"
}
],
"cve": "CVE-2021-3564",
"cwe": {
"id": "CWE-415",
"name": "Double Free"
},
"discovery_date": "2021-05-19T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1964139"
}
],
"notes": [
{
"category": "description",
"text": "A flaw double-free memory corruption in the Linux kernel HCI device initialization subsystem was found in the way user attach malicious HCI TTY Bluetooth device. A local user could use this flaw to crash the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: double free in bluetooth subsystem when the HCI device initialization fails",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The impact is Moderate, because the double free happens during flush procedure, and no use of incorrect data during flush finishing even if double free could happen without kernel crash.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-3564"
},
{
"category": "external",
"summary": "RHBZ#1964139",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1964139"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-3564",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3564"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3564",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3564"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2021/05/25/1",
"url": "https://www.openwall.com/lists/oss-security/2021/05/25/1"
}
],
"release_date": "2021-05-25T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T18:06:54+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4356"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: double free in bluetooth subsystem when the HCI device initialization fails"
},
{
"cve": "CVE-2021-3573",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2021-05-31T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1966578"
}
],
"notes": [
{
"category": "description",
"text": "A flaw use-after-free in function hci_sock_bound_ioctl() of the Linux kernel HCI subsystem was found in the way user calls ioct HCIUNBLOCKADDR or other way triggers race condition of the call hci_unregister_dev() together with one of the calls hci_sock_blacklist_add(), hci_sock_blacklist_del(), hci_get_conn_info(), hci_get_auth_info(). A privileged local user could use this flaw to crash the system or escalate their privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: use-after-free in function hci_sock_bound_ioctl()",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue is rated as having a Moderate impact because of the privileges (CAP_NET_ADMIN in initial namespace) required for exploiting the issue.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-3573"
},
{
"category": "external",
"summary": "RHBZ#1966578",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1966578"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-3573",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3573"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3573",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3573"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/bluetooth/bluetooth.git/commit/?id=e305509e678b3a4af2b3cfd410f409f7cdaabb52",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/bluetooth/bluetooth.git/commit/?id=e305509e678b3a4af2b3cfd410f409f7cdaabb52"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2021/06/08/2",
"url": "https://www.openwall.com/lists/oss-security/2021/06/08/2"
}
],
"release_date": "2021-06-08T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T18:06:54+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4356"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising easThe required privileges is CAP_NET_ADMIN capabilities. This would require a privileged user with CAP_SYS_ADMIN or root to be able to abuse this flaw reducing its attack space.e of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: use-after-free in function hci_sock_bound_ioctl()"
},
{
"cve": "CVE-2021-3600",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2021-06-23T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1981954"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel\u2019s eBPF verification code, where the eBPF 32-bit div/mod source register truncation could lead to out-of-bounds reads and writes. By default, accessing the eBPF verifier is only possible to privileged users with CAP_SYS_ADMIN. This flaw allows a local user who can run eBPF instructions to crash the system or possibly escalate their privileges on the system. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: eBPF 32-bit source register truncation on div/mod",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-3600"
},
{
"category": "external",
"summary": "RHBZ#1981954",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1981954"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-3600",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3600"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3600",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3600"
},
{
"category": "external",
"summary": "https://lore.kernel.org/patchwork/patch/1379497/",
"url": "https://lore.kernel.org/patchwork/patch/1379497/"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2021/06/23/1",
"url": "https://www.openwall.com/lists/oss-security/2021/06/23/1"
}
],
"release_date": "2021-06-23T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T18:06:54+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4356"
},
{
"category": "workaround",
"details": "The default Red Hat Enterprise Linux kernel prevents unprivileged users from being able to use eBPF by the kernel.unprivileged_bpf_disabled sysctl. This would require a privileged user with CAP_SYS_ADMIN or root to be able to abuse this flaw reducing its attack space.\n\nFor the Red Hat Enterprise Linux 7 the eBPF for unprivileged users is always disabled.\nFor the Red Hat Enterprise Linux 8 to confirm the current state, inspect the sysctl with the command:\n\n# cat /proc/sys/kernel/unprivileged_bpf_disabled\n\nThe setting of 1 would mean that unprivileged users can not use eBPF, mitigating the flaw.\n\nA kernel update will be required to mitigate the flaw for the root or users with CAP_SYS_ADMIN capabilities.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: eBPF 32-bit source register truncation on div/mod"
},
{
"cve": "CVE-2021-3635",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"discovery_date": "2021-06-22T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1976946"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel netfilter implementation. A user with root (CAP_SYS_ADMIN) access is able to panic the system when issuing netfilter netflow commands",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: flowtable list del corruption with kernel BUG at lib/list_debug.c:50",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-3635"
},
{
"category": "external",
"summary": "RHBZ#1976946",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1976946"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-3635",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3635"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3635",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3635"
}
],
"release_date": "2021-08-06T04:47:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T18:06:54+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4356"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options does not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 4.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: flowtable list del corruption with kernel BUG at lib/list_debug.c:50"
},
{
"cve": "CVE-2021-3659",
"cwe": {
"id": "CWE-252",
"name": "Unchecked Return Value"
},
"discovery_date": "2021-05-14T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1975949"
}
],
"notes": [
{
"category": "description",
"text": "A NULL pointer dereference flaw was found in the Linux kernel\u2019s IEEE 802.15.4 wireless networking subsystem in the way the user closes the LR-WPAN connection. This flaw allows a local user to crash the system. The highest threat from this vulnerability is to system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: NULL pointer dereference in llsec_key_alloc() in net/mac802154/llsec.c",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-3659"
},
{
"category": "external",
"summary": "RHBZ#1975949",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1975949"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-3659",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3659"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3659",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3659"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=1165affd484889d4986cf3b724318935a0b120d8",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=1165affd484889d4986cf3b724318935a0b120d8"
}
],
"release_date": "2021-04-06T19:22:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T18:06:54+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4356"
},
{
"category": "workaround",
"details": "To mitigate this issue, prevent the module mac802154 from being loaded. Please see https://access.redhat.com/solutions/41278 for information on how to blacklist a kernel module to prevent it from loading automatically.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: NULL pointer dereference in llsec_key_alloc() in net/mac802154/llsec.c"
},
{
"acknowledgments": [
{
"names": [
"Haoran Luo"
],
"organization": "Chaitin Tech"
}
],
"cve": "CVE-2021-3679",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2021-07-25T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1989165"
}
],
"notes": [
{
"category": "description",
"text": "A lack of CPU resources in the Linux kernel tracing module functionality was found in the way users use the trace ring buffer in specific way. Only privileged local users (with CAP_SYS_ADMIN capability) could use this flaw to starve the resources causing denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: DoS in rb_per_cpu_empty()",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-3679"
},
{
"category": "external",
"summary": "RHBZ#1989165",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1989165"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-3679",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3679"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3679",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3679"
},
{
"category": "external",
"summary": "https://lore.kernel.org/lkml/20210723125527.767d1c18@oasis.local.home/",
"url": "https://lore.kernel.org/lkml/20210723125527.767d1c18@oasis.local.home/"
}
],
"release_date": "2021-07-20T09:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T18:06:54+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4356"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: DoS in rb_per_cpu_empty()"
},
{
"acknowledgments": [
{
"names": [
"Miklos Szeredi"
],
"organization": "Red Hat",
"summary": "This issue was discovered by Red Hat."
}
],
"cve": "CVE-2021-3732",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2021-08-12T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1995249"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel\u2019s OverlayFS subsystem in the way the user mounts the TmpFS filesystem with OverlayFS. This flaw allows a local user to gain access to hidden files that should not be accessible.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: overlayfs: Mounting overlayfs inside an unprivileged user namespace can reveal files",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-3732"
},
{
"category": "external",
"summary": "RHBZ#1995249",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1995249"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-3732",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3732"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3732",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3732"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=427215d85e8d",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=427215d85e8d"
}
],
"release_date": "2021-08-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T18:06:54+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4356"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 3.3,
"baseSeverity": "LOW",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: overlayfs: Mounting overlayfs inside an unprivileged user namespace can reveal files"
},
{
"cve": "CVE-2021-4442",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2024-08-29T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2308455"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntcp: add sanity tests to TCP_QUEUE_SEQ\n\nQingyu Li reported a syzkaller bug where the repro\nchanges RCV SEQ _after_ restoring data in the receive queue.\n\nmprotect(0x4aa000, 12288, PROT_READ) = 0\nmmap(0x1ffff000, 4096, PROT_NONE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x1ffff000\nmmap(0x20000000, 16777216, PROT_READ|PROT_WRITE|PROT_EXEC, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x20000000\nmmap(0x21000000, 4096, PROT_NONE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x21000000\nsocket(AF_INET6, SOCK_STREAM, IPPROTO_IP) = 3\nsetsockopt(3, SOL_TCP, TCP_REPAIR, [1], 4) = 0\nconnect(3, {sa_family=AF_INET6, sin6_port=htons(0), sin6_flowinfo=htonl(0), inet_pton(AF_INET6, \"::1\", \u0026sin6_addr), sin6_scope_id=0}, 28) = 0\nsetsockopt(3, SOL_TCP, TCP_REPAIR_QUEUE, [1], 4) = 0\nsendmsg(3, {msg_name=NULL, msg_namelen=0, msg_iov=[{iov_base=\"0x0000000000000003\\0\\0\", iov_len=20}], msg_iovlen=1, msg_controllen=0, msg_flags=0}, 0) = 20\nsetsockopt(3, SOL_TCP, TCP_REPAIR, [0], 4) = 0\nsetsockopt(3, SOL_TCP, TCP_QUEUE_SEQ, [128], 4) = 0\nrecvfrom(3, NULL, 20, 0, NULL, NULL) = -1 ECONNRESET (Connection reset by peer)\n\nsyslog shows:\n[ 111.205099] TCP recvmsg seq # bug 2: copied 80, seq 0, rcvnxt 80, fl 0\n[ 111.207894] WARNING: CPU: 1 PID: 356 at net/ipv4/tcp.c:2343 tcp_recvmsg_locked+0x90e/0x29a0\n\nThis should not be allowed. TCP_QUEUE_SEQ should only be used\nwhen queues are empty.\n\nThis patch fixes this case, and the tx path as well.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: tcp: add sanity tests to TCP_QUEUE_SEQ",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue is fixed in RHEL-8.5 and above\n~~~\nin (rhel-8.5, rhel-8.6, rhel-8.7, rhel-8.8, rhel-8.9, rhel-8.10) tcp: add sanity tests to TCP_QUEUE_SEQ\n~~~",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-4442"
},
{
"category": "external",
"summary": "RHBZ#2308455",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2308455"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-4442",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4442"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-4442",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-4442"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024082945-CVE-2021-4442-0a5f@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024082945-CVE-2021-4442-0a5f@gregkh/T"
}
],
"release_date": "2024-08-29T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T18:06:54+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4356"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: tcp: add sanity tests to TCP_QUEUE_SEQ"
},
{
"acknowledgments": [
{
"names": [
"Loris Reiff"
]
}
],
"cve": "CVE-2021-20194",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2020-12-30T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1912683"
}
],
"notes": [
{
"category": "description",
"text": "A flaw buffer overflow in the Linux kernel BPF subsystem was found in the way user running BPF script calling getsockopt. A local user could use this flaw to crash the system or possibly escalate their privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: heap overflow in __cgroup_bpf_run_filter_getsockopt()",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw is rated as having Moderate impact because of the need to have elevated privileges or non-standard configuration for running BPF script.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-20194"
},
{
"category": "external",
"summary": "RHBZ#1912683",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1912683"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-20194",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20194"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-20194",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-20194"
}
],
"release_date": "2021-01-22T10:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T18:06:54+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4356"
},
{
"category": "workaround",
"details": "The default Red Hat Enterprise Linux kernel prevents unprivileged users from being able to use eBPF by the kernel.unprivileged_bpf_disabled sysctl. This would require a privileged user with CAP_SYS_ADMIN or root to be able to abuse this flaw reducing its attack space.\n\nFor the Red Hat Enterprise Linux 7 the eBPF for unprivileged users is always disabled.\n\nFor the Red Hat Enterprise Linux 8 to confirm the current state, inspect the sysctl with the command:\n\n# cat /proc/sys/kernel/unprivileged_bpf_disabled\n\nThe setting of 1 would mean that unprivileged users can not use eBPF.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: heap overflow in __cgroup_bpf_run_filter_getsockopt()"
},
{
"cve": "CVE-2021-20239",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2021-02-01T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1923636"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the BPF protocol. This flaw allows an attacker with a local account to leak information about kernel internal addresses. The highest threat from this vulnerability is to confidentiality.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: setsockopt System Call Untrusted Pointer Dereference Information Disclosure",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-20239"
},
{
"category": "external",
"summary": "RHBZ#1923636",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1923636"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-20239",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20239"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-20239",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-20239"
}
],
"release_date": "2021-02-01T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T18:06:54+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4356"
},
{
"category": "workaround",
"details": "Loading a filter is a privileged (CAP_SYS_ADMIN or root) operation. Once any filter is used, this attack is capable of being used by an unprivileged user. There is no known mitigation that product security finds suitable for this flaw.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 3.8,
"baseSeverity": "LOW",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: setsockopt System Call Untrusted Pointer Dereference Information Disclosure"
},
{
"acknowledgments": [
{
"names": [
"Or Cohen"
],
"organization": "Palo Alto Networks"
}
],
"cve": "CVE-2021-23133",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2021-04-09T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1948772"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free flaw was found in the Linux kernel\u0027s SCTP socket functionality that triggers a race condition. This flaw allows a local user to escalate their privileges on the system. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Race condition in sctp_destroy_sock list_del",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue is rated as having a Moderate impact because of the privileges required for running the known reproducer. The required privileges are CAP_BPF and CAP_NET_ADMIN capabilities that are disabled by default in Red Hat Enterprise Linux 7. For Red Hat Enterprise Linux 8, the SCTP protocol itself is disabled by default and cannot be used by a user without enablement by an administrator.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-23133"
},
{
"category": "external",
"summary": "RHBZ#1948772",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1948772"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-23133",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23133"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-23133",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-23133"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=b166a20b07382b8bc1dcee2a448715c9c2c81b5b",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=b166a20b07382b8bc1dcee2a448715c9c2c81b5b"
}
],
"release_date": "2021-04-18T09:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T18:06:54+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4356"
},
{
"category": "workaround",
"details": "To mitigate this issue, prevent the module sctp from being loaded (and this is so by default for Red Hat Enterprise Linux 8). Please see https://access.redhat.com/solutions/41278 for information on how to blacklist a kernel module to prevent it from loading automatically.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: Race condition in sctp_destroy_sock list_del"
},
{
"cve": "CVE-2021-28950",
"cwe": {
"id": "CWE-835",
"name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)"
},
"discovery_date": "2021-03-22T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1941762"
}
],
"notes": [
{
"category": "description",
"text": "A denial of service in the kernel side of the FUSE functionality can allow a local system to create a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: fuse: stall on CPU can occur because a retry loop continually finds the same bad inode",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-28950"
},
{
"category": "external",
"summary": "RHBZ#1941762",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1941762"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-28950",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-28950"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-28950",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-28950"
}
],
"release_date": "2021-03-04T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T18:06:54+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4356"
},
{
"category": "workaround",
"details": "As the FUSE module will be auto-loaded when required, its use can be disabled by preventing the module from loading with the following instructions:\n\n# echo \"install fuse /bin/true\" \u003e\u003e /etc/modprobe.d/disable-fuse.conf\n\nThe system will need to be restarted if the FUSE modules are loaded. In most circumstances, the CIFS kernel modules will be unable to be unloaded while the FUSE filesystems are in use.\n\nIf the system requires this module to work correctly, this mitigation may not be suitable.\n\nIf you need further assistance, see KCS article https://access.redhat.com/solutions/41278 or contact Red Hat Global Support Services.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: fuse: stall on CPU can occur because a retry loop continually finds the same bad inode"
},
{
"cve": "CVE-2021-28971",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"discovery_date": "2021-03-22T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1941784"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel. On some Haswell CPUs, userspace applications (such as perf-fuzzer) can cause a system crash because the PEBS status in a PEBS record is mishandled.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: System crash in intel_pmu_drain_pebs_nhm in arch/x86/events/intel/ds.c",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-28971"
},
{
"category": "external",
"summary": "RHBZ#1941784",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1941784"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-28971",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-28971"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-28971",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-28971"
}
],
"release_date": "2021-03-22T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T18:06:54+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4356"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options does not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: System crash in intel_pmu_drain_pebs_nhm in arch/x86/events/intel/ds.c"
},
{
"cve": "CVE-2021-29155",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"discovery_date": "2021-04-18T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1951595"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was discovered in retrieve_ptr_limit in kernel/bpf/verifier.c in the Linux kernel mechanism to mitigate speculatively out-of-bounds loads (Spectre mitigation). In this flaw a local, special user privileged (CAP_SYS_ADMIN) BPF program running on affected systems may bypass the protection, and execute speculatively out-of-bounds loads from the kernel memory. This can be abused to extract contents of kernel memory via side-channel.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: protection for sequences of pointer arithmetic operations against speculatively out-of-bounds loads can be bypassed to leak content of kernel memory",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-29155"
},
{
"category": "external",
"summary": "RHBZ#1951595",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1951595"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-29155",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29155"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-29155",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-29155"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2021/04/18/4",
"url": "https://www.openwall.com/lists/oss-security/2021/04/18/4"
}
],
"release_date": "2021-04-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T18:06:54+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4356"
},
{
"category": "workaround",
"details": "The default Red Hat Enterprise Linux kernel prevents unprivileged users from being able to use eBPF by the kernel.unprivileged_bpf_disabled sysctl. This would require a privileged user with CAP_SYS_ADMIN or root to be able to abuse this flaw reducing its attack space.\n\nFor the Red Hat Enterprise Linux 7 the eBPF for unprivileged users is always disabled.\nFor the Red Hat Enterprise Linux 8 to confirm the current state, inspect the sysctl with the command:\n\n# cat /proc/sys/kernel/unprivileged_bpf_disabled\n\nThe setting of 1 would mean that unprivileged users can not use eBPF, mitigating the flaw.\n\nA kernel update will be required to mitigate the flaw for the root or users with CAP_SYS_ADMIN capabilities.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: protection for sequences of pointer arithmetic operations against speculatively out-of-bounds loads can be bypassed to leak content of kernel memory"
},
{
"cve": "CVE-2021-29646",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2021-03-30T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1945345"
}
],
"notes": [
{
"category": "description",
"text": "A flaw buffer overflow in the Linux kernel TIPC protocol functionality was found in the way user uses protocol with encryption enabled. A local user could use this flaw to crash the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: improper input validation in tipc_nl_retrieve_key function in net/tipc/node.c",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-29646"
},
{
"category": "external",
"summary": "RHBZ#1945345",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1945345"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-29646",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29646"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-29646",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-29646"
}
],
"release_date": "2021-03-15T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T18:06:54+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4356"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: improper input validation in tipc_nl_retrieve_key function in net/tipc/node.c"
},
{
"cve": "CVE-2021-29650",
"cwe": {
"id": "CWE-662",
"name": "Improper Synchronization"
},
"discovery_date": "2021-03-30T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1945388"
}
],
"notes": [
{
"category": "description",
"text": "A denial-of-service (DoS) flaw was identified in the Linux kernel due to an incorrect memory barrier in xt_replace_table in net/netfilter/x_tables.c in the netfilter subsystem.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: lack a full memory barrier upon the assignment of a new table value in net/netfilter/x_tables.c and include/linux/netfilter/x_tables.h may lead to DoS",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-29650"
},
{
"category": "external",
"summary": "RHBZ#1945388",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1945388"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-29650",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29650"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-29650",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-29650"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=175e476b8cdf2a4de7432583b49c871345e4f8a1",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=175e476b8cdf2a4de7432583b49c871345e4f8a1"
}
],
"release_date": "2021-03-15T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T18:06:54+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4356"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: lack a full memory barrier upon the assignment of a new table value in net/netfilter/x_tables.c and include/linux/netfilter/x_tables.h may lead to DoS"
},
{
"cve": "CVE-2021-29657",
"cwe": {
"id": "CWE-367",
"name": "Time-of-check Time-of-use (TOCTOU) Race Condition"
},
"discovery_date": "2021-08-18T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1995153"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel. A KVM guest on AMD can launch a nested guest without the Intercept VMRUN control bit by exploiting a TOCTOU vulnerability in nested_svm_vmrun. A malicious guest could use this flaw to gain unrestricted access to host MSRs, possibly leading to guest-to-host escape scenario.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: KVM: double fetch in nested_svm_vmrun can lead to unrestricted MSR access",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The nested virtualization feature is not enabled by default up to Red Hat Enterprise Linux 8.4. Most importantly, Red Hat currently provides nested virtualization only as a Technology Preview, and is therefore unsupported for production use. For additional details please see https://access.redhat.com/solutions/21101 and https://access.redhat.com/support/offerings/techpreview.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-29657"
},
{
"category": "external",
"summary": "RHBZ#1995153",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1995153"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-29657",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29657"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-29657",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-29657"
},
{
"category": "external",
"summary": "https://bugs.chromium.org/p/project-zero/issues/detail?id=2177",
"url": "https://bugs.chromium.org/p/project-zero/issues/detail?id=2177"
}
],
"release_date": "2021-03-31T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T18:06:54+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4356"
},
{
"category": "workaround",
"details": "This vulnerability can be mitigated by disabling the nested virtualization feature:\n```\n# modprobe -r kvm_amd\n# modprobe kvm_amd nested=0\n```",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: KVM: double fetch in nested_svm_vmrun can lead to unrestricted MSR access"
},
{
"acknowledgments": [
{
"names": [
"Manfred Paul"
],
"organization": "RedRocket CTF team"
}
],
"cve": "CVE-2021-31440",
"cwe": {
"id": "CWE-682",
"name": "Incorrect Calculation"
},
"discovery_date": "2021-05-21T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1964028"
}
],
"notes": [
{
"category": "description",
"text": "An out-of-bounds access flaw was found in the Linux kernel\u2019s implementation of the eBPF code verifier, where an incorrect register bounds calculation while checking unsigned 32-bit instructions in an eBPF program occurs.. By default accessing the eBPF verifier is only accessible to privileged users with CAP_SYS_ADMIN. The issue results from the lack of proper validation of user-supplied eBPF programs prior to executing them. A local user could use this flaw to crash the system or possibly escalate their privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: local escalation of privileges in handling of eBPF programs",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-31440"
},
{
"category": "external",
"summary": "RHBZ#1964028",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1964028"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-31440",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-31440"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-31440",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-31440"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=10bf4e83167cc68595b85fd73bb91e8f2c086e36",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=10bf4e83167cc68595b85fd73bb91e8f2c086e36"
},
{
"category": "external",
"summary": "https://www.zerodayinitiative.com/blog/2021/5/26/cve-2021-31440-an-incorrect-bounds-calculation-in-the-linux-kernel-ebpf-verifier",
"url": "https://www.zerodayinitiative.com/blog/2021/5/26/cve-2021-31440-an-incorrect-bounds-calculation-in-the-linux-kernel-ebpf-verifier"
}
],
"release_date": "2021-05-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T18:06:54+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4356"
},
{
"category": "workaround",
"details": "The default Red Hat Enterprise Linux kernel prevents unprivileged users from being able to use eBPF by the kernel.unprivileged_bpf_disabled sysctl. This would require a privileged user with CAP_SYS_ADMIN or root to be able to abuse this flaw reducing its attack space.\n\nFor the Red Hat Enterprise Linux 7 the eBPF for unprivileged users is always disabled.\nFor the Red Hat Enterprise Linux 8 to confirm the current state, inspect the sysctl with the command:\n\n# cat /proc/sys/kernel/unprivileged_bpf_disabled\n\nThe setting of 1 would mean that unprivileged users can not use eBPF, mitigating the flaw.\n\nA kernel update will be required to mitigate the flaw for the root or users with CAP_SYS_ADMIN capabilities.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: local escalation of privileges in handling of eBPF programs"
},
{
"cve": "CVE-2021-31829",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2021-05-04T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1957788"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel\u0027s eBPF verification code. By default, accessing the eBPF verifier is only accessible to privileged users with CAP_SYS_ADMIN. This flaw allows a local user who can insert eBPF instructions, to use the eBPF verifier to abuse a spectre-like flaw and infer all system memory. The highest threat from this vulnerability is to confidentiality.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: protection of stack pointer against speculative pointer arithmetic can be bypassed to leak content of kernel memory",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-31829"
},
{
"category": "external",
"summary": "RHBZ#1957788",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1957788"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-31829",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-31829"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-31829",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-31829"
}
],
"release_date": "2021-04-30T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T18:06:54+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4356"
},
{
"category": "workaround",
"details": "The default Red Hat Enterprise Linux kernel prevents unprivileged users from being able to use eBPF by the kernel.unprivileged_bpf_disabled sysctl. This would require a privileged user with CAP_SYS_ADMIN or root to be able to abuse this flaw reducing its attack space.\n\nFor the Red Hat Enterprise Linux 7 and 8 kernel to confirm the current state, inspect the sysctl with the command:\n\n# cat /proc/sys/kernel/unprivileged_bpf_disabled\n\nThe setting of 1 would mean that unprivileged users can not use eBPF, mitigating the flaw.\n\nA kernel update will be required to mitigate the flaw for the root or users with CAP_SYS_ADMIN capabilities.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: protection of stack pointer against speculative pointer arithmetic can be bypassed to leak content of kernel memory"
},
{
"cve": "CVE-2021-31916",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2021-03-29T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1946965"
}
],
"notes": [
{
"category": "description",
"text": "An out-of-bounds (OOB) memory write flaw was found in list_devices in drivers/md/dm-ioctl.c in the Multi-device driver module in the Linux kernel. A bound check failure allows an attacker with special user (CAP_SYS_ADMIN) privilege to gain access to out-of-bounds memory leading to a system crash, a leak of internal kernel information, or a privilege escalation problem.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: out of bounds array access in drivers/md/dm-ioctl.c",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw is rated a Low impact because in the default configuration, the issue can only be triggered by a privileged local user.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-31916"
},
{
"category": "external",
"summary": "RHBZ#1946965",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1946965"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-31916",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-31916"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-31916",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-31916"
},
{
"category": "external",
"summary": "https://github.com/torvalds/linux/commit/4edbe1d7bcffcd6269f3b5eb63f710393ff2ec7a",
"url": "https://github.com/torvalds/linux/commit/4edbe1d7bcffcd6269f3b5eb63f710393ff2ec7a"
},
{
"category": "external",
"summary": "https://seclists.org/oss-sec/2021/q1/268",
"url": "https://seclists.org/oss-sec/2021/q1/268"
}
],
"release_date": "2021-03-29T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T18:06:54+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4356"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: out of bounds array access in drivers/md/dm-ioctl.c"
},
{
"cve": "CVE-2021-33033",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2021-05-14T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1961300"
}
],
"notes": [
{
"category": "description",
"text": "A flaw use-after-free in the Linux kernel CIPSO network packet labeling protocol functionality was found in the way user open local network connection with the usage of the security labeling that is IP option number 134. A local user could use this flaw to crash the system or possibly escalate their privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: use-after-free in cipso_v4_genopt in net/ipv4/cipso_ipv4.c",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Considered to be Moderate rate, because by default CIPSO non-enabled and both no known way to reproduce the attack remotely and both it looks complex if even possible to use the attack in any way apart from crashing the system. For the usage of the inbound CIPSO connections, the administrator have to enable it with netlabelctl utility first. The vulnerability is considered to be for local user, because it can happen only when a local user opens a socket for sending packets, but not during receiving packets.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-33033"
},
{
"category": "external",
"summary": "RHBZ#1961300",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1961300"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-33033",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33033"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-33033",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33033"
}
],
"release_date": "2021-03-04T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T18:06:54+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4356"
},
{
"category": "workaround",
"details": "The mitigation would be not allowing CIPSO labeling for the inbound network connections. For the most of the default configurations both for network routers and for the Linux servers itself it is disabled by default.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: use-after-free in cipso_v4_genopt in net/ipv4/cipso_ipv4.c"
},
{
"cve": "CVE-2021-33098",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2021-11-17T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2068236"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel. This flaw allows an attacker who can modify the MTU of a virtualized PCIe device (in a guest, for example) to crash the host system\u2019s kernel if they set the MTU of the VF device to an unsupported value.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Improper input validation in the Intel(R) Ethernet ixgbe driver may allow an authenticated user to potentially enable DoS via local access",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-33098"
},
{
"category": "external",
"summary": "RHBZ#2068236",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2068236"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-33098",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33098"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-33098",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33098"
}
],
"release_date": "2021-11-09T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T18:06:54+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4356"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options does not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: Improper input validation in the Intel(R) Ethernet ixgbe driver may allow an authenticated user to potentially enable DoS via local access"
},
{
"cve": "CVE-2021-33200",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2021-05-27T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1965458"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in kernel/bpf/verifier.c in BPF in the Linux kernel. An incorrect limit is enforced for pointer arithmetic operations which can be abused to perform out-of-bounds reads and writes in kernel memory, leading to local privilege escalation. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: out-of-bounds reads and writes due to enforcing incorrect limits for pointer arithmetic operations by BPF verifier",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-33200"
},
{
"category": "external",
"summary": "RHBZ#1965458",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965458"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-33200",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33200"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-33200",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33200"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf.git/patch/?id=3d0220f6861d713213b015b582e9f21e5b28d2e0",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf.git/patch/?id=3d0220f6861d713213b015b582e9f21e5b28d2e0"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf.git/patch/?id=a7036191277f9fa68d92f2071ddc38c09b1e5ee5",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf.git/patch/?id=a7036191277f9fa68d92f2071ddc38c09b1e5ee5"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf.git/patch/?id=bb01a1bba579b4b1c5566af24d95f1767859771e",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf.git/patch/?id=bb01a1bba579b4b1c5566af24d95f1767859771e"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2021/05/27/1",
"url": "https://www.openwall.com/lists/oss-security/2021/05/27/1"
}
],
"release_date": "2021-05-26T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T18:06:54+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4356"
},
{
"category": "workaround",
"details": "The default Red Hat Enterprise Linux kernel prevents unprivileged users from being able to use eBPF by the kernel.unprivileged_bpf_disabled sysctl. This would require a privileged user with CAP_SYS_ADMIN or root to be able to abuse this flaw reducing its attack space.\n\nFor the Red Hat Enterprise Linux 7 the eBPF for unprivileged users is always disabled.\nFor the Red Hat Enterprise Linux 8 to confirm the current state, inspect the sysctl with the command:\n\n# cat /proc/sys/kernel/unprivileged_bpf_disabled\n\nThe setting of 1 would mean that unprivileged users can not use eBPF, mitigating the flaw.\n\nA kernel update will be required to mitigate the flaw for the root or users with CAP_SYS_ADMIN capabilities.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: out-of-bounds reads and writes due to enforcing incorrect limits for pointer arithmetic operations by BPF verifier"
},
{
"cve": "CVE-2021-46905",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"discovery_date": "2024-02-27T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2266253"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in the Linux kernel. This flaw occurs due to an unconditional NULL-pointer dereference on every disconnect in the Linux kernel.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: NULL-deref on disconnect regression",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-46905"
},
{
"category": "external",
"summary": "RHBZ#2266253",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2266253"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-46905",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46905"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-46905",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-46905"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024022557-CVE-2021-46905-6507@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024022557-CVE-2021-46905-6507@gregkh/T"
}
],
"release_date": "2024-02-26T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T18:06:54+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4356"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: NULL-deref on disconnect regression"
},
{
"cve": "CVE-2021-46983",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"discovery_date": "2024-02-28T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2266906"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in an error-handling function in the Linux kernel\u0027s NVMe driver. This flaw allows an attacker with control over NVMe links to cause a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: nvmet-rdma: Fix NULL deref when SEND is completed with error",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-46983"
},
{
"category": "external",
"summary": "RHBZ#2266906",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2266906"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-46983",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46983"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-46983",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-46983"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024022824-CVE-2021-46983-f808@gregkh/T/#u",
"url": "https://lore.kernel.org/linux-cve-announce/2024022824-CVE-2021-46983-f808@gregkh/T/#u"
}
],
"release_date": "2024-02-28T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T18:06:54+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4356"
},
{
"category": "workaround",
"details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: nvmet-rdma: Fix NULL deref when SEND is completed with error"
},
{
"cve": "CVE-2021-47011",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2024-02-28T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2266847"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmm: memcontrol: slab: fix obtain a reference to a freeing memcg\n\nPatch series \"Use obj_cgroup APIs to charge kmem pages\", v5.\n\nSince Roman\u0027s series \"The new cgroup slab memory controller\" applied.\nAll slab objects are charged with the new APIs of obj_cgroup. The new\nAPIs introduce a struct obj_cgroup to charge slab objects. It prevents\nlong-living objects from pinning the original memory cgroup in the\nmemory. But there are still some corner objects (e.g. allocations\nlarger than order-1 page on SLUB) which are not charged with the new\nAPIs. Those objects (include the pages which are allocated from buddy\nallocator directly) are charged as kmem pages which still hold a\nreference to the memory cgroup.\n\nE.g. We know that the kernel stack is charged as kmem pages because the\nsize of the kernel stack can be greater than 2 pages (e.g. 16KB on\nx86_64 or arm64). If we create a thread (suppose the thread stack is\ncharged to memory cgroup A) and then move it from memory cgroup A to\nmemory cgroup B. Because the kernel stack of the thread hold a\nreference to the memory cgroup A. The thread can pin the memory cgroup\nA in the memory even if we remove the cgroup A. If we want to see this\nscenario by using the following script. We can see that the system has\nadded 500 dying cgroups (This is not a real world issue, just a script\nto show that the large kmallocs are charged as kmem pages which can pin\nthe memory cgroup in the memory).\n\n\t#!/bin/bash\n\n\tcat /proc/cgroups | grep memory\n\n\tcd /sys/fs/cgroup/memory\n\techo 1 \u003e memory.move_charge_at_immigrate\n\n\tfor i in range{1..500}\n\tdo\n\t\tmkdir kmem_test\n\t\techo $$ \u003e kmem_test/cgroup.procs\n\t\tsleep 3600 \u0026\n\t\techo $$ \u003e cgroup.procs\n\t\techo `cat kmem_test/cgroup.procs` \u003e cgroup.procs\n\t\trmdir kmem_test\n\tdone\n\n\tcat /proc/cgroups | grep memory\n\nThis patchset aims to make those kmem pages to drop the reference to\nmemory cgroup by using the APIs of obj_cgroup. Finally, we can see that\nthe number of the dying cgroups will not increase if we run the above test\nscript.\n\nThis patch (of 7):\n\nThe rcu_read_lock/unlock only can guarantee that the memcg will not be\nfreed, but it cannot guarantee the success of css_get (which is in the\nrefill_stock when cached memcg changed) to memcg.\n\n rcu_read_lock()\n memcg = obj_cgroup_memcg(old)\n __memcg_kmem_uncharge(memcg)\n refill_stock(memcg)\n if (stock-\u003ecached != memcg)\n // css_get can change the ref counter from 0 back to 1.\n css_get(\u0026memcg-\u003ecss)\n rcu_read_unlock()\n\nThis fix is very like the commit:\n\n eefbfa7fd678 (\"mm: memcg/slab: fix use after free in obj_cgroup_charge\")\n\nFix this by holding a reference to the memcg which is passed to the\n__memcg_kmem_uncharge() before calling __memcg_kmem_uncharge().",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: mm: memcontrol: slab: fix obtain a reference to a freeing memcg",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-47011"
},
{
"category": "external",
"summary": "RHBZ#2266847",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2266847"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-47011",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47011"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-47011",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-47011"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024022831-CVE-2021-47011-5b75@gregkh/T/#u",
"url": "https://lore.kernel.org/linux-cve-announce/2024022831-CVE-2021-47011-5b75@gregkh/T/#u"
}
],
"release_date": "2024-02-28T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T18:06:54+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4356"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: mm: memcontrol: slab: fix obtain a reference to a freeing memcg"
},
{
"cve": "CVE-2021-47080",
"cwe": {
"id": "CWE-369",
"name": "Divide By Zero"
},
"discovery_date": "2024-03-01T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2267533"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nRDMA/core: Prevent divide-by-zero error triggered by the user\n\nThe user_entry_size is supplied by the user and later used as a\ndenominator to calculate number of entries. The zero supplied by the user\nwill trigger the following divide-by-zero error:\n\n divide error: 0000 [#1] SMP KASAN PTI\n CPU: 4 PID: 497 Comm: c_repro Not tainted 5.13.0-rc1+ #281\n Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.13.0-0-gf21b5a4aeb02-prebuilt.qemu.org 04/01/2014\n RIP: 0010:ib_uverbs_handler_UVERBS_METHOD_QUERY_GID_TABLE+0x1b1/0x510\n Code: 87 59 03 00 00 e8 9f ab 1e ff 48 8d bd a8 00 00 00 e8 d3 70 41 ff 44 0f b7 b5 a8 00 00 00 e8 86 ab 1e ff 31 d2 4c 89 f0 31 ff \u003c49\u003e f7 f5 48 89 d6 48 89 54 24 10 48 89 04 24 e8 1b ad 1e ff 48 8b\n RSP: 0018:ffff88810416f828 EFLAGS: 00010246\n RAX: 0000000000000008 RBX: 1ffff1102082df09 RCX: ffffffff82183f3d\n RDX: 0000000000000000 RSI: ffff888105f2da00 RDI: 0000000000000000\n RBP: ffff88810416fa98 R08: 0000000000000001 R09: ffffed102082df5f\n R10: ffff88810416faf7 R11: ffffed102082df5e R12: 0000000000000000\n R13: 0000000000000000 R14: 0000000000000008 R15: ffff88810416faf0\n FS: 00007f5715efa740(0000) GS:ffff88811a700000(0000) knlGS:0000000000000000\n CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n CR2: 0000000020000840 CR3: 000000010c2e0001 CR4: 0000000000370ea0\n DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\n DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\n Call Trace:\n ? ib_uverbs_handler_UVERBS_METHOD_INFO_HANDLES+0x4b0/0x4b0\n ib_uverbs_cmd_verbs+0x1546/0x1940\n ib_uverbs_ioctl+0x186/0x240\n __x64_sys_ioctl+0x38a/0x1220\n do_syscall_64+0x3f/0x80\n entry_SYSCALL_64_after_hwframe+0x44/0xae",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: RDMA/core: Prevent divide-by-zero error triggered by the user",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-47080"
},
{
"category": "external",
"summary": "RHBZ#2267533",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2267533"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-47080",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47080"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-47080",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-47080"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024030142-CVE-2021-47080-eb20@gregkh/T/#u",
"url": "https://lore.kernel.org/linux-cve-announce/2024030142-CVE-2021-47080-eb20@gregkh/T/#u"
}
],
"release_date": "2024-03-01T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T18:06:54+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4356"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: RDMA/core: Prevent divide-by-zero error triggered by the user"
},
{
"cve": "CVE-2022-20166",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2022-08-29T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2122089"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel\u2019s sysfs layer. This flaw allows a local user who can read files under the /sysfs mount point to corrupt memory or possibly crash the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: possible buffer overflow in sysfs reading",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-20166"
},
{
"category": "external",
"summary": "RHBZ#2122089",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2122089"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-20166",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-20166"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-20166",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-20166"
}
],
"release_date": "2022-08-15T14:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T18:06:54+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4356"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options does not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: possible buffer overflow in sysfs reading"
},
{
"cve": "CVE-2022-50042",
"cwe": {
"id": "CWE-401",
"name": "Missing Release of Memory after Effective Lifetime"
},
"discovery_date": "2025-06-18T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2373691"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the netlink driver in the Linux kernel. A memory leak can occur when allocated memory is not released in certain error cases, potentially impacting system performance and resulting in a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: net: genl: fix error path memory leak in policy dumping",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue has been fixed in Red Hat Enterprise Linux 8.5, 9.2 and 9.3 via RHSA-2021:4356 [1], RHSA-2023:7370 [2] and RHSA-2023:6583 [3], respectively.\n\n[1]. https://access.redhat.com/errata/RHSA-2021:4356\n\n[2]. https://access.redhat.com/errata/RHSA-2023:7370\n\n[3]. https://access.redhat.com/errata/RHSA-2023:6583",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-50042"
},
{
"category": "external",
"summary": "RHBZ#2373691",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2373691"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-50042",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50042"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-50042",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-50042"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2025061843-CVE-2022-50042-7d6f@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2025061843-CVE-2022-50042-7d6f@gregkh/T"
}
],
"release_date": "2025-06-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T18:06:54+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4356"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: net: genl: fix error path memory leak in policy dumping"
},
{
"cve": "CVE-2022-50073",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"discovery_date": "2025-06-18T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2373494"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the tap module in the Linux kernel. A NULL pointer dereference can be triggered due to a missing initialization, resulting in a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: net: tap: NULL pointer derefence in dev_parse_header_protocol when skb-\u003edev is null",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue has been fixed in Red Hat Enterprise Linux 8.5 and 9.5 via RHSA-2021:4356 [1] and RHSA-2024:9315 [2], respectively.\n\n[1]. https://access.redhat.com/errata/RHSA-2021:4356\n\n[2]. https://access.redhat.com/errata/RHSA-2024:9315",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-50073"
},
{
"category": "external",
"summary": "RHBZ#2373494",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2373494"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-50073",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50073"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-50073",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-50073"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2025061854-CVE-2022-50073-7199@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2025061854-CVE-2022-50073-7199@gregkh/T"
}
],
"release_date": "2025-06-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T18:06:54+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4356"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: net: tap: NULL pointer derefence in dev_parse_header_protocol when skb-\u003edev is null"
},
{
"cve": "CVE-2023-53598",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2025-10-04T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2401500"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbus: mhi: host: Range check CHDBOFF and ERDBOFF\n\nIf the value read from the CHDBOFF and ERDBOFF registers is outside the\nrange of the MHI register space then an invalid address might be computed\nwhich later causes a kernel panic. Range check the read value to prevent\na crash due to bad data from the device.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: bus: mhi: host: Range check CHDBOFF and ERDBOFF",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "MHI devices communicate channel configuration through doorbell offset values (CHDBOFF and ERDBOFF) that index into the device\u0027s register space. The driver reads these offsets from device memory during initialization but historically failed to validate that they fall within legitimate bounds. A malicious device\u2014or a legitimate device with corrupted firmware\u2014can supply offset values that point outside the allocated channel context array. When the driver attempts to use these offsets, it accesses arbitrary kernel memory, typically triggering an immediate panic. Physical access is generally required to connect a malicious device, though in some cases (like M.2 modems) a compromised device firmware could supply bad values.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-53598"
},
{
"category": "external",
"summary": "RHBZ#2401500",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2401500"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-53598",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53598"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-53598",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-53598"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2025100429-CVE-2023-53598-cbd8@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2025100429-CVE-2023-53598-cbd8@gregkh/T"
}
],
"release_date": "2025-10-04T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T18:06:54+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4356"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: bus: mhi: host: Range check CHDBOFF and ERDBOFF"
}
]
}
rhsa-2021:4140
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel-rt is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.\n\nSecurity Fix(es):\n* kernel: out-of-bounds reads in pinctrl subsystem. (CVE-2020-0427)\n* kernel: Improper input validation in some Intel(R) Ethernet E810 Adapter drivers (CVE-2020-24502)\n* kernel: Insufficient access control in some Intel(R) Ethernet E810 Adapter drivers (CVE-2020-24503)\n* kernel: Uncontrolled resource consumption in some Intel(R) Ethernet E810 Adapter drivers (CVE-2020-24504)\n* kernel: Fragmentation cache not cleared on reconnection (CVE-2020-24586)\n* kernel: Reassembling fragments encrypted under different keys (CVE-2020-24587)\n* kernel: wifi frame payload being parsed incorrectly as an L2 frame (CVE-2020-24588)\n* kernel: Forwarding EAPOL from unauthenticated wifi client (CVE-2020-26139)\n* kernel: accepting plaintext data frames in protected networks (CVE-2020-26140)\n* kernel: not verifying TKIP MIC of fragmented frames (CVE-2020-26141)\n* kernel: accepting fragmented plaintext frames in protected networks (CVE-2020-26143)\n* kernel: accepting unencrypted A-MSDU frames that start with RFC1042 header (CVE-2020-26144)\n* kernel: accepting plaintext broadcast fragments as full frames (CVE-2020-26145)\n* kernel: locking inconsistency in tty_io.c and tty_jobctrl.c can lead to a read-after-free (CVE-2020-29660)\n* kernel: buffer overflow in mwifiex_cmd_802_11_ad_hoc_start function via a long SSID value (CVE-2020-36158)\n* kernel: slab out-of-bounds read in hci_extended_inquiry_result_evt() (CVE-2020-36386)\n* kernel: Improper access control in BlueZ may allow information disclosure vulnerability. (CVE-2021-0129)\n* kernel: Use-after-free in ndb_queue_rq() (CVE-2021-3348)\n* kernel: Linux kernel eBPF RINGBUF map oversized allocation (CVE-2021-3489)\n* kernel: double free in bluetooth subsystem when the HCI device initialization fails (CVE-2021-3564)\n* kernel: use-after-free in function hci_sock_bound_ioctl() (CVE-2021-3573)\n* kernel: eBPF 32-bit source register truncation on div/mod (CVE-2021-3600)\n* kernel: DoS in rb_per_cpu_empty() (CVE-2021-3679)\n* kernel: overlayfs: Mounting overlayfs inside an unprivileged user namespace can reveal files (CVE-2021-3732)\n* kernel: heap overflow in __cgroup_bpf_run_filter_getsockopt() (CVE-2021-20194)\n* kernel: Race condition in sctp_destroy_sock list_del (CVE-2021-23133)\n* kernel: fuse: stall on CPU can occur because a retry loop continually finds the same bad inode (CVE-2021-28950)\n* kernel: System crash in intel_pmu_drain_pebs_nhm (CVE-2021-28971)\n* kernel: protection for sequences of pointer arithmetic operations against speculatively out-of-bounds loads can be bypassed to leak content of kernel memory (CVE-2021-29155)\n* kernel: improper input validation in tipc_nl_retrieve_key function (CVE-2021-29646)\n* kernel: lack a full memory barrier upon the assignment of a new table value in x_tables.h may lead to DoS (CVE-2021-29650)\n* kernel: local escalation of privileges in handling of eBPF programs (CVE-2021-31440)\n* kernel: protection of stack pointer against speculative pointer arithmetic can be bypassed to leak content of kernel memory (CVE-2021-31829)\n* kernel: out-of-bounds reads and writes due to enforcing incorrect limits for pointer arithmetic operations by BPF verifier (CVE-2021-33200)\n* kernel: reassembling encrypted fragments with non-consecutive packet numbers (CVE-2020-26146)\n* kernel: reassembling mixed encrypted/plaintext fragments (CVE-2020-26147)\n* kernel: the copy-on-write implementation can grant unintended write access because of a race condition in a THP mapcount check (CVE-2020-29368)\n* kernel: flowtable list del corruption with kernel BUG (CVE-2021-3635)\n* kernel: NULL pointer dereference in llsec_key_alloc() (CVE-2021-3659)\n* kernel: setsockopt System Call Untrusted Pointer Dereference Information Disclosure (CVE-2021-20239)\n* kernel: out of bounds array access in drivers/md/dm-ioctl.c (CVE-2021-31916)",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2021:4140",
"url": "https://access.redhat.com/errata/RHSA-2021:4140"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.5_release_notes/",
"url": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.5_release_notes/"
},
{
"category": "external",
"summary": "1875275",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1875275"
},
{
"category": "external",
"summary": "1902412",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1902412"
},
{
"category": "external",
"summary": "1903244",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1903244"
},
{
"category": "external",
"summary": "1905747",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1905747"
},
{
"category": "external",
"summary": "1906522",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1906522"
},
{
"category": "external",
"summary": "1912683",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1912683"
},
{
"category": "external",
"summary": "1913348",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1913348"
},
{
"category": "external",
"summary": "1919893",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1919893"
},
{
"category": "external",
"summary": "1921958",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1921958"
},
{
"category": "external",
"summary": "1923636",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1923636"
},
{
"category": "external",
"summary": "1930376",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1930376"
},
{
"category": "external",
"summary": "1930379",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1930379"
},
{
"category": "external",
"summary": "1930381",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1930381"
},
{
"category": "external",
"summary": "1941762",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1941762"
},
{
"category": "external",
"summary": "1941784",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1941784"
},
{
"category": "external",
"summary": "1945345",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1945345"
},
{
"category": "external",
"summary": "1945388",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1945388"
},
{
"category": "external",
"summary": "1946965",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1946965"
},
{
"category": "external",
"summary": "1948772",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1948772"
},
{
"category": "external",
"summary": "1951595",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1951595"
},
{
"category": "external",
"summary": "1957788",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1957788"
},
{
"category": "external",
"summary": "1959559",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1959559"
},
{
"category": "external",
"summary": "1959642",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1959642"
},
{
"category": "external",
"summary": "1959654",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1959654"
},
{
"category": "external",
"summary": "1959657",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1959657"
},
{
"category": "external",
"summary": "1959663",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1959663"
},
{
"category": "external",
"summary": "1960490",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1960490"
},
{
"category": "external",
"summary": "1960492",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1960492"
},
{
"category": "external",
"summary": "1960496",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1960496"
},
{
"category": "external",
"summary": "1960498",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1960498"
},
{
"category": "external",
"summary": "1960500",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1960500"
},
{
"category": "external",
"summary": "1960502",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1960502"
},
{
"category": "external",
"summary": "1960504",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1960504"
},
{
"category": "external",
"summary": "1964028",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1964028"
},
{
"category": "external",
"summary": "1964139",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1964139"
},
{
"category": "external",
"summary": "1965038",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965038"
},
{
"category": "external",
"summary": "1965458",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965458"
},
{
"category": "external",
"summary": "1966578",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1966578"
},
{
"category": "external",
"summary": "1969489",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1969489"
},
{
"category": "external",
"summary": "1975949",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1975949"
},
{
"category": "external",
"summary": "1976946",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1976946"
},
{
"category": "external",
"summary": "1981954",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1981954"
},
{
"category": "external",
"summary": "1989165",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1989165"
},
{
"category": "external",
"summary": "1995249",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1995249"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_4140.json"
}
],
"title": "Red Hat Security Advisory: kernel-rt security and bug fix update",
"tracking": {
"current_release_date": "2025-10-10T02:11:17+00:00",
"generator": {
"date": "2025-10-10T02:11:17+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2021:4140",
"initial_release_date": "2021-11-09T17:26:23+00:00",
"revision_history": [
{
"date": "2021-11-09T17:26:23+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2021-11-09T17:26:23+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-10T02:11:17+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product": {
"name": "Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.5.0.GA",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:8::nfv"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Real Time (v. 8)",
"product": {
"name": "Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.5.0.GA",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:8::realtime"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"product": {
"name": "kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"product_id": "kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt@4.18.0-348.rt7.130.el8?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"product": {
"name": "kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"product_id": "kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt@4.18.0-348.rt7.130.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"product": {
"name": "kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"product_id": "kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-core@4.18.0-348.rt7.130.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"product": {
"name": "kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"product_id": "kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug@4.18.0-348.rt7.130.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"product": {
"name": "kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"product_id": "kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-core@4.18.0-348.rt7.130.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"product": {
"name": "kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"product_id": "kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-devel@4.18.0-348.rt7.130.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"product": {
"name": "kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"product_id": "kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-kvm@4.18.0-348.rt7.130.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"product": {
"name": "kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"product_id": "kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-modules@4.18.0-348.rt7.130.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"product": {
"name": "kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"product_id": "kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-modules-extra@4.18.0-348.rt7.130.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"product": {
"name": "kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"product_id": "kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-devel@4.18.0-348.rt7.130.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"product": {
"name": "kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"product_id": "kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-kvm@4.18.0-348.rt7.130.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"product": {
"name": "kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"product_id": "kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-modules@4.18.0-348.rt7.130.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"product": {
"name": "kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"product_id": "kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-modules-extra@4.18.0-348.rt7.130.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"product": {
"name": "kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"product_id": "kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-debuginfo@4.18.0-348.rt7.130.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"product": {
"name": "kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"product_id": "kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debuginfo@4.18.0-348.rt7.130.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"product": {
"name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"product_id": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debuginfo-common-x86_64@4.18.0-348.rt7.130.el8?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:4.18.0-348.rt7.130.el8.src as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src"
},
"product_reference": "kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"relates_to_product_reference": "NFV-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64"
},
"product_reference": "kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"relates_to_product_reference": "NFV-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64"
},
"product_reference": "kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"relates_to_product_reference": "NFV-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64"
},
"product_reference": "kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"relates_to_product_reference": "NFV-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64"
},
"product_reference": "kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"relates_to_product_reference": "NFV-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64"
},
"product_reference": "kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"relates_to_product_reference": "NFV-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64"
},
"product_reference": "kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"relates_to_product_reference": "NFV-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64"
},
"product_reference": "kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"relates_to_product_reference": "NFV-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64"
},
"product_reference": "kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"relates_to_product_reference": "NFV-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
},
"product_reference": "kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"relates_to_product_reference": "NFV-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64"
},
"product_reference": "kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"relates_to_product_reference": "NFV-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64"
},
"product_reference": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"relates_to_product_reference": "NFV-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64"
},
"product_reference": "kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"relates_to_product_reference": "NFV-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64"
},
"product_reference": "kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"relates_to_product_reference": "NFV-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64"
},
"product_reference": "kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"relates_to_product_reference": "NFV-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
},
"product_reference": "kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"relates_to_product_reference": "NFV-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:4.18.0-348.rt7.130.el8.src as a component of Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src"
},
"product_reference": "kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"relates_to_product_reference": "RT-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64"
},
"product_reference": "kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"relates_to_product_reference": "RT-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64"
},
"product_reference": "kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"relates_to_product_reference": "RT-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64"
},
"product_reference": "kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"relates_to_product_reference": "RT-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64"
},
"product_reference": "kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"relates_to_product_reference": "RT-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64"
},
"product_reference": "kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"relates_to_product_reference": "RT-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64"
},
"product_reference": "kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"relates_to_product_reference": "RT-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64"
},
"product_reference": "kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"relates_to_product_reference": "RT-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64"
},
"product_reference": "kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"relates_to_product_reference": "RT-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
},
"product_reference": "kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"relates_to_product_reference": "RT-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64"
},
"product_reference": "kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"relates_to_product_reference": "RT-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64"
},
"product_reference": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"relates_to_product_reference": "RT-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64"
},
"product_reference": "kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"relates_to_product_reference": "RT-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64"
},
"product_reference": "kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"relates_to_product_reference": "RT-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64"
},
"product_reference": "kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"relates_to_product_reference": "RT-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
},
"product_reference": "kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"relates_to_product_reference": "RT-8.5.0.GA"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2019-14615",
"cwe": {
"id": "CWE-212",
"name": "Improper Removal of Sensitive Information Before Storage or Transfer"
},
"discovery_date": "2020-01-09T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1789209"
}
],
"notes": [
{
"category": "description",
"text": "An information disclosure flaw was found in the Linux kernel. The i915 graphics driver lacks control of flow for data structures which may allow a local, authenticated user to disclose information when using ioctl commands with an attached i915 device. The highest threat from this vulnerability is to data confidentiality.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Intel graphics card information leak.",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue affects the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 6, 7, 8 and Red Hat Enterprise MRG 2. Future kernel updates for Red Hat Enterprise Linux 6, 7, and 8 may address this issue.\n\nThis has been rated as having Moderate security impact and is not currently planned to be addressed in future updates of Red Hat Enterprise MRG 2.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-14615"
},
{
"category": "external",
"summary": "RHBZ#1789209",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1789209"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-14615",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14615"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-14615",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-14615"
}
],
"release_date": "2020-01-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T17:26:23+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4140"
},
{
"category": "workaround",
"details": "Preventing loading of the i915 kernel module will prevent attackers from using this exploit against the system; however, the power management functionality of the card will be disabled and the system may draw additional power. See the kcs \u201cHow do I blacklist a kernel module to prevent it from loading automatically?\u201c (https://access.redhat.com/solutions/41278) for instructions on how to disable a kernel module from autoloading. Graphical displays may also be at low resolution or not work correctly.\n\nThis mitigation may not be suitable if the graphical login functionality is required.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: Intel graphics card information leak."
},
{
"cve": "CVE-2020-0427",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2021-01-24T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1919893"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux pinctrl system. It is possible to trigger an of bounds read due to a use after free. This could lead to local information disclosure with no additional execution privileges needed.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: out-of-bounds reads in pinctrl subsystem.",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-0427"
},
{
"category": "external",
"summary": "RHBZ#1919893",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1919893"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-0427",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0427"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-0427",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-0427"
}
],
"release_date": "2020-11-22T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T17:26:23+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4140"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: out-of-bounds reads in pinctrl subsystem."
},
{
"cve": "CVE-2020-24502",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2021-02-17T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1930379"
}
],
"notes": [
{
"category": "description",
"text": "Improper input validation in some Intel(R) Ethernet E810 Adapter drivers for Linux may allow an authenticated user to potentially enable a denial of service via local access.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Improper input validation in some Intel(R) Ethernet E810 Adapter drivers",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-24502"
},
{
"category": "external",
"summary": "RHBZ#1930379",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1930379"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-24502",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24502"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-24502",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-24502"
}
],
"release_date": "2021-02-17T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T17:26:23+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4140"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: Improper input validation in some Intel(R) Ethernet E810 Adapter drivers"
},
{
"cve": "CVE-2020-24503",
"cwe": {
"id": "CWE-863",
"name": "Incorrect Authorization"
},
"discovery_date": "2021-02-17T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1930381"
}
],
"notes": [
{
"category": "description",
"text": "Insufficient access control in some Intel(R) Ethernet E810 Adapter drivers for Linux may allow an authenticated user to potentially enable information disclosure via local access.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Insufficient access control in some Intel(R) Ethernet E810 Adapter drivers",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-24503"
},
{
"category": "external",
"summary": "RHBZ#1930381",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1930381"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-24503",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24503"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-24503",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-24503"
}
],
"release_date": "2021-02-17T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T17:26:23+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4140"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: Insufficient access control in some Intel(R) Ethernet E810 Adapter drivers"
},
{
"cve": "CVE-2020-24504",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2021-02-17T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1930376"
}
],
"notes": [
{
"category": "description",
"text": "An uncontrolled resource consumption in some Intel(R) Ethernet E810 Adapter drivers for Linux may allow an authenticated user to potentially cause a denial of service via local access.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Uncontrolled resource consumption in some Intel(R) Ethernet E810 Adapter drivers",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-24504"
},
{
"category": "external",
"summary": "RHBZ#1930376",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1930376"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-24504",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24504"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-24504",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-24504"
},
{
"category": "external",
"summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00462.html",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00462.html"
}
],
"release_date": "2021-02-17T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T17:26:23+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4140"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: Uncontrolled resource consumption in some Intel(R) Ethernet E810 Adapter drivers"
},
{
"cve": "CVE-2020-24586",
"cwe": {
"id": "CWE-212",
"name": "Improper Removal of Sensitive Information Before Storage or Transfer"
},
"discovery_date": "2021-05-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1959642"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernels implementation of wifi fragmentation handling. An attacker with the ability to transmit within the wireless transmission range of an access point can abuse a flaw where previous contents of wifi fragments can be unintentionally transmitted to another device.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Fragmentation cache not cleared on reconnection",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-24586"
},
{
"category": "external",
"summary": "RHBZ#1959642",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1959642"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-24586",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24586"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-24586",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-24586"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-wireless/20210511200110.3f8290e59823.I622a67769ed39257327a362cfc09c812320eb979@changeid/",
"url": "https://lore.kernel.org/linux-wireless/20210511200110.3f8290e59823.I622a67769ed39257327a362cfc09c812320eb979@changeid/"
}
],
"release_date": "2021-05-12T01:20:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T17:26:23+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4140"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options does not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: Fragmentation cache not cleared on reconnection"
},
{
"cve": "CVE-2020-24587",
"cwe": {
"id": "CWE-345",
"name": "Insufficient Verification of Data Authenticity"
},
"discovery_date": "2021-05-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1959654"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel\u0027s WiFi implementation. An attacker within the wireless range can abuse a logic flaw in the WiFi implementation by reassembling packets from multiple fragments under different keys, treating them as valid. This flaw allows an attacker to send a fragment under an incorrect key, treating them as a valid fragment under the new key. The highest threat from this vulnerability is to confidentiality.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Reassembling fragments encrypted under different keys",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-24587"
},
{
"category": "external",
"summary": "RHBZ#1959654",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1959654"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-24587",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24587"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-24587",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-24587"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-wireless/20210511200110.3f8290e59823.I622a67769ed39257327a362cfc09c812320eb979@changeid/",
"url": "https://lore.kernel.org/linux-wireless/20210511200110.3f8290e59823.I622a67769ed39257327a362cfc09c812320eb979@changeid/"
}
],
"release_date": "2021-05-11T14:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T17:26:23+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4140"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options does not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "NONE",
"baseScore": 3.1,
"baseSeverity": "LOW",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: Reassembling fragments encrypted under different keys"
},
{
"cve": "CVE-2020-24588",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2021-05-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1959657"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernels wifi implementation. An attacker within wireless broadcast range can inject custom data into the wireless communication circumventing checks on the data. This can cause the frame to pass checks and be considered a valid frame of a different type.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: wifi frame payload being parsed incorrectly as an L2 frame",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-24588"
},
{
"category": "external",
"summary": "RHBZ#1959657",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1959657"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-24588",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24588"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-24588",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-24588"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-wireless/20210511200110.25d93176ddaf.I9e265b597f2cd23eb44573f35b625947b386a9de@changeid/",
"url": "https://lore.kernel.org/linux-wireless/20210511200110.25d93176ddaf.I9e265b597f2cd23eb44573f35b625947b386a9de@changeid/"
}
],
"release_date": "2021-05-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T17:26:23+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4140"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options does not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: wifi frame payload being parsed incorrectly as an L2 frame"
},
{
"cve": "CVE-2020-26139",
"cwe": {
"id": "CWE-829",
"name": "Inclusion of Functionality from Untrusted Control Sphere"
},
"discovery_date": "2021-05-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1959663"
}
],
"notes": [
{
"category": "description",
"text": "Frames used for authentication and key management between the AP and connected clients. Some clients may take these redirected frames masquerading as control mechanisms from the AP.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Forwarding EAPOL from unauthenticated wifi client",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-26139"
},
{
"category": "external",
"summary": "RHBZ#1959663",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1959663"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-26139",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26139"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-26139",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-26139"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-wireless/20210511200110.cb327ed0cabe.Ib7dcffa2a31f0913d660de65ba3c8aca75b1d10f@changeid/",
"url": "https://lore.kernel.org/linux-wireless/20210511200110.cb327ed0cabe.Ib7dcffa2a31f0913d660de65ba3c8aca75b1d10f@changeid/"
}
],
"release_date": "2021-05-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T17:26:23+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4140"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options does not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "NONE",
"baseScore": 3.5,
"baseSeverity": "LOW",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: Forwarding EAPOL from unauthenticated wifi client"
},
{
"cve": "CVE-2020-26140",
"cwe": {
"id": "CWE-346",
"name": "Origin Validation Error"
},
"discovery_date": "2021-05-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1960490"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in Linux kernel. Where the WiFi implementations accept plaintext frames in a protected WiFi network. An adversary can abuse this to inject arbitrary data frames independent of the network configuration.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: accepting plaintext data frames in protected networks",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-26140"
},
{
"category": "external",
"summary": "RHBZ#1960490",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1960490"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-26140",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26140"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-26140",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-26140"
}
],
"release_date": "2021-05-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T17:26:23+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4140"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: accepting plaintext data frames in protected networks"
},
{
"cve": "CVE-2020-26141",
"cwe": {
"id": "CWE-863",
"name": "Incorrect Authorization"
},
"discovery_date": "2021-05-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1960492"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in Linux kernel\u0027s WiFi implementation. An attacker within wireless range can inject a control packet fragment where the kernel does not verify the Message Integrity Check (authenticity) of fragmented TKIP frames.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: not verifying TKIP MIC of fragmented frames",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-26141"
},
{
"category": "external",
"summary": "RHBZ#1960492",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1960492"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-26141",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26141"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-26141",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-26141"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-wireless/20210511200110.c3f1d42c6746.I795593fcaae941c471425b8c7d5f7bb185d29142@changeid/",
"url": "https://lore.kernel.org/linux-wireless/20210511200110.c3f1d42c6746.I795593fcaae941c471425b8c7d5f7bb185d29142@changeid/"
}
],
"release_date": "2021-05-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T17:26:23+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4140"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options does not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: not verifying TKIP MIC of fragmented frames"
},
{
"cve": "CVE-2020-26143",
"cwe": {
"id": "CWE-346",
"name": "Origin Validation Error"
},
"discovery_date": "2021-05-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1960496"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in Linux kernel, where the WiFi implementations assemble fragments even though some of them were sent in plaintext. This vulnerability can be abused to inject packets and/or exfiltrate selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP data-confidentiality protocol is used.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: accepting fragmented plaintext frames in protected networks",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-26143"
},
{
"category": "external",
"summary": "RHBZ#1960496",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1960496"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-26143",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26143"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-26143",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-26143"
}
],
"release_date": "2021-05-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T17:26:23+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4140"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: accepting fragmented plaintext frames in protected networks"
},
{
"cve": "CVE-2020-26144",
"cwe": {
"id": "CWE-290",
"name": "Authentication Bypass by Spoofing"
},
"discovery_date": "2021-05-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1960498"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel, where the WiFi implementations accept plaintext A-MSDU frames as long as the first 8 bytes correspond to a valid RFC1042 (ex., LLC/SNAP) header for EAPOL. The highest threat from this vulnerability is to integrity.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: accepting unencrypted A-MSDU frames that start with RFC1042 header",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-26144"
},
{
"category": "external",
"summary": "RHBZ#1960498",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1960498"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-26144",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26144"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-26144",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-26144"
}
],
"release_date": "2021-05-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T17:26:23+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4140"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options does not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: accepting unencrypted A-MSDU frames that start with RFC1042 header"
},
{
"cve": "CVE-2020-26145",
"cwe": {
"id": "CWE-307",
"name": "Improper Restriction of Excessive Authentication Attempts"
},
"discovery_date": "2021-05-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1960500"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in ath10k_htt_rx_proc_rx_frag_ind_hl in drivers/net/wireless/ath/ath10k/htt_rx.c in the Linux kernel WiFi implementations, where it accepts a second (or subsequent) broadcast fragments even when sent in plaintext and then process them as full unfragmented frames. The highest threat from this vulnerability is to integrity.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: accepting plaintext broadcast fragments as full frames",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-26145"
},
{
"category": "external",
"summary": "RHBZ#1960500",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1960500"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-26145",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26145"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-26145",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-26145"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-wireless/20210511200110.9ca6ca7945a9.I1e18b514590af17c155bda86699bc3a971a8dcf4@changeid/",
"url": "https://lore.kernel.org/linux-wireless/20210511200110.9ca6ca7945a9.I1e18b514590af17c155bda86699bc3a971a8dcf4@changeid/"
}
],
"release_date": "2021-05-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T17:26:23+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4140"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options does not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: accepting plaintext broadcast fragments as full frames"
},
{
"cve": "CVE-2020-26146",
"cwe": {
"id": "CWE-307",
"name": "Improper Restriction of Excessive Authentication Attempts"
},
"discovery_date": "2021-05-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1960502"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in Linux kernel, where the WiFi implementation reassemble fragments with non-consecutive packet numbers. An adversary can abuse this to exfiltrate selected fragments. This vulnerability is exploitable when another device sends fragmented frames and the WEP, CCMP, or GCMP data-confidentiality protocol is used. Note that WEP is vulnerable to this attack by design.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: reassembling encrypted fragments with non-consecutive packet numbers",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-26146"
},
{
"category": "external",
"summary": "RHBZ#1960502",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1960502"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-26146",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26146"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-26146",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-26146"
}
],
"release_date": "2021-05-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T17:26:23+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4140"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: reassembling encrypted fragments with non-consecutive packet numbers"
},
{
"cve": "CVE-2020-26147",
"cwe": {
"id": "CWE-307",
"name": "Improper Restriction of Excessive Authentication Attempts"
},
"discovery_date": "2021-05-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1960504"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in ieee80211_rx_h_defragment in net/mac80211/rx.c in the Linux Kernel\u0027s WiFi implementation. This vulnerability can be abused to inject packets or exfiltrate selected fragments when another device sends fragmented frames, and the WEP, CCMP, or GCMP data-confidentiality protocol is used. The highest threat from this vulnerability is to integrity.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: reassembling mixed encrypted/plaintext fragments",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-26147"
},
{
"category": "external",
"summary": "RHBZ#1960504",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1960504"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-26147",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26147"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-26147",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-26147"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-wireless/20210511200110.30c4394bb835.I5acfdb552cc1d20c339c262315950b3eac491397@changeid/",
"url": "https://lore.kernel.org/linux-wireless/20210511200110.30c4394bb835.I5acfdb552cc1d20c339c262315950b3eac491397@changeid/"
}
],
"release_date": "2021-05-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T17:26:23+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4140"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options does not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:L/I:H/A:N",
"version": "3.1"
},
"products": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: reassembling mixed encrypted/plaintext fragments"
},
{
"cve": "CVE-2020-29368",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2020-12-01T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1903244"
}
],
"notes": [
{
"category": "description",
"text": "An issue was discovered in __split_huge_pmd in mm/huge_memory.c in the Linux kernel. The copy-on-write implementation can grant unintended write access because of a race condition in a THP mapcount check.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: the copy-on-write implementation can grant unintended write access because of a race condition in a THP mapcount check",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw has been rated as having Moderateimpact because, based on Red Hat\u0027s assessment, this issue is hard to exploit in practice because the race window is too small for it to be reliable.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-29368"
},
{
"category": "external",
"summary": "RHBZ#1903244",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1903244"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-29368",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-29368"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-29368",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-29368"
}
],
"release_date": "2020-06-03T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T17:26:23+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4140"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: the copy-on-write implementation can grant unintended write access because of a race condition in a THP mapcount check"
},
{
"cve": "CVE-2020-29660",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2020-12-09T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1906522"
}
],
"notes": [
{
"category": "description",
"text": "A locking inconsistency issue was discovered in the tty subsystem of the Linux kernel. A local user could use this flaw to read numerical value from memory after free.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: locking inconsistency in drivers/tty/tty_io.c and drivers/tty/tty_jobctrl.c can lead to a read-after-free",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw is rated as having Low impact (Red Hat Enterprise Linux 7) because of the need to have CAP_SYS_TTY_CONFIG privileges.\n\nThis flaw is rated as having Moderate (Red Hat Enterprise Linux 8) impact because of the need to have CAP_SYS_TTY_CONFIG privileges. Red Hat Enterprise Linux 8 enabled unprivileged user/network namespaces by default which can be used to exercise this vulnerability.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-29660"
},
{
"category": "external",
"summary": "RHBZ#1906522",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1906522"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-29660",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-29660"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-29660",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-29660"
}
],
"release_date": "2020-12-04T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T17:26:23+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4140"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: locking inconsistency in drivers/tty/tty_io.c and drivers/tty/tty_jobctrl.c can lead to a read-after-free"
},
{
"cve": "CVE-2020-36158",
"cwe": {
"id": "CWE-120",
"name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)"
},
"discovery_date": "2021-01-05T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1913348"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel. The marvell wifi driver could allow a local attacker to execute arbitrary code via a long SSID value in mwifiex_cmd_802_11_ad_hoc_start function. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: buffer overflow in mwifiex_cmd_802_11_ad_hoc_start function in drivers/net/wireless/marvell/mwifiex/join.c via a long SSID value",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue is rated as having Moderate impact because the attacker needs to be local and privileged enough to be able to initiate ad-hoc WIFI network creation.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-36158"
},
{
"category": "external",
"summary": "RHBZ#1913348",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1913348"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-36158",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36158"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-36158",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-36158"
}
],
"release_date": "2020-12-08T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T17:26:23+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4140"
},
{
"category": "workaround",
"details": "To mitigate this issue, prevent the module mwifiex from being loaded. Please see https://access.redhat.com/solutions/41278 for information on how to blacklist a kernel module to prevent it from loading automatically.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: buffer overflow in mwifiex_cmd_802_11_ad_hoc_start function in drivers/net/wireless/marvell/mwifiex/join.c via a long SSID value"
},
{
"cve": "CVE-2020-36312",
"cwe": {
"id": "CWE-772",
"name": "Missing Release of Resource after Effective Lifetime"
},
"discovery_date": "2021-04-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1947991"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the KVM hypervisor of the Linux kernel. A memory leak could occur in kvm_io_bus_unregister_dev() upon a kmalloc failure. The highest threat from this vulnerability is to system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: memory leak upon a kmalloc failure in kvm_io_bus_unregister_dev function in virt/kvm/kvm_main.c",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-36312"
},
{
"category": "external",
"summary": "RHBZ#1947991",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1947991"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-36312",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36312"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-36312",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-36312"
}
],
"release_date": "2020-09-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T17:26:23+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4140"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 3.3,
"baseSeverity": "LOW",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: memory leak upon a kmalloc failure in kvm_io_bus_unregister_dev function in virt/kvm/kvm_main.c"
},
{
"cve": "CVE-2020-36386",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"discovery_date": "2021-06-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1969489"
}
],
"notes": [
{
"category": "description",
"text": "A flaw out of bounds memory access in the Linux kernel bluetooth subsystem was found in the way when some data being read about the bluetooth device with the hci_extended_inquiry_result_evt call. A local user could use this flaw to crash the system or read some data out of memory bounds that can lead to data confidentiality threat.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: slab out-of-bounds read in hci_extended_inquiry_result_evt() in net/bluetooth/hci_event.c",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw is rated as having a Moderate impact because even the data being read out of memory bounds is written to some cache, it was known before that this data from non-safe source and as result no any sensitive dependencies on this data.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-36386"
},
{
"category": "external",
"summary": "RHBZ#1969489",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1969489"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-36386",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36386"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-36386",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-36386"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=51c19bf3d5cfaa66571e4b88ba2a6f6295311101",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=51c19bf3d5cfaa66571e4b88ba2a6f6295311101"
}
],
"release_date": "2020-07-10T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T17:26:23+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4140"
},
{
"category": "workaround",
"details": "To mitigate this issue, prevent the module bluetooth from being loaded (if Bluetooth not required for the system). Please see https://access.redhat.com/solutions/41278 for information on how to blacklist a kernel module to prevent it from loading automatically.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: slab out-of-bounds read in hci_extended_inquiry_result_evt() in net/bluetooth/hci_event.c"
},
{
"cve": "CVE-2021-0129",
"cwe": {
"id": "CWE-287",
"name": "Improper Authentication"
},
"discovery_date": "2021-05-26T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1965038"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel. Improper access control in BlueZ may allow an authenticated user to potentially enable information disclosure via adjacent access. The highest threat from this vulnerability is to data confidentiality and integrity.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Improper access control in BlueZ may allow information disclosure vulnerability.",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-0129"
},
{
"category": "external",
"summary": "RHBZ#1965038",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965038"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-0129",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0129"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-0129",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-0129"
}
],
"release_date": "2021-06-08T03:30:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T17:26:23+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4140"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: Improper access control in BlueZ may allow information disclosure vulnerability."
},
{
"cve": "CVE-2021-3348",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2021-01-28T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1921958"
}
],
"notes": [
{
"category": "description",
"text": "A use after free flaw in the Linux kernel network block device (NBD) subsystem was found in the way user calls an ioctl NBD_SET_SOCK at a certain point during device setup.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Use-after-free in ndb_queue_rq() in drivers/block/nbd.c",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw is rated as having a Moderate impact because in the default configuration, the issue can only be triggered by a privileged local user (with access to the nbd device).",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-3348"
},
{
"category": "external",
"summary": "RHBZ#1921958",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1921958"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-3348",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3348"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3348",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3348"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-block/24dff677353e2e30a71d8b66c4dffdbdf77c4dbd.1611595239.git.josef@toxicpanda.com/",
"url": "https://lore.kernel.org/linux-block/24dff677353e2e30a71d8b66c4dffdbdf77c4dbd.1611595239.git.josef@toxicpanda.com/"
}
],
"release_date": "2021-01-28T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T17:26:23+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4140"
},
{
"category": "workaround",
"details": "To mitigate this issue, prevent the module nbd from being loaded. Please see https://access.redhat.com/solutions/41278 for information on how to blacklist a kernel module to prevent it from loading automatically.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: Use-after-free in ndb_queue_rq() in drivers/block/nbd.c"
},
{
"acknowledgments": [
{
"names": [
"Ryota Shiga"
]
}
],
"cve": "CVE-2021-3489",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"discovery_date": "2021-05-11T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1959559"
}
],
"notes": [
{
"category": "description",
"text": "A flaw out of bound memory write in the Linux kernel BPF subsystem was found in the way user writes to BPF ring buffer too fast, so larger buffer than available memory could be allocated. A local user could use this flaw to crash the system or possibly escalate their privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Linux kernel eBPF RINGBUF map oversized allocation",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-3489"
},
{
"category": "external",
"summary": "RHBZ#1959559",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1959559"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-3489",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3489"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3489",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3489"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf.git/commit/?id=4b81ccebaeee885ab1aa1438133f2991e3a2b6ea",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf.git/commit/?id=4b81ccebaeee885ab1aa1438133f2991e3a2b6ea"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2021/05/11/10",
"url": "https://www.openwall.com/lists/oss-security/2021/05/11/10"
}
],
"release_date": "2021-05-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T17:26:23+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4140"
},
{
"category": "workaround",
"details": "The default Red Hat Enterprise Linux kernel prevents unprivileged users from being able to use eBPF by the kernel.unprivileged_bpf_disabled sysctl. This would require a privileged user with CAP_SYS_ADMIN or root to be able to abuse this flaw reducing its attack space.\n\nFor the Red Hat Enterprise Linux 7 the eBPF for unprivileged users is always disabled.\nFor the Red Hat Enterprise Linux 8 to confirm the current state, inspect the sysctl with the command:\n\n# cat /proc/sys/kernel/unprivileged_bpf_disabled\n\nThe setting of 1 would mean that unprivileged users can not use eBPF, mitigating the flaw.\n\nA kernel update will be required to mitigate the flaw for the root or users with CAP_SYS_ADMIN capabilities.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: Linux kernel eBPF RINGBUF map oversized allocation"
},
{
"acknowledgments": [
{
"names": [
"HaoXiong, LinMa"
],
"organization": "ckSec"
}
],
"cve": "CVE-2021-3564",
"cwe": {
"id": "CWE-415",
"name": "Double Free"
},
"discovery_date": "2021-05-19T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1964139"
}
],
"notes": [
{
"category": "description",
"text": "A flaw double-free memory corruption in the Linux kernel HCI device initialization subsystem was found in the way user attach malicious HCI TTY Bluetooth device. A local user could use this flaw to crash the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: double free in bluetooth subsystem when the HCI device initialization fails",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The impact is Moderate, because the double free happens during flush procedure, and no use of incorrect data during flush finishing even if double free could happen without kernel crash.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-3564"
},
{
"category": "external",
"summary": "RHBZ#1964139",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1964139"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-3564",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3564"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3564",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3564"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2021/05/25/1",
"url": "https://www.openwall.com/lists/oss-security/2021/05/25/1"
}
],
"release_date": "2021-05-25T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T17:26:23+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4140"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: double free in bluetooth subsystem when the HCI device initialization fails"
},
{
"cve": "CVE-2021-3573",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2021-05-31T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1966578"
}
],
"notes": [
{
"category": "description",
"text": "A flaw use-after-free in function hci_sock_bound_ioctl() of the Linux kernel HCI subsystem was found in the way user calls ioct HCIUNBLOCKADDR or other way triggers race condition of the call hci_unregister_dev() together with one of the calls hci_sock_blacklist_add(), hci_sock_blacklist_del(), hci_get_conn_info(), hci_get_auth_info(). A privileged local user could use this flaw to crash the system or escalate their privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: use-after-free in function hci_sock_bound_ioctl()",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue is rated as having a Moderate impact because of the privileges (CAP_NET_ADMIN in initial namespace) required for exploiting the issue.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-3573"
},
{
"category": "external",
"summary": "RHBZ#1966578",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1966578"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-3573",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3573"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3573",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3573"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/bluetooth/bluetooth.git/commit/?id=e305509e678b3a4af2b3cfd410f409f7cdaabb52",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/bluetooth/bluetooth.git/commit/?id=e305509e678b3a4af2b3cfd410f409f7cdaabb52"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2021/06/08/2",
"url": "https://www.openwall.com/lists/oss-security/2021/06/08/2"
}
],
"release_date": "2021-06-08T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T17:26:23+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4140"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising easThe required privileges is CAP_NET_ADMIN capabilities. This would require a privileged user with CAP_SYS_ADMIN or root to be able to abuse this flaw reducing its attack space.e of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: use-after-free in function hci_sock_bound_ioctl()"
},
{
"cve": "CVE-2021-3600",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2021-06-23T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1981954"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel\u2019s eBPF verification code, where the eBPF 32-bit div/mod source register truncation could lead to out-of-bounds reads and writes. By default, accessing the eBPF verifier is only possible to privileged users with CAP_SYS_ADMIN. This flaw allows a local user who can run eBPF instructions to crash the system or possibly escalate their privileges on the system. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: eBPF 32-bit source register truncation on div/mod",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-3600"
},
{
"category": "external",
"summary": "RHBZ#1981954",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1981954"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-3600",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3600"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3600",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3600"
},
{
"category": "external",
"summary": "https://lore.kernel.org/patchwork/patch/1379497/",
"url": "https://lore.kernel.org/patchwork/patch/1379497/"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2021/06/23/1",
"url": "https://www.openwall.com/lists/oss-security/2021/06/23/1"
}
],
"release_date": "2021-06-23T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T17:26:23+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4140"
},
{
"category": "workaround",
"details": "The default Red Hat Enterprise Linux kernel prevents unprivileged users from being able to use eBPF by the kernel.unprivileged_bpf_disabled sysctl. This would require a privileged user with CAP_SYS_ADMIN or root to be able to abuse this flaw reducing its attack space.\n\nFor the Red Hat Enterprise Linux 7 the eBPF for unprivileged users is always disabled.\nFor the Red Hat Enterprise Linux 8 to confirm the current state, inspect the sysctl with the command:\n\n# cat /proc/sys/kernel/unprivileged_bpf_disabled\n\nThe setting of 1 would mean that unprivileged users can not use eBPF, mitigating the flaw.\n\nA kernel update will be required to mitigate the flaw for the root or users with CAP_SYS_ADMIN capabilities.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: eBPF 32-bit source register truncation on div/mod"
},
{
"cve": "CVE-2021-3635",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"discovery_date": "2021-06-22T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1976946"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel netfilter implementation. A user with root (CAP_SYS_ADMIN) access is able to panic the system when issuing netfilter netflow commands",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: flowtable list del corruption with kernel BUG at lib/list_debug.c:50",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-3635"
},
{
"category": "external",
"summary": "RHBZ#1976946",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1976946"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-3635",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3635"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3635",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3635"
}
],
"release_date": "2021-08-06T04:47:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T17:26:23+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4140"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options does not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 4.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: flowtable list del corruption with kernel BUG at lib/list_debug.c:50"
},
{
"cve": "CVE-2021-3659",
"cwe": {
"id": "CWE-252",
"name": "Unchecked Return Value"
},
"discovery_date": "2021-05-14T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1975949"
}
],
"notes": [
{
"category": "description",
"text": "A NULL pointer dereference flaw was found in the Linux kernel\u2019s IEEE 802.15.4 wireless networking subsystem in the way the user closes the LR-WPAN connection. This flaw allows a local user to crash the system. The highest threat from this vulnerability is to system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: NULL pointer dereference in llsec_key_alloc() in net/mac802154/llsec.c",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-3659"
},
{
"category": "external",
"summary": "RHBZ#1975949",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1975949"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-3659",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3659"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3659",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3659"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=1165affd484889d4986cf3b724318935a0b120d8",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=1165affd484889d4986cf3b724318935a0b120d8"
}
],
"release_date": "2021-04-06T19:22:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T17:26:23+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4140"
},
{
"category": "workaround",
"details": "To mitigate this issue, prevent the module mac802154 from being loaded. Please see https://access.redhat.com/solutions/41278 for information on how to blacklist a kernel module to prevent it from loading automatically.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: NULL pointer dereference in llsec_key_alloc() in net/mac802154/llsec.c"
},
{
"acknowledgments": [
{
"names": [
"Haoran Luo"
],
"organization": "Chaitin Tech"
}
],
"cve": "CVE-2021-3679",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2021-07-25T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1989165"
}
],
"notes": [
{
"category": "description",
"text": "A lack of CPU resources in the Linux kernel tracing module functionality was found in the way users use the trace ring buffer in specific way. Only privileged local users (with CAP_SYS_ADMIN capability) could use this flaw to starve the resources causing denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: DoS in rb_per_cpu_empty()",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-3679"
},
{
"category": "external",
"summary": "RHBZ#1989165",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1989165"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-3679",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3679"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3679",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3679"
},
{
"category": "external",
"summary": "https://lore.kernel.org/lkml/20210723125527.767d1c18@oasis.local.home/",
"url": "https://lore.kernel.org/lkml/20210723125527.767d1c18@oasis.local.home/"
}
],
"release_date": "2021-07-20T09:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T17:26:23+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4140"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: DoS in rb_per_cpu_empty()"
},
{
"acknowledgments": [
{
"names": [
"Miklos Szeredi"
],
"organization": "Red Hat",
"summary": "This issue was discovered by Red Hat."
}
],
"cve": "CVE-2021-3732",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2021-08-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1995249"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel\u2019s OverlayFS subsystem in the way the user mounts the TmpFS filesystem with OverlayFS. This flaw allows a local user to gain access to hidden files that should not be accessible.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: overlayfs: Mounting overlayfs inside an unprivileged user namespace can reveal files",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-3732"
},
{
"category": "external",
"summary": "RHBZ#1995249",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1995249"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-3732",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3732"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3732",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3732"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=427215d85e8d",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=427215d85e8d"
}
],
"release_date": "2021-08-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T17:26:23+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4140"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 3.3,
"baseSeverity": "LOW",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: overlayfs: Mounting overlayfs inside an unprivileged user namespace can reveal files"
},
{
"acknowledgments": [
{
"names": [
"Loris Reiff"
]
}
],
"cve": "CVE-2021-20194",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2020-12-30T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1912683"
}
],
"notes": [
{
"category": "description",
"text": "A flaw buffer overflow in the Linux kernel BPF subsystem was found in the way user running BPF script calling getsockopt. A local user could use this flaw to crash the system or possibly escalate their privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: heap overflow in __cgroup_bpf_run_filter_getsockopt()",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw is rated as having Moderate impact because of the need to have elevated privileges or non-standard configuration for running BPF script.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-20194"
},
{
"category": "external",
"summary": "RHBZ#1912683",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1912683"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-20194",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20194"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-20194",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-20194"
}
],
"release_date": "2021-01-22T10:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T17:26:23+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4140"
},
{
"category": "workaround",
"details": "The default Red Hat Enterprise Linux kernel prevents unprivileged users from being able to use eBPF by the kernel.unprivileged_bpf_disabled sysctl. This would require a privileged user with CAP_SYS_ADMIN or root to be able to abuse this flaw reducing its attack space.\n\nFor the Red Hat Enterprise Linux 7 the eBPF for unprivileged users is always disabled.\n\nFor the Red Hat Enterprise Linux 8 to confirm the current state, inspect the sysctl with the command:\n\n# cat /proc/sys/kernel/unprivileged_bpf_disabled\n\nThe setting of 1 would mean that unprivileged users can not use eBPF.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: heap overflow in __cgroup_bpf_run_filter_getsockopt()"
},
{
"cve": "CVE-2021-20239",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2021-02-01T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1923636"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the BPF protocol. This flaw allows an attacker with a local account to leak information about kernel internal addresses. The highest threat from this vulnerability is to confidentiality.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: setsockopt System Call Untrusted Pointer Dereference Information Disclosure",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-20239"
},
{
"category": "external",
"summary": "RHBZ#1923636",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1923636"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-20239",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20239"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-20239",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-20239"
}
],
"release_date": "2021-02-01T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T17:26:23+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4140"
},
{
"category": "workaround",
"details": "Loading a filter is a privileged (CAP_SYS_ADMIN or root) operation. Once any filter is used, this attack is capable of being used by an unprivileged user. There is no known mitigation that product security finds suitable for this flaw.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 3.8,
"baseSeverity": "LOW",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: setsockopt System Call Untrusted Pointer Dereference Information Disclosure"
},
{
"acknowledgments": [
{
"names": [
"Or Cohen"
],
"organization": "Palo Alto Networks"
}
],
"cve": "CVE-2021-23133",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2021-04-09T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1948772"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free flaw was found in the Linux kernel\u0027s SCTP socket functionality that triggers a race condition. This flaw allows a local user to escalate their privileges on the system. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Race condition in sctp_destroy_sock list_del",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue is rated as having a Moderate impact because of the privileges required for running the known reproducer. The required privileges are CAP_BPF and CAP_NET_ADMIN capabilities that are disabled by default in Red Hat Enterprise Linux 7. For Red Hat Enterprise Linux 8, the SCTP protocol itself is disabled by default and cannot be used by a user without enablement by an administrator.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-23133"
},
{
"category": "external",
"summary": "RHBZ#1948772",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1948772"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-23133",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23133"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-23133",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-23133"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=b166a20b07382b8bc1dcee2a448715c9c2c81b5b",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=b166a20b07382b8bc1dcee2a448715c9c2c81b5b"
}
],
"release_date": "2021-04-18T09:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T17:26:23+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4140"
},
{
"category": "workaround",
"details": "To mitigate this issue, prevent the module sctp from being loaded (and this is so by default for Red Hat Enterprise Linux 8). Please see https://access.redhat.com/solutions/41278 for information on how to blacklist a kernel module to prevent it from loading automatically.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: Race condition in sctp_destroy_sock list_del"
},
{
"cve": "CVE-2021-28950",
"cwe": {
"id": "CWE-835",
"name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)"
},
"discovery_date": "2021-03-22T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1941762"
}
],
"notes": [
{
"category": "description",
"text": "A denial of service in the kernel side of the FUSE functionality can allow a local system to create a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: fuse: stall on CPU can occur because a retry loop continually finds the same bad inode",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-28950"
},
{
"category": "external",
"summary": "RHBZ#1941762",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1941762"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-28950",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-28950"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-28950",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-28950"
}
],
"release_date": "2021-03-04T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T17:26:23+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4140"
},
{
"category": "workaround",
"details": "As the FUSE module will be auto-loaded when required, its use can be disabled by preventing the module from loading with the following instructions:\n\n# echo \"install fuse /bin/true\" \u003e\u003e /etc/modprobe.d/disable-fuse.conf\n\nThe system will need to be restarted if the FUSE modules are loaded. In most circumstances, the CIFS kernel modules will be unable to be unloaded while the FUSE filesystems are in use.\n\nIf the system requires this module to work correctly, this mitigation may not be suitable.\n\nIf you need further assistance, see KCS article https://access.redhat.com/solutions/41278 or contact Red Hat Global Support Services.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: fuse: stall on CPU can occur because a retry loop continually finds the same bad inode"
},
{
"cve": "CVE-2021-28971",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"discovery_date": "2021-03-22T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1941784"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel. On some Haswell CPUs, userspace applications (such as perf-fuzzer) can cause a system crash because the PEBS status in a PEBS record is mishandled.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: System crash in intel_pmu_drain_pebs_nhm in arch/x86/events/intel/ds.c",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-28971"
},
{
"category": "external",
"summary": "RHBZ#1941784",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1941784"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-28971",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-28971"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-28971",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-28971"
}
],
"release_date": "2021-03-22T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T17:26:23+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4140"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options does not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: System crash in intel_pmu_drain_pebs_nhm in arch/x86/events/intel/ds.c"
},
{
"cve": "CVE-2021-29155",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"discovery_date": "2021-04-18T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1951595"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was discovered in retrieve_ptr_limit in kernel/bpf/verifier.c in the Linux kernel mechanism to mitigate speculatively out-of-bounds loads (Spectre mitigation). In this flaw a local, special user privileged (CAP_SYS_ADMIN) BPF program running on affected systems may bypass the protection, and execute speculatively out-of-bounds loads from the kernel memory. This can be abused to extract contents of kernel memory via side-channel.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: protection for sequences of pointer arithmetic operations against speculatively out-of-bounds loads can be bypassed to leak content of kernel memory",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-29155"
},
{
"category": "external",
"summary": "RHBZ#1951595",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1951595"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-29155",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29155"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-29155",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-29155"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2021/04/18/4",
"url": "https://www.openwall.com/lists/oss-security/2021/04/18/4"
}
],
"release_date": "2021-04-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T17:26:23+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4140"
},
{
"category": "workaround",
"details": "The default Red Hat Enterprise Linux kernel prevents unprivileged users from being able to use eBPF by the kernel.unprivileged_bpf_disabled sysctl. This would require a privileged user with CAP_SYS_ADMIN or root to be able to abuse this flaw reducing its attack space.\n\nFor the Red Hat Enterprise Linux 7 the eBPF for unprivileged users is always disabled.\nFor the Red Hat Enterprise Linux 8 to confirm the current state, inspect the sysctl with the command:\n\n# cat /proc/sys/kernel/unprivileged_bpf_disabled\n\nThe setting of 1 would mean that unprivileged users can not use eBPF, mitigating the flaw.\n\nA kernel update will be required to mitigate the flaw for the root or users with CAP_SYS_ADMIN capabilities.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: protection for sequences of pointer arithmetic operations against speculatively out-of-bounds loads can be bypassed to leak content of kernel memory"
},
{
"cve": "CVE-2021-29646",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2021-03-30T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1945345"
}
],
"notes": [
{
"category": "description",
"text": "A flaw buffer overflow in the Linux kernel TIPC protocol functionality was found in the way user uses protocol with encryption enabled. A local user could use this flaw to crash the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: improper input validation in tipc_nl_retrieve_key function in net/tipc/node.c",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-29646"
},
{
"category": "external",
"summary": "RHBZ#1945345",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1945345"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-29646",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29646"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-29646",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-29646"
}
],
"release_date": "2021-03-15T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T17:26:23+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4140"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: improper input validation in tipc_nl_retrieve_key function in net/tipc/node.c"
},
{
"cve": "CVE-2021-29650",
"cwe": {
"id": "CWE-662",
"name": "Improper Synchronization"
},
"discovery_date": "2021-03-30T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1945388"
}
],
"notes": [
{
"category": "description",
"text": "A denial-of-service (DoS) flaw was identified in the Linux kernel due to an incorrect memory barrier in xt_replace_table in net/netfilter/x_tables.c in the netfilter subsystem.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: lack a full memory barrier upon the assignment of a new table value in net/netfilter/x_tables.c and include/linux/netfilter/x_tables.h may lead to DoS",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-29650"
},
{
"category": "external",
"summary": "RHBZ#1945388",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1945388"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-29650",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29650"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-29650",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-29650"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=175e476b8cdf2a4de7432583b49c871345e4f8a1",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=175e476b8cdf2a4de7432583b49c871345e4f8a1"
}
],
"release_date": "2021-03-15T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T17:26:23+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4140"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: lack a full memory barrier upon the assignment of a new table value in net/netfilter/x_tables.c and include/linux/netfilter/x_tables.h may lead to DoS"
},
{
"acknowledgments": [
{
"names": [
"Manfred Paul"
],
"organization": "RedRocket CTF team"
}
],
"cve": "CVE-2021-31440",
"cwe": {
"id": "CWE-682",
"name": "Incorrect Calculation"
},
"discovery_date": "2021-05-21T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1964028"
}
],
"notes": [
{
"category": "description",
"text": "An out-of-bounds access flaw was found in the Linux kernel\u2019s implementation of the eBPF code verifier, where an incorrect register bounds calculation while checking unsigned 32-bit instructions in an eBPF program occurs.. By default accessing the eBPF verifier is only accessible to privileged users with CAP_SYS_ADMIN. The issue results from the lack of proper validation of user-supplied eBPF programs prior to executing them. A local user could use this flaw to crash the system or possibly escalate their privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: local escalation of privileges in handling of eBPF programs",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-31440"
},
{
"category": "external",
"summary": "RHBZ#1964028",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1964028"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-31440",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-31440"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-31440",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-31440"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=10bf4e83167cc68595b85fd73bb91e8f2c086e36",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=10bf4e83167cc68595b85fd73bb91e8f2c086e36"
},
{
"category": "external",
"summary": "https://www.zerodayinitiative.com/blog/2021/5/26/cve-2021-31440-an-incorrect-bounds-calculation-in-the-linux-kernel-ebpf-verifier",
"url": "https://www.zerodayinitiative.com/blog/2021/5/26/cve-2021-31440-an-incorrect-bounds-calculation-in-the-linux-kernel-ebpf-verifier"
}
],
"release_date": "2021-05-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T17:26:23+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4140"
},
{
"category": "workaround",
"details": "The default Red Hat Enterprise Linux kernel prevents unprivileged users from being able to use eBPF by the kernel.unprivileged_bpf_disabled sysctl. This would require a privileged user with CAP_SYS_ADMIN or root to be able to abuse this flaw reducing its attack space.\n\nFor the Red Hat Enterprise Linux 7 the eBPF for unprivileged users is always disabled.\nFor the Red Hat Enterprise Linux 8 to confirm the current state, inspect the sysctl with the command:\n\n# cat /proc/sys/kernel/unprivileged_bpf_disabled\n\nThe setting of 1 would mean that unprivileged users can not use eBPF, mitigating the flaw.\n\nA kernel update will be required to mitigate the flaw for the root or users with CAP_SYS_ADMIN capabilities.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: local escalation of privileges in handling of eBPF programs"
},
{
"cve": "CVE-2021-31829",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2021-05-04T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1957788"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel\u0027s eBPF verification code. By default, accessing the eBPF verifier is only accessible to privileged users with CAP_SYS_ADMIN. This flaw allows a local user who can insert eBPF instructions, to use the eBPF verifier to abuse a spectre-like flaw and infer all system memory. The highest threat from this vulnerability is to confidentiality.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: protection of stack pointer against speculative pointer arithmetic can be bypassed to leak content of kernel memory",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-31829"
},
{
"category": "external",
"summary": "RHBZ#1957788",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1957788"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-31829",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-31829"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-31829",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-31829"
}
],
"release_date": "2021-04-30T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T17:26:23+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4140"
},
{
"category": "workaround",
"details": "The default Red Hat Enterprise Linux kernel prevents unprivileged users from being able to use eBPF by the kernel.unprivileged_bpf_disabled sysctl. This would require a privileged user with CAP_SYS_ADMIN or root to be able to abuse this flaw reducing its attack space.\n\nFor the Red Hat Enterprise Linux 7 and 8 kernel to confirm the current state, inspect the sysctl with the command:\n\n# cat /proc/sys/kernel/unprivileged_bpf_disabled\n\nThe setting of 1 would mean that unprivileged users can not use eBPF, mitigating the flaw.\n\nA kernel update will be required to mitigate the flaw for the root or users with CAP_SYS_ADMIN capabilities.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: protection of stack pointer against speculative pointer arithmetic can be bypassed to leak content of kernel memory"
},
{
"cve": "CVE-2021-31916",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2021-03-29T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1946965"
}
],
"notes": [
{
"category": "description",
"text": "An out-of-bounds (OOB) memory write flaw was found in list_devices in drivers/md/dm-ioctl.c in the Multi-device driver module in the Linux kernel. A bound check failure allows an attacker with special user (CAP_SYS_ADMIN) privilege to gain access to out-of-bounds memory leading to a system crash, a leak of internal kernel information, or a privilege escalation problem.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: out of bounds array access in drivers/md/dm-ioctl.c",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw is rated a Low impact because in the default configuration, the issue can only be triggered by a privileged local user.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-31916"
},
{
"category": "external",
"summary": "RHBZ#1946965",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1946965"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-31916",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-31916"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-31916",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-31916"
},
{
"category": "external",
"summary": "https://github.com/torvalds/linux/commit/4edbe1d7bcffcd6269f3b5eb63f710393ff2ec7a",
"url": "https://github.com/torvalds/linux/commit/4edbe1d7bcffcd6269f3b5eb63f710393ff2ec7a"
},
{
"category": "external",
"summary": "https://seclists.org/oss-sec/2021/q1/268",
"url": "https://seclists.org/oss-sec/2021/q1/268"
}
],
"release_date": "2021-03-29T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T17:26:23+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4140"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: out of bounds array access in drivers/md/dm-ioctl.c"
},
{
"cve": "CVE-2021-33033",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2021-05-14T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1961300"
}
],
"notes": [
{
"category": "description",
"text": "A flaw use-after-free in the Linux kernel CIPSO network packet labeling protocol functionality was found in the way user open local network connection with the usage of the security labeling that is IP option number 134. A local user could use this flaw to crash the system or possibly escalate their privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: use-after-free in cipso_v4_genopt in net/ipv4/cipso_ipv4.c",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Considered to be Moderate rate, because by default CIPSO non-enabled and both no known way to reproduce the attack remotely and both it looks complex if even possible to use the attack in any way apart from crashing the system. For the usage of the inbound CIPSO connections, the administrator have to enable it with netlabelctl utility first. The vulnerability is considered to be for local user, because it can happen only when a local user opens a socket for sending packets, but not during receiving packets.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-33033"
},
{
"category": "external",
"summary": "RHBZ#1961300",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1961300"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-33033",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33033"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-33033",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33033"
}
],
"release_date": "2021-03-04T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T17:26:23+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4140"
},
{
"category": "workaround",
"details": "The mitigation would be not allowing CIPSO labeling for the inbound network connections. For the most of the default configurations both for network routers and for the Linux servers itself it is disabled by default.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: use-after-free in cipso_v4_genopt in net/ipv4/cipso_ipv4.c"
},
{
"cve": "CVE-2021-33200",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2021-05-27T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1965458"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in kernel/bpf/verifier.c in BPF in the Linux kernel. An incorrect limit is enforced for pointer arithmetic operations which can be abused to perform out-of-bounds reads and writes in kernel memory, leading to local privilege escalation. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: out-of-bounds reads and writes due to enforcing incorrect limits for pointer arithmetic operations by BPF verifier",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-33200"
},
{
"category": "external",
"summary": "RHBZ#1965458",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965458"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-33200",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33200"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-33200",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33200"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf.git/patch/?id=3d0220f6861d713213b015b582e9f21e5b28d2e0",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf.git/patch/?id=3d0220f6861d713213b015b582e9f21e5b28d2e0"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf.git/patch/?id=a7036191277f9fa68d92f2071ddc38c09b1e5ee5",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf.git/patch/?id=a7036191277f9fa68d92f2071ddc38c09b1e5ee5"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf.git/patch/?id=bb01a1bba579b4b1c5566af24d95f1767859771e",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf.git/patch/?id=bb01a1bba579b4b1c5566af24d95f1767859771e"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2021/05/27/1",
"url": "https://www.openwall.com/lists/oss-security/2021/05/27/1"
}
],
"release_date": "2021-05-26T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T17:26:23+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4140"
},
{
"category": "workaround",
"details": "The default Red Hat Enterprise Linux kernel prevents unprivileged users from being able to use eBPF by the kernel.unprivileged_bpf_disabled sysctl. This would require a privileged user with CAP_SYS_ADMIN or root to be able to abuse this flaw reducing its attack space.\n\nFor the Red Hat Enterprise Linux 7 the eBPF for unprivileged users is always disabled.\nFor the Red Hat Enterprise Linux 8 to confirm the current state, inspect the sysctl with the command:\n\n# cat /proc/sys/kernel/unprivileged_bpf_disabled\n\nThe setting of 1 would mean that unprivileged users can not use eBPF, mitigating the flaw.\n\nA kernel update will be required to mitigate the flaw for the root or users with CAP_SYS_ADMIN capabilities.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: out-of-bounds reads and writes due to enforcing incorrect limits for pointer arithmetic operations by BPF verifier"
},
{
"cve": "CVE-2021-46905",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"discovery_date": "2024-02-27T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2266253"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in the Linux kernel. This flaw occurs due to an unconditional NULL-pointer dereference on every disconnect in the Linux kernel.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: NULL-deref on disconnect regression",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-46905"
},
{
"category": "external",
"summary": "RHBZ#2266253",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2266253"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-46905",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46905"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-46905",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-46905"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024022557-CVE-2021-46905-6507@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024022557-CVE-2021-46905-6507@gregkh/T"
}
],
"release_date": "2024-02-26T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T17:26:23+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4140"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: NULL-deref on disconnect regression"
},
{
"cve": "CVE-2022-20166",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2022-08-29T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2122089"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel\u2019s sysfs layer. This flaw allows a local user who can read files under the /sysfs mount point to corrupt memory or possibly crash the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: possible buffer overflow in sysfs reading",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-20166"
},
{
"category": "external",
"summary": "RHBZ#2122089",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2122089"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-20166",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-20166"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-20166",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-20166"
}
],
"release_date": "2022-08-15T14:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T17:26:23+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4140"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options does not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: possible buffer overflow in sysfs reading"
}
]
}
RHSA-2021:4356
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n* kernel: out-of-bounds reads in pinctrl subsystem (CVE-2020-0427)\n* kernel: Improper input validation in some Intel(R) Ethernet E810 Adapter drivers (CVE-2020-24502)\n* kernel: Insufficient access control in some Intel(R) Ethernet E810 Adapter drivers (CVE-2020-24503)\n* kernel: Uncontrolled resource consumption in some Intel(R) Ethernet E810 Adapter drivers (CVE-2020-24504)\n* kernel: Fragmentation cache not cleared on reconnection (CVE-2020-24586)\n* kernel: Reassembling fragments encrypted under different keys (CVE-2020-24587)\n* kernel: wifi frame payload being parsed incorrectly as an L2 frame (CVE-2020-24588)\n* kernel: Forwarding EAPOL from unauthenticated wifi client (CVE-2020-26139)\n* kernel: accepting plaintext data frames in protected networks (CVE-2020-26140)\n* kernel: not verifying TKIP MIC of fragmented frames (CVE-2020-26141)\n* kernel: accepting fragmented plaintext frames in protected networks (CVE-2020-26143)\n* kernel: accepting unencrypted A-MSDU frames that start with RFC1042 header (CVE-2020-26144)\n* kernel: accepting plaintext broadcast fragments as full frames (CVE-2020-26145)\n* kernel: powerpc: RTAS calls can be used to compromise kernel integrity (CVE-2020-27777)\n* kernel: locking inconsistency in tty_io.c and tty_jobctrl.c can lead to a read-after-free (CVE-2020-29660)\n* kernel: buffer overflow in mwifiex_cmd_802_11_ad_hoc_start function via a long SSID value (CVE-2020-36158)\n* kernel: slab out-of-bounds read in hci_extended_inquiry_result_evt() (CVE-2020-36386)\n* kernel: Improper access control in BlueZ may allow information disclosure vulnerability. (CVE-2021-0129)\n* kernel: Use-after-free in ndb_queue_rq() in drivers/block/nbd.c (CVE-2021-3348)\n* kernel: Linux kernel eBPF RINGBUF map oversized allocation (CVE-2021-3489)\n* kernel: double free in bluetooth subsystem when the HCI device initialization fails (CVE-2021-3564)\n* kernel: use-after-free in function hci_sock_bound_ioctl() (CVE-2021-3573)\n* kernel: eBPF 32-bit source register truncation on div/mod (CVE-2021-3600)\n* kernel: DoS in rb_per_cpu_empty() (CVE-2021-3679)\n* kernel: Mounting overlayfs inside an unprivileged user namespace can reveal files (CVE-2021-3732)\n* kernel: heap overflow in __cgroup_bpf_run_filter_getsockopt() (CVE-2021-20194)\n* kernel: Race condition in sctp_destroy_sock list_del (CVE-2021-23133)\n* kernel: fuse: stall on CPU can occur because a retry loop continually finds the same bad inode (CVE-2021-28950)\n* kernel: System crash in intel_pmu_drain_pebs_nhm in arch/x86/events/intel/ds.c (CVE-2021-28971)\n* kernel: protection can be bypassed to leak content of kernel memory (CVE-2021-29155)\n* kernel: improper input validation in tipc_nl_retrieve_key function in net/tipc/node.c (CVE-2021-29646)\n* kernel: lack a full memory barrier may lead to DoS (CVE-2021-29650)\n* kernel: local escalation of privileges in handling of eBPF programs (CVE-2021-31440)\n* kernel: protection of stack pointer against speculative pointer arithmetic can be bypassed to leak content of kernel memory (CVE-2021-31829)\n* kernel: out-of-bounds reads and writes due to enforcing incorrect limits for pointer arithmetic operations by BPF verifier (CVE-2021-33200)\n* kernel: reassembling encrypted fragments with non-consecutive packet numbers (CVE-2020-26146)\n* kernel: reassembling mixed encrypted/plaintext fragments (CVE-2020-26147)\n* kernel: the copy-on-write implementation can grant unintended write access because of a race condition in a THP mapcount check (CVE-2020-29368)\n* kernel: flowtable list del corruption with kernel BUG at lib/list_debug.c:50 (CVE-2021-3635)\n* kernel: NULL pointer dereference in llsec_key_alloc() in net/mac802154/llsec.c (CVE-2021-3659)\n* kernel: setsockopt System Call Untrusted Pointer Dereference Information Disclosure (CVE-2021-20239)\n* kernel: out of bounds array access in drivers/md/dm-ioctl.c (CVE-2021-31916)",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2021:4356",
"url": "https://access.redhat.com/errata/RHSA-2021:4356"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.5_release_notes/",
"url": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.5_release_notes/"
},
{
"category": "external",
"summary": "1509204",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1509204"
},
{
"category": "external",
"summary": "1793880",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1793880"
},
{
"category": "external",
"summary": "1816493",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1816493"
},
{
"category": "external",
"summary": "1894101",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1894101"
},
{
"category": "external",
"summary": "1900844",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1900844"
},
{
"category": "external",
"summary": "1903244",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1903244"
},
{
"category": "external",
"summary": "1906522",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1906522"
},
{
"category": "external",
"summary": "1912683",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1912683"
},
{
"category": "external",
"summary": "1913348",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1913348"
},
{
"category": "external",
"summary": "1915825",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1915825"
},
{
"category": "external",
"summary": "1919893",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1919893"
},
{
"category": "external",
"summary": "1921958",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1921958"
},
{
"category": "external",
"summary": "1923636",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1923636"
},
{
"category": "external",
"summary": "1930376",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1930376"
},
{
"category": "external",
"summary": "1930379",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1930379"
},
{
"category": "external",
"summary": "1930381",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1930381"
},
{
"category": "external",
"summary": "1933527",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1933527"
},
{
"category": "external",
"summary": "1939341",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1939341"
},
{
"category": "external",
"summary": "1941762",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1941762"
},
{
"category": "external",
"summary": "1941784",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1941784"
},
{
"category": "external",
"summary": "1945345",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1945345"
},
{
"category": "external",
"summary": "1945388",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1945388"
},
{
"category": "external",
"summary": "1946965",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1946965"
},
{
"category": "external",
"summary": "1948772",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1948772"
},
{
"category": "external",
"summary": "1951595",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1951595"
},
{
"category": "external",
"summary": "1953847",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1953847"
},
{
"category": "external",
"summary": "1954588",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1954588"
},
{
"category": "external",
"summary": "1957788",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1957788"
},
{
"category": "external",
"summary": "1959559",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1959559"
},
{
"category": "external",
"summary": "1959642",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1959642"
},
{
"category": "external",
"summary": "1959654",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1959654"
},
{
"category": "external",
"summary": "1959657",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1959657"
},
{
"category": "external",
"summary": "1959663",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1959663"
},
{
"category": "external",
"summary": "1960490",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1960490"
},
{
"category": "external",
"summary": "1960492",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1960492"
},
{
"category": "external",
"summary": "1960496",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1960496"
},
{
"category": "external",
"summary": "1960498",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1960498"
},
{
"category": "external",
"summary": "1960500",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1960500"
},
{
"category": "external",
"summary": "1960502",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1960502"
},
{
"category": "external",
"summary": "1960504",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1960504"
},
{
"category": "external",
"summary": "1960708",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1960708"
},
{
"category": "external",
"summary": "1964028",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1964028"
},
{
"category": "external",
"summary": "1964139",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1964139"
},
{
"category": "external",
"summary": "1965038",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965038"
},
{
"category": "external",
"summary": "1965360",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965360"
},
{
"category": "external",
"summary": "1965458",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965458"
},
{
"category": "external",
"summary": "1966578",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1966578"
},
{
"category": "external",
"summary": "1969489",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1969489"
},
{
"category": "external",
"summary": "1971101",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1971101"
},
{
"category": "external",
"summary": "1972278",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1972278"
},
{
"category": "external",
"summary": "1974627",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1974627"
},
{
"category": "external",
"summary": "1975182",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1975182"
},
{
"category": "external",
"summary": "1975949",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1975949"
},
{
"category": "external",
"summary": "1976679",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1976679"
},
{
"category": "external",
"summary": "1976699",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1976699"
},
{
"category": "external",
"summary": "1976946",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1976946"
},
{
"category": "external",
"summary": "1976969",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1976969"
},
{
"category": "external",
"summary": "1977162",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1977162"
},
{
"category": "external",
"summary": "1977422",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1977422"
},
{
"category": "external",
"summary": "1977537",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1977537"
},
{
"category": "external",
"summary": "1977850",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1977850"
},
{
"category": "external",
"summary": "1978369",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1978369"
},
{
"category": "external",
"summary": "1979070",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1979070"
},
{
"category": "external",
"summary": "1979680",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1979680"
},
{
"category": "external",
"summary": "1981954",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1981954"
},
{
"category": "external",
"summary": "1986138",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986138"
},
{
"category": "external",
"summary": "1989165",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1989165"
},
{
"category": "external",
"summary": "1989999",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1989999"
},
{
"category": "external",
"summary": "1991976",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1991976"
},
{
"category": "external",
"summary": "1992700",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1992700"
},
{
"category": "external",
"summary": "1995249",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1995249"
},
{
"category": "external",
"summary": "1996854",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1996854"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_4356.json"
}
],
"title": "Red Hat Security Advisory: kernel security, bug fix, and enhancement update",
"tracking": {
"current_release_date": "2025-10-28T19:33:53+00:00",
"generator": {
"date": "2025-10-28T19:33:53+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.10"
}
},
"id": "RHSA-2021:4356",
"initial_release_date": "2021-11-09T18:06:54+00:00",
"revision_history": [
{
"date": "2021-11-09T18:06:54+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2021-11-09T18:06:54+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-28T19:33:53+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux BaseOS (v. 8)",
"product": {
"name": "Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:8::baseos"
}
}
},
{
"category": "product_name",
"name": "Red Hat CodeReady Linux Builder (v. 8)",
"product": {
"name": "Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:8::crb"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:4.18.0-348.el8.aarch64",
"product": {
"name": "bpftool-0:4.18.0-348.el8.aarch64",
"product_id": "bpftool-0:4.18.0-348.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@4.18.0-348.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.18.0-348.el8.aarch64",
"product": {
"name": "kernel-0:4.18.0-348.el8.aarch64",
"product_id": "kernel-0:4.18.0-348.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-348.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:4.18.0-348.el8.aarch64",
"product": {
"name": "kernel-core-0:4.18.0-348.el8.aarch64",
"product_id": "kernel-core-0:4.18.0-348.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@4.18.0-348.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"product": {
"name": "kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"product_id": "kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-348.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.18.0-348.el8.aarch64",
"product": {
"name": "kernel-debug-0:4.18.0-348.el8.aarch64",
"product_id": "kernel-debug-0:4.18.0-348.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.18.0-348.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:4.18.0-348.el8.aarch64",
"product": {
"name": "kernel-debug-core-0:4.18.0-348.el8.aarch64",
"product_id": "kernel-debug-core-0:4.18.0-348.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-348.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"product": {
"name": "kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"product_id": "kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-348.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"product": {
"name": "kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"product_id": "kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-348.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"product": {
"name": "kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"product_id": "kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-348.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.18.0-348.el8.aarch64",
"product": {
"name": "kernel-devel-0:4.18.0-348.el8.aarch64",
"product_id": "kernel-devel-0:4.18.0-348.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.18.0-348.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:4.18.0-348.el8.aarch64",
"product": {
"name": "kernel-headers-0:4.18.0-348.el8.aarch64",
"product_id": "kernel-headers-0:4.18.0-348.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@4.18.0-348.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:4.18.0-348.el8.aarch64",
"product": {
"name": "kernel-modules-0:4.18.0-348.el8.aarch64",
"product_id": "kernel-modules-0:4.18.0-348.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@4.18.0-348.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"product": {
"name": "kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"product_id": "kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-348.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:4.18.0-348.el8.aarch64",
"product": {
"name": "kernel-tools-0:4.18.0-348.el8.aarch64",
"product_id": "kernel-tools-0:4.18.0-348.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@4.18.0-348.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"product": {
"name": "kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"product_id": "kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-348.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.18.0-348.el8.aarch64",
"product": {
"name": "perf-0:4.18.0-348.el8.aarch64",
"product_id": "perf-0:4.18.0-348.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.18.0-348.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:4.18.0-348.el8.aarch64",
"product": {
"name": "python3-perf-0:4.18.0-348.el8.aarch64",
"product_id": "python3-perf-0:4.18.0-348.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@4.18.0-348.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"product": {
"name": "bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"product_id": "bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-348.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"product": {
"name": "kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"product_id": "kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-348.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"product": {
"name": "kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"product_id": "kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-348.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"product": {
"name": "kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"product_id": "kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-aarch64@4.18.0-348.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"product": {
"name": "kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"product_id": "kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-348.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.18.0-348.el8.aarch64",
"product": {
"name": "perf-debuginfo-0:4.18.0-348.el8.aarch64",
"product_id": "perf-debuginfo-0:4.18.0-348.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-348.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"product": {
"name": "python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"product_id": "python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-348.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"product": {
"name": "kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"product_id": "kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.18.0-348.el8?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:4.18.0-348.el8.ppc64le",
"product": {
"name": "bpftool-0:4.18.0-348.el8.ppc64le",
"product_id": "bpftool-0:4.18.0-348.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@4.18.0-348.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.18.0-348.el8.ppc64le",
"product": {
"name": "kernel-0:4.18.0-348.el8.ppc64le",
"product_id": "kernel-0:4.18.0-348.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-348.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:4.18.0-348.el8.ppc64le",
"product": {
"name": "kernel-core-0:4.18.0-348.el8.ppc64le",
"product_id": "kernel-core-0:4.18.0-348.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@4.18.0-348.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"product": {
"name": "kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"product_id": "kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-348.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.18.0-348.el8.ppc64le",
"product": {
"name": "kernel-debug-0:4.18.0-348.el8.ppc64le",
"product_id": "kernel-debug-0:4.18.0-348.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.18.0-348.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"product": {
"name": "kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"product_id": "kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-348.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"product": {
"name": "kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"product_id": "kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-348.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"product": {
"name": "kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"product_id": "kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-348.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"product": {
"name": "kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"product_id": "kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-348.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.18.0-348.el8.ppc64le",
"product": {
"name": "kernel-devel-0:4.18.0-348.el8.ppc64le",
"product_id": "kernel-devel-0:4.18.0-348.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.18.0-348.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:4.18.0-348.el8.ppc64le",
"product": {
"name": "kernel-headers-0:4.18.0-348.el8.ppc64le",
"product_id": "kernel-headers-0:4.18.0-348.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@4.18.0-348.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:4.18.0-348.el8.ppc64le",
"product": {
"name": "kernel-modules-0:4.18.0-348.el8.ppc64le",
"product_id": "kernel-modules-0:4.18.0-348.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@4.18.0-348.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"product": {
"name": "kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"product_id": "kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-348.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:4.18.0-348.el8.ppc64le",
"product": {
"name": "kernel-tools-0:4.18.0-348.el8.ppc64le",
"product_id": "kernel-tools-0:4.18.0-348.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@4.18.0-348.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"product": {
"name": "kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"product_id": "kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-348.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.18.0-348.el8.ppc64le",
"product": {
"name": "perf-0:4.18.0-348.el8.ppc64le",
"product_id": "perf-0:4.18.0-348.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.18.0-348.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:4.18.0-348.el8.ppc64le",
"product": {
"name": "python3-perf-0:4.18.0-348.el8.ppc64le",
"product_id": "python3-perf-0:4.18.0-348.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@4.18.0-348.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"product": {
"name": "bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"product_id": "bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-348.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"product": {
"name": "kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"product_id": "kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-348.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"product": {
"name": "kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"product_id": "kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-348.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"product": {
"name": "kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"product_id": "kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64le@4.18.0-348.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"product": {
"name": "kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"product_id": "kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-348.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"product": {
"name": "perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"product_id": "perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-348.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"product": {
"name": "python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"product_id": "python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-348.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"product": {
"name": "kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"product_id": "kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.18.0-348.el8?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:4.18.0-348.el8.x86_64",
"product": {
"name": "bpftool-0:4.18.0-348.el8.x86_64",
"product_id": "bpftool-0:4.18.0-348.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@4.18.0-348.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.18.0-348.el8.x86_64",
"product": {
"name": "kernel-0:4.18.0-348.el8.x86_64",
"product_id": "kernel-0:4.18.0-348.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-348.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:4.18.0-348.el8.x86_64",
"product": {
"name": "kernel-core-0:4.18.0-348.el8.x86_64",
"product_id": "kernel-core-0:4.18.0-348.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@4.18.0-348.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"product": {
"name": "kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"product_id": "kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-348.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.18.0-348.el8.x86_64",
"product": {
"name": "kernel-debug-0:4.18.0-348.el8.x86_64",
"product_id": "kernel-debug-0:4.18.0-348.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.18.0-348.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:4.18.0-348.el8.x86_64",
"product": {
"name": "kernel-debug-core-0:4.18.0-348.el8.x86_64",
"product_id": "kernel-debug-core-0:4.18.0-348.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-348.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"product": {
"name": "kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"product_id": "kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-348.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"product": {
"name": "kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"product_id": "kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-348.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"product": {
"name": "kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"product_id": "kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-348.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.18.0-348.el8.x86_64",
"product": {
"name": "kernel-devel-0:4.18.0-348.el8.x86_64",
"product_id": "kernel-devel-0:4.18.0-348.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.18.0-348.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:4.18.0-348.el8.x86_64",
"product": {
"name": "kernel-headers-0:4.18.0-348.el8.x86_64",
"product_id": "kernel-headers-0:4.18.0-348.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@4.18.0-348.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:4.18.0-348.el8.x86_64",
"product": {
"name": "kernel-modules-0:4.18.0-348.el8.x86_64",
"product_id": "kernel-modules-0:4.18.0-348.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@4.18.0-348.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"product": {
"name": "kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"product_id": "kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-348.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:4.18.0-348.el8.x86_64",
"product": {
"name": "kernel-tools-0:4.18.0-348.el8.x86_64",
"product_id": "kernel-tools-0:4.18.0-348.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@4.18.0-348.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"product": {
"name": "kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"product_id": "kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-348.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.18.0-348.el8.x86_64",
"product": {
"name": "perf-0:4.18.0-348.el8.x86_64",
"product_id": "perf-0:4.18.0-348.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.18.0-348.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:4.18.0-348.el8.x86_64",
"product": {
"name": "python3-perf-0:4.18.0-348.el8.x86_64",
"product_id": "python3-perf-0:4.18.0-348.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@4.18.0-348.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"product": {
"name": "bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"product_id": "bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-348.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"product": {
"name": "kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"product_id": "kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-348.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"product": {
"name": "kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"product_id": "kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-348.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"product": {
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"product_id": "kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@4.18.0-348.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"product": {
"name": "kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"product_id": "kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-348.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.18.0-348.el8.x86_64",
"product": {
"name": "perf-debuginfo-0:4.18.0-348.el8.x86_64",
"product_id": "perf-debuginfo-0:4.18.0-348.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-348.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"product": {
"name": "python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"product_id": "python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-348.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"product": {
"name": "kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"product_id": "kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.18.0-348.el8?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:4.18.0-348.el8.s390x",
"product": {
"name": "bpftool-0:4.18.0-348.el8.s390x",
"product_id": "bpftool-0:4.18.0-348.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@4.18.0-348.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.18.0-348.el8.s390x",
"product": {
"name": "kernel-0:4.18.0-348.el8.s390x",
"product_id": "kernel-0:4.18.0-348.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-348.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:4.18.0-348.el8.s390x",
"product": {
"name": "kernel-core-0:4.18.0-348.el8.s390x",
"product_id": "kernel-core-0:4.18.0-348.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@4.18.0-348.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:4.18.0-348.el8.s390x",
"product": {
"name": "kernel-cross-headers-0:4.18.0-348.el8.s390x",
"product_id": "kernel-cross-headers-0:4.18.0-348.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-348.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.18.0-348.el8.s390x",
"product": {
"name": "kernel-debug-0:4.18.0-348.el8.s390x",
"product_id": "kernel-debug-0:4.18.0-348.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.18.0-348.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:4.18.0-348.el8.s390x",
"product": {
"name": "kernel-debug-core-0:4.18.0-348.el8.s390x",
"product_id": "kernel-debug-core-0:4.18.0-348.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-348.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.18.0-348.el8.s390x",
"product": {
"name": "kernel-debug-devel-0:4.18.0-348.el8.s390x",
"product_id": "kernel-debug-devel-0:4.18.0-348.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-348.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:4.18.0-348.el8.s390x",
"product": {
"name": "kernel-debug-modules-0:4.18.0-348.el8.s390x",
"product_id": "kernel-debug-modules-0:4.18.0-348.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-348.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"product": {
"name": "kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"product_id": "kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-348.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.18.0-348.el8.s390x",
"product": {
"name": "kernel-devel-0:4.18.0-348.el8.s390x",
"product_id": "kernel-devel-0:4.18.0-348.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.18.0-348.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:4.18.0-348.el8.s390x",
"product": {
"name": "kernel-headers-0:4.18.0-348.el8.s390x",
"product_id": "kernel-headers-0:4.18.0-348.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@4.18.0-348.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:4.18.0-348.el8.s390x",
"product": {
"name": "kernel-modules-0:4.18.0-348.el8.s390x",
"product_id": "kernel-modules-0:4.18.0-348.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@4.18.0-348.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:4.18.0-348.el8.s390x",
"product": {
"name": "kernel-modules-extra-0:4.18.0-348.el8.s390x",
"product_id": "kernel-modules-extra-0:4.18.0-348.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-348.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:4.18.0-348.el8.s390x",
"product": {
"name": "kernel-tools-0:4.18.0-348.el8.s390x",
"product_id": "kernel-tools-0:4.18.0-348.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@4.18.0-348.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"product": {
"name": "kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"product_id": "kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump@4.18.0-348.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"product": {
"name": "kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"product_id": "kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-core@4.18.0-348.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"product": {
"name": "kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"product_id": "kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-devel@4.18.0-348.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"product": {
"name": "kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"product_id": "kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-modules@4.18.0-348.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"product": {
"name": "kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"product_id": "kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-modules-extra@4.18.0-348.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.18.0-348.el8.s390x",
"product": {
"name": "perf-0:4.18.0-348.el8.s390x",
"product_id": "perf-0:4.18.0-348.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.18.0-348.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:4.18.0-348.el8.s390x",
"product": {
"name": "python3-perf-0:4.18.0-348.el8.s390x",
"product_id": "python3-perf-0:4.18.0-348.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@4.18.0-348.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"product": {
"name": "bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"product_id": "bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-348.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"product": {
"name": "kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"product_id": "kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-348.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.18.0-348.el8.s390x",
"product": {
"name": "kernel-debuginfo-0:4.18.0-348.el8.s390x",
"product_id": "kernel-debuginfo-0:4.18.0-348.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-348.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"product": {
"name": "kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"product_id": "kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-s390x@4.18.0-348.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"product": {
"name": "kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"product_id": "kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-348.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"product": {
"name": "kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"product_id": "kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-debuginfo@4.18.0-348.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.18.0-348.el8.s390x",
"product": {
"name": "perf-debuginfo-0:4.18.0-348.el8.s390x",
"product_id": "perf-debuginfo-0:4.18.0-348.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-348.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"product": {
"name": "python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"product_id": "python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-348.el8?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:4.18.0-348.el8.src",
"product": {
"name": "kernel-0:4.18.0-348.el8.src",
"product_id": "kernel-0:4.18.0-348.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-348.el8?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"product": {
"name": "kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"product_id": "kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-abi-stablelists@4.18.0-348.el8?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "kernel-doc-0:4.18.0-348.el8.noarch",
"product": {
"name": "kernel-doc-0:4.18.0-348.el8.noarch",
"product_id": "kernel-doc-0:4.18.0-348.el8.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-doc@4.18.0-348.el8?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-348.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64"
},
"product_reference": "bpftool-0:4.18.0-348.el8.aarch64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-348.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le"
},
"product_reference": "bpftool-0:4.18.0-348.el8.ppc64le",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-348.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x"
},
"product_reference": "bpftool-0:4.18.0-348.el8.s390x",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-348.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64"
},
"product_reference": "bpftool-0:4.18.0-348.el8.x86_64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-348.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-348.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-348.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-348.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-348.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64"
},
"product_reference": "kernel-0:4.18.0-348.el8.aarch64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-348.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le"
},
"product_reference": "kernel-0:4.18.0-348.el8.ppc64le",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-348.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x"
},
"product_reference": "kernel-0:4.18.0-348.el8.s390x",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-348.el8.src as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src"
},
"product_reference": "kernel-0:4.18.0-348.el8.src",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-348.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64"
},
"product_reference": "kernel-0:4.18.0-348.el8.x86_64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-stablelists-0:4.18.0-348.el8.noarch as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch"
},
"product_reference": "kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-348.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64"
},
"product_reference": "kernel-core-0:4.18.0-348.el8.aarch64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-348.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le"
},
"product_reference": "kernel-core-0:4.18.0-348.el8.ppc64le",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-348.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x"
},
"product_reference": "kernel-core-0:4.18.0-348.el8.s390x",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-348.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64"
},
"product_reference": "kernel-core-0:4.18.0-348.el8.x86_64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-348.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64"
},
"product_reference": "kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-348.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le"
},
"product_reference": "kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-348.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x"
},
"product_reference": "kernel-cross-headers-0:4.18.0-348.el8.s390x",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-348.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64"
},
"product_reference": "kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-348.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64"
},
"product_reference": "kernel-debug-0:4.18.0-348.el8.aarch64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-348.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le"
},
"product_reference": "kernel-debug-0:4.18.0-348.el8.ppc64le",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-348.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x"
},
"product_reference": "kernel-debug-0:4.18.0-348.el8.s390x",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-348.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64"
},
"product_reference": "kernel-debug-0:4.18.0-348.el8.x86_64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-348.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64"
},
"product_reference": "kernel-debug-core-0:4.18.0-348.el8.aarch64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-348.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le"
},
"product_reference": "kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-348.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x"
},
"product_reference": "kernel-debug-core-0:4.18.0-348.el8.s390x",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-348.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64"
},
"product_reference": "kernel-debug-core-0:4.18.0-348.el8.x86_64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-348.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-348.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64"
},
"product_reference": "kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-348.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le"
},
"product_reference": "kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-348.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x"
},
"product_reference": "kernel-debug-devel-0:4.18.0-348.el8.s390x",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-348.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64"
},
"product_reference": "kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-348.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64"
},
"product_reference": "kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-348.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le"
},
"product_reference": "kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-348.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x"
},
"product_reference": "kernel-debug-modules-0:4.18.0-348.el8.s390x",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-348.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64"
},
"product_reference": "kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-348.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-348.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64"
},
"product_reference": "kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-348.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le"
},
"product_reference": "kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-348.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x"
},
"product_reference": "kernel-debuginfo-0:4.18.0-348.el8.s390x",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-348.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64"
},
"product_reference": "kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64"
},
"product_reference": "kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-348.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64"
},
"product_reference": "kernel-devel-0:4.18.0-348.el8.aarch64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-348.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le"
},
"product_reference": "kernel-devel-0:4.18.0-348.el8.ppc64le",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-348.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x"
},
"product_reference": "kernel-devel-0:4.18.0-348.el8.s390x",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-348.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64"
},
"product_reference": "kernel-devel-0:4.18.0-348.el8.x86_64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:4.18.0-348.el8.noarch as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch"
},
"product_reference": "kernel-doc-0:4.18.0-348.el8.noarch",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-348.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64"
},
"product_reference": "kernel-headers-0:4.18.0-348.el8.aarch64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-348.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le"
},
"product_reference": "kernel-headers-0:4.18.0-348.el8.ppc64le",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-348.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x"
},
"product_reference": "kernel-headers-0:4.18.0-348.el8.s390x",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-348.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
},
"product_reference": "kernel-headers-0:4.18.0-348.el8.x86_64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-348.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64"
},
"product_reference": "kernel-modules-0:4.18.0-348.el8.aarch64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-348.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le"
},
"product_reference": "kernel-modules-0:4.18.0-348.el8.ppc64le",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-348.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x"
},
"product_reference": "kernel-modules-0:4.18.0-348.el8.s390x",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-348.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64"
},
"product_reference": "kernel-modules-0:4.18.0-348.el8.x86_64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-348.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64"
},
"product_reference": "kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-348.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le"
},
"product_reference": "kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-348.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x"
},
"product_reference": "kernel-modules-extra-0:4.18.0-348.el8.s390x",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-348.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64"
},
"product_reference": "kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-348.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64"
},
"product_reference": "kernel-tools-0:4.18.0-348.el8.aarch64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-348.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le"
},
"product_reference": "kernel-tools-0:4.18.0-348.el8.ppc64le",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-348.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x"
},
"product_reference": "kernel-tools-0:4.18.0-348.el8.s390x",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-348.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64"
},
"product_reference": "kernel-tools-0:4.18.0-348.el8.x86_64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-348.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-348.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64"
},
"product_reference": "kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-348.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le"
},
"product_reference": "kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-348.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64"
},
"product_reference": "kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-0:4.18.0-348.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x"
},
"product_reference": "kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-core-0:4.18.0-348.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x"
},
"product_reference": "kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x"
},
"product_reference": "kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x"
},
"product_reference": "kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x"
},
"product_reference": "kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x"
},
"product_reference": "kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-348.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64"
},
"product_reference": "perf-0:4.18.0-348.el8.aarch64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-348.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le"
},
"product_reference": "perf-0:4.18.0-348.el8.ppc64le",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-348.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x"
},
"product_reference": "perf-0:4.18.0-348.el8.s390x",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-348.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64"
},
"product_reference": "perf-0:4.18.0-348.el8.x86_64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-348.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64"
},
"product_reference": "perf-debuginfo-0:4.18.0-348.el8.aarch64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-348.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le"
},
"product_reference": "perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-348.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x"
},
"product_reference": "perf-debuginfo-0:4.18.0-348.el8.s390x",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-348.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64"
},
"product_reference": "perf-debuginfo-0:4.18.0-348.el8.x86_64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-348.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64"
},
"product_reference": "python3-perf-0:4.18.0-348.el8.aarch64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-348.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le"
},
"product_reference": "python3-perf-0:4.18.0-348.el8.ppc64le",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-348.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x"
},
"product_reference": "python3-perf-0:4.18.0-348.el8.s390x",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-348.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64"
},
"product_reference": "python3-perf-0:4.18.0-348.el8.x86_64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-348.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-348.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-348.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-348.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64"
},
"product_reference": "bpftool-0:4.18.0-348.el8.aarch64",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-348.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le"
},
"product_reference": "bpftool-0:4.18.0-348.el8.ppc64le",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-348.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x"
},
"product_reference": "bpftool-0:4.18.0-348.el8.s390x",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-348.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64"
},
"product_reference": "bpftool-0:4.18.0-348.el8.x86_64",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-348.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-348.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-348.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-348.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-348.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64"
},
"product_reference": "kernel-0:4.18.0-348.el8.aarch64",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-348.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le"
},
"product_reference": "kernel-0:4.18.0-348.el8.ppc64le",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-348.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x"
},
"product_reference": "kernel-0:4.18.0-348.el8.s390x",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-348.el8.src as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src"
},
"product_reference": "kernel-0:4.18.0-348.el8.src",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-348.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64"
},
"product_reference": "kernel-0:4.18.0-348.el8.x86_64",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-stablelists-0:4.18.0-348.el8.noarch as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch"
},
"product_reference": "kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-348.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64"
},
"product_reference": "kernel-core-0:4.18.0-348.el8.aarch64",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-348.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le"
},
"product_reference": "kernel-core-0:4.18.0-348.el8.ppc64le",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-348.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x"
},
"product_reference": "kernel-core-0:4.18.0-348.el8.s390x",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-348.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64"
},
"product_reference": "kernel-core-0:4.18.0-348.el8.x86_64",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-348.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64"
},
"product_reference": "kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-348.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le"
},
"product_reference": "kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-348.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x"
},
"product_reference": "kernel-cross-headers-0:4.18.0-348.el8.s390x",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-348.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64"
},
"product_reference": "kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-348.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64"
},
"product_reference": "kernel-debug-0:4.18.0-348.el8.aarch64",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-348.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le"
},
"product_reference": "kernel-debug-0:4.18.0-348.el8.ppc64le",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-348.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x"
},
"product_reference": "kernel-debug-0:4.18.0-348.el8.s390x",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-348.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64"
},
"product_reference": "kernel-debug-0:4.18.0-348.el8.x86_64",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-348.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64"
},
"product_reference": "kernel-debug-core-0:4.18.0-348.el8.aarch64",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-348.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le"
},
"product_reference": "kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-348.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x"
},
"product_reference": "kernel-debug-core-0:4.18.0-348.el8.s390x",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-348.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64"
},
"product_reference": "kernel-debug-core-0:4.18.0-348.el8.x86_64",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-348.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-348.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64"
},
"product_reference": "kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-348.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le"
},
"product_reference": "kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-348.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x"
},
"product_reference": "kernel-debug-devel-0:4.18.0-348.el8.s390x",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-348.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64"
},
"product_reference": "kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-348.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64"
},
"product_reference": "kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-348.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le"
},
"product_reference": "kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-348.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x"
},
"product_reference": "kernel-debug-modules-0:4.18.0-348.el8.s390x",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-348.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64"
},
"product_reference": "kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-348.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-348.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64"
},
"product_reference": "kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-348.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le"
},
"product_reference": "kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-348.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x"
},
"product_reference": "kernel-debuginfo-0:4.18.0-348.el8.s390x",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-348.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64"
},
"product_reference": "kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64"
},
"product_reference": "kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-348.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64"
},
"product_reference": "kernel-devel-0:4.18.0-348.el8.aarch64",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-348.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le"
},
"product_reference": "kernel-devel-0:4.18.0-348.el8.ppc64le",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-348.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x"
},
"product_reference": "kernel-devel-0:4.18.0-348.el8.s390x",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-348.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64"
},
"product_reference": "kernel-devel-0:4.18.0-348.el8.x86_64",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:4.18.0-348.el8.noarch as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch"
},
"product_reference": "kernel-doc-0:4.18.0-348.el8.noarch",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-348.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64"
},
"product_reference": "kernel-headers-0:4.18.0-348.el8.aarch64",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-348.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le"
},
"product_reference": "kernel-headers-0:4.18.0-348.el8.ppc64le",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-348.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x"
},
"product_reference": "kernel-headers-0:4.18.0-348.el8.s390x",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-348.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
},
"product_reference": "kernel-headers-0:4.18.0-348.el8.x86_64",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-348.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64"
},
"product_reference": "kernel-modules-0:4.18.0-348.el8.aarch64",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-348.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le"
},
"product_reference": "kernel-modules-0:4.18.0-348.el8.ppc64le",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-348.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x"
},
"product_reference": "kernel-modules-0:4.18.0-348.el8.s390x",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-348.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64"
},
"product_reference": "kernel-modules-0:4.18.0-348.el8.x86_64",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-348.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64"
},
"product_reference": "kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-348.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le"
},
"product_reference": "kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-348.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x"
},
"product_reference": "kernel-modules-extra-0:4.18.0-348.el8.s390x",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-348.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64"
},
"product_reference": "kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-348.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64"
},
"product_reference": "kernel-tools-0:4.18.0-348.el8.aarch64",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-348.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le"
},
"product_reference": "kernel-tools-0:4.18.0-348.el8.ppc64le",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-348.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x"
},
"product_reference": "kernel-tools-0:4.18.0-348.el8.s390x",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-348.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64"
},
"product_reference": "kernel-tools-0:4.18.0-348.el8.x86_64",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-348.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-348.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64"
},
"product_reference": "kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-348.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le"
},
"product_reference": "kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-348.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64"
},
"product_reference": "kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-0:4.18.0-348.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x"
},
"product_reference": "kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-core-0:4.18.0-348.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x"
},
"product_reference": "kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x"
},
"product_reference": "kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x"
},
"product_reference": "kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x"
},
"product_reference": "kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x"
},
"product_reference": "kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-348.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64"
},
"product_reference": "perf-0:4.18.0-348.el8.aarch64",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-348.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le"
},
"product_reference": "perf-0:4.18.0-348.el8.ppc64le",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-348.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x"
},
"product_reference": "perf-0:4.18.0-348.el8.s390x",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-348.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64"
},
"product_reference": "perf-0:4.18.0-348.el8.x86_64",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-348.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64"
},
"product_reference": "perf-debuginfo-0:4.18.0-348.el8.aarch64",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-348.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le"
},
"product_reference": "perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-348.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x"
},
"product_reference": "perf-debuginfo-0:4.18.0-348.el8.s390x",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-348.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64"
},
"product_reference": "perf-debuginfo-0:4.18.0-348.el8.x86_64",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-348.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64"
},
"product_reference": "python3-perf-0:4.18.0-348.el8.aarch64",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-348.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le"
},
"product_reference": "python3-perf-0:4.18.0-348.el8.ppc64le",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-348.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x"
},
"product_reference": "python3-perf-0:4.18.0-348.el8.s390x",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-348.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64"
},
"product_reference": "python3-perf-0:4.18.0-348.el8.x86_64",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-348.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-348.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-348.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"relates_to_product_reference": "CRB-8.5.0.GA"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2019-14615",
"cwe": {
"id": "CWE-212",
"name": "Improper Removal of Sensitive Information Before Storage or Transfer"
},
"discovery_date": "2020-01-09T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1789209"
}
],
"notes": [
{
"category": "description",
"text": "An information disclosure flaw was found in the Linux kernel. The i915 graphics driver lacks control of flow for data structures which may allow a local, authenticated user to disclose information when using ioctl commands with an attached i915 device. The highest threat from this vulnerability is to data confidentiality.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Intel graphics card information leak.",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue affects the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 6, 7, 8 and Red Hat Enterprise MRG 2. Future kernel updates for Red Hat Enterprise Linux 6, 7, and 8 may address this issue.\n\nThis has been rated as having Moderate security impact and is not currently planned to be addressed in future updates of Red Hat Enterprise MRG 2.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-14615"
},
{
"category": "external",
"summary": "RHBZ#1789209",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1789209"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-14615",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14615"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-14615",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-14615"
}
],
"release_date": "2020-01-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T18:06:54+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4356"
},
{
"category": "workaround",
"details": "Preventing loading of the i915 kernel module will prevent attackers from using this exploit against the system; however, the power management functionality of the card will be disabled and the system may draw additional power. See the kcs \u201cHow do I blacklist a kernel module to prevent it from loading automatically?\u201c (https://access.redhat.com/solutions/41278) for instructions on how to disable a kernel module from autoloading. Graphical displays may also be at low resolution or not work correctly.\n\nThis mitigation may not be suitable if the graphical login functionality is required.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: Intel graphics card information leak."
},
{
"cve": "CVE-2019-15794",
"cwe": {
"id": "CWE-672",
"name": "Operation on a Resource after Expiration or Release"
},
"discovery_date": "2020-05-04T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1831055"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel. In Overlayfs, vma-\u003evm_file was replaced in the mmap handlers and, on errors, the original value is not restored. A local attacker with special user privilege (or root) can cause a kernel internal information leak. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Overlayfs in the Linux kernel and shiftfs not restoring original value on error leading to a refcount underflow",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-15794"
},
{
"category": "external",
"summary": "RHBZ#1831055",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1831055"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-15794",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-15794"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-15794",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-15794"
}
],
"release_date": "2019-11-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T18:06:54+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4356"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: Overlayfs in the Linux kernel and shiftfs not restoring original value on error leading to a refcount underflow"
},
{
"cve": "CVE-2020-0427",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2021-01-24T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1919893"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux pinctrl system. It is possible to trigger an of bounds read due to a use after free. This could lead to local information disclosure with no additional execution privileges needed.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: out-of-bounds reads in pinctrl subsystem.",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-0427"
},
{
"category": "external",
"summary": "RHBZ#1919893",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1919893"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-0427",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0427"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-0427",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-0427"
}
],
"release_date": "2020-11-22T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T18:06:54+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4356"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: out-of-bounds reads in pinctrl subsystem."
},
{
"cve": "CVE-2020-24502",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2021-02-17T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1930379"
}
],
"notes": [
{
"category": "description",
"text": "Improper input validation in some Intel(R) Ethernet E810 Adapter drivers for Linux may allow an authenticated user to potentially enable a denial of service via local access.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Improper input validation in some Intel(R) Ethernet E810 Adapter drivers",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-24502"
},
{
"category": "external",
"summary": "RHBZ#1930379",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1930379"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-24502",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24502"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-24502",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-24502"
}
],
"release_date": "2021-02-17T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T18:06:54+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4356"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: Improper input validation in some Intel(R) Ethernet E810 Adapter drivers"
},
{
"cve": "CVE-2020-24503",
"cwe": {
"id": "CWE-863",
"name": "Incorrect Authorization"
},
"discovery_date": "2021-02-17T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1930381"
}
],
"notes": [
{
"category": "description",
"text": "Insufficient access control in some Intel(R) Ethernet E810 Adapter drivers for Linux may allow an authenticated user to potentially enable information disclosure via local access.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Insufficient access control in some Intel(R) Ethernet E810 Adapter drivers",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-24503"
},
{
"category": "external",
"summary": "RHBZ#1930381",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1930381"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-24503",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24503"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-24503",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-24503"
}
],
"release_date": "2021-02-17T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T18:06:54+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4356"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: Insufficient access control in some Intel(R) Ethernet E810 Adapter drivers"
},
{
"cve": "CVE-2020-24504",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2021-02-17T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1930376"
}
],
"notes": [
{
"category": "description",
"text": "An uncontrolled resource consumption in some Intel(R) Ethernet E810 Adapter drivers for Linux may allow an authenticated user to potentially cause a denial of service via local access.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Uncontrolled resource consumption in some Intel(R) Ethernet E810 Adapter drivers",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-24504"
},
{
"category": "external",
"summary": "RHBZ#1930376",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1930376"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-24504",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24504"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-24504",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-24504"
},
{
"category": "external",
"summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00462.html",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00462.html"
}
],
"release_date": "2021-02-17T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T18:06:54+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4356"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: Uncontrolled resource consumption in some Intel(R) Ethernet E810 Adapter drivers"
},
{
"cve": "CVE-2020-24586",
"cwe": {
"id": "CWE-212",
"name": "Improper Removal of Sensitive Information Before Storage or Transfer"
},
"discovery_date": "2021-05-12T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1959642"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernels implementation of wifi fragmentation handling. An attacker with the ability to transmit within the wireless transmission range of an access point can abuse a flaw where previous contents of wifi fragments can be unintentionally transmitted to another device.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Fragmentation cache not cleared on reconnection",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-24586"
},
{
"category": "external",
"summary": "RHBZ#1959642",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1959642"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-24586",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24586"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-24586",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-24586"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-wireless/20210511200110.3f8290e59823.I622a67769ed39257327a362cfc09c812320eb979@changeid/",
"url": "https://lore.kernel.org/linux-wireless/20210511200110.3f8290e59823.I622a67769ed39257327a362cfc09c812320eb979@changeid/"
}
],
"release_date": "2021-05-12T01:20:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T18:06:54+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4356"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options does not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: Fragmentation cache not cleared on reconnection"
},
{
"cve": "CVE-2020-24587",
"cwe": {
"id": "CWE-345",
"name": "Insufficient Verification of Data Authenticity"
},
"discovery_date": "2021-05-12T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1959654"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel\u0027s WiFi implementation. An attacker within the wireless range can abuse a logic flaw in the WiFi implementation by reassembling packets from multiple fragments under different keys, treating them as valid. This flaw allows an attacker to send a fragment under an incorrect key, treating them as a valid fragment under the new key. The highest threat from this vulnerability is to confidentiality.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Reassembling fragments encrypted under different keys",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-24587"
},
{
"category": "external",
"summary": "RHBZ#1959654",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1959654"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-24587",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24587"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-24587",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-24587"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-wireless/20210511200110.3f8290e59823.I622a67769ed39257327a362cfc09c812320eb979@changeid/",
"url": "https://lore.kernel.org/linux-wireless/20210511200110.3f8290e59823.I622a67769ed39257327a362cfc09c812320eb979@changeid/"
}
],
"release_date": "2021-05-11T14:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T18:06:54+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4356"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options does not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "NONE",
"baseScore": 3.1,
"baseSeverity": "LOW",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: Reassembling fragments encrypted under different keys"
},
{
"cve": "CVE-2020-24588",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2021-05-12T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1959657"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernels wifi implementation. An attacker within wireless broadcast range can inject custom data into the wireless communication circumventing checks on the data. This can cause the frame to pass checks and be considered a valid frame of a different type.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: wifi frame payload being parsed incorrectly as an L2 frame",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-24588"
},
{
"category": "external",
"summary": "RHBZ#1959657",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1959657"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-24588",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24588"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-24588",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-24588"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-wireless/20210511200110.25d93176ddaf.I9e265b597f2cd23eb44573f35b625947b386a9de@changeid/",
"url": "https://lore.kernel.org/linux-wireless/20210511200110.25d93176ddaf.I9e265b597f2cd23eb44573f35b625947b386a9de@changeid/"
}
],
"release_date": "2021-05-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T18:06:54+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4356"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options does not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: wifi frame payload being parsed incorrectly as an L2 frame"
},
{
"cve": "CVE-2020-26139",
"cwe": {
"id": "CWE-829",
"name": "Inclusion of Functionality from Untrusted Control Sphere"
},
"discovery_date": "2021-05-12T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1959663"
}
],
"notes": [
{
"category": "description",
"text": "Frames used for authentication and key management between the AP and connected clients. Some clients may take these redirected frames masquerading as control mechanisms from the AP.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Forwarding EAPOL from unauthenticated wifi client",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-26139"
},
{
"category": "external",
"summary": "RHBZ#1959663",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1959663"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-26139",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26139"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-26139",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-26139"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-wireless/20210511200110.cb327ed0cabe.Ib7dcffa2a31f0913d660de65ba3c8aca75b1d10f@changeid/",
"url": "https://lore.kernel.org/linux-wireless/20210511200110.cb327ed0cabe.Ib7dcffa2a31f0913d660de65ba3c8aca75b1d10f@changeid/"
}
],
"release_date": "2021-05-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T18:06:54+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4356"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options does not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "NONE",
"baseScore": 3.5,
"baseSeverity": "LOW",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: Forwarding EAPOL from unauthenticated wifi client"
},
{
"cve": "CVE-2020-26140",
"cwe": {
"id": "CWE-346",
"name": "Origin Validation Error"
},
"discovery_date": "2021-05-07T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1960490"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in Linux kernel. Where the WiFi implementations accept plaintext frames in a protected WiFi network. An adversary can abuse this to inject arbitrary data frames independent of the network configuration.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: accepting plaintext data frames in protected networks",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-26140"
},
{
"category": "external",
"summary": "RHBZ#1960490",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1960490"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-26140",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26140"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-26140",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-26140"
}
],
"release_date": "2021-05-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T18:06:54+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4356"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: accepting plaintext data frames in protected networks"
},
{
"cve": "CVE-2020-26141",
"cwe": {
"id": "CWE-863",
"name": "Incorrect Authorization"
},
"discovery_date": "2021-05-07T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1960492"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in Linux kernel\u0027s WiFi implementation. An attacker within wireless range can inject a control packet fragment where the kernel does not verify the Message Integrity Check (authenticity) of fragmented TKIP frames.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: not verifying TKIP MIC of fragmented frames",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-26141"
},
{
"category": "external",
"summary": "RHBZ#1960492",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1960492"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-26141",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26141"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-26141",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-26141"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-wireless/20210511200110.c3f1d42c6746.I795593fcaae941c471425b8c7d5f7bb185d29142@changeid/",
"url": "https://lore.kernel.org/linux-wireless/20210511200110.c3f1d42c6746.I795593fcaae941c471425b8c7d5f7bb185d29142@changeid/"
}
],
"release_date": "2021-05-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T18:06:54+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4356"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options does not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: not verifying TKIP MIC of fragmented frames"
},
{
"cve": "CVE-2020-26143",
"cwe": {
"id": "CWE-346",
"name": "Origin Validation Error"
},
"discovery_date": "2021-05-07T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1960496"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in Linux kernel, where the WiFi implementations assemble fragments even though some of them were sent in plaintext. This vulnerability can be abused to inject packets and/or exfiltrate selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP data-confidentiality protocol is used.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: accepting fragmented plaintext frames in protected networks",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-26143"
},
{
"category": "external",
"summary": "RHBZ#1960496",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1960496"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-26143",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26143"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-26143",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-26143"
}
],
"release_date": "2021-05-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T18:06:54+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4356"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: accepting fragmented plaintext frames in protected networks"
},
{
"cve": "CVE-2020-26144",
"cwe": {
"id": "CWE-290",
"name": "Authentication Bypass by Spoofing"
},
"discovery_date": "2021-05-07T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1960498"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel, where the WiFi implementations accept plaintext A-MSDU frames as long as the first 8 bytes correspond to a valid RFC1042 (ex., LLC/SNAP) header for EAPOL. The highest threat from this vulnerability is to integrity.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: accepting unencrypted A-MSDU frames that start with RFC1042 header",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-26144"
},
{
"category": "external",
"summary": "RHBZ#1960498",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1960498"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-26144",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26144"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-26144",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-26144"
}
],
"release_date": "2021-05-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T18:06:54+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4356"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options does not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: accepting unencrypted A-MSDU frames that start with RFC1042 header"
},
{
"cve": "CVE-2020-26145",
"cwe": {
"id": "CWE-307",
"name": "Improper Restriction of Excessive Authentication Attempts"
},
"discovery_date": "2021-05-07T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1960500"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in ath10k_htt_rx_proc_rx_frag_ind_hl in drivers/net/wireless/ath/ath10k/htt_rx.c in the Linux kernel WiFi implementations, where it accepts a second (or subsequent) broadcast fragments even when sent in plaintext and then process them as full unfragmented frames. The highest threat from this vulnerability is to integrity.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: accepting plaintext broadcast fragments as full frames",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-26145"
},
{
"category": "external",
"summary": "RHBZ#1960500",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1960500"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-26145",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26145"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-26145",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-26145"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-wireless/20210511200110.9ca6ca7945a9.I1e18b514590af17c155bda86699bc3a971a8dcf4@changeid/",
"url": "https://lore.kernel.org/linux-wireless/20210511200110.9ca6ca7945a9.I1e18b514590af17c155bda86699bc3a971a8dcf4@changeid/"
}
],
"release_date": "2021-05-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T18:06:54+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4356"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options does not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: accepting plaintext broadcast fragments as full frames"
},
{
"cve": "CVE-2020-26146",
"cwe": {
"id": "CWE-307",
"name": "Improper Restriction of Excessive Authentication Attempts"
},
"discovery_date": "2021-05-07T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1960502"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in Linux kernel, where the WiFi implementation reassemble fragments with non-consecutive packet numbers. An adversary can abuse this to exfiltrate selected fragments. This vulnerability is exploitable when another device sends fragmented frames and the WEP, CCMP, or GCMP data-confidentiality protocol is used. Note that WEP is vulnerable to this attack by design.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: reassembling encrypted fragments with non-consecutive packet numbers",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-26146"
},
{
"category": "external",
"summary": "RHBZ#1960502",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1960502"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-26146",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26146"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-26146",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-26146"
}
],
"release_date": "2021-05-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T18:06:54+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4356"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: reassembling encrypted fragments with non-consecutive packet numbers"
},
{
"cve": "CVE-2020-26147",
"cwe": {
"id": "CWE-307",
"name": "Improper Restriction of Excessive Authentication Attempts"
},
"discovery_date": "2021-05-07T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1960504"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in ieee80211_rx_h_defragment in net/mac80211/rx.c in the Linux Kernel\u0027s WiFi implementation. This vulnerability can be abused to inject packets or exfiltrate selected fragments when another device sends fragmented frames, and the WEP, CCMP, or GCMP data-confidentiality protocol is used. The highest threat from this vulnerability is to integrity.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: reassembling mixed encrypted/plaintext fragments",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-26147"
},
{
"category": "external",
"summary": "RHBZ#1960504",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1960504"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-26147",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26147"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-26147",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-26147"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-wireless/20210511200110.30c4394bb835.I5acfdb552cc1d20c339c262315950b3eac491397@changeid/",
"url": "https://lore.kernel.org/linux-wireless/20210511200110.30c4394bb835.I5acfdb552cc1d20c339c262315950b3eac491397@changeid/"
}
],
"release_date": "2021-05-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T18:06:54+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4356"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options does not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:L/I:H/A:N",
"version": "3.1"
},
"products": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: reassembling mixed encrypted/plaintext fragments"
},
{
"acknowledgments": [
{
"names": [
"Daniel Axtens"
],
"organization": "IBM"
}
],
"cve": "CVE-2020-27777",
"cwe": {
"id": "CWE-862",
"name": "Missing Authorization"
},
"discovery_date": "2020-10-09T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1900844"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the way RTAS handled memory accesses in userspace to kernel communication. On a locked down (usually due to Secure Boot) guest system running on top of PowerVM or KVM hypervisors (pseries platform) a root like local user could use this flaw to further increase their privileges to that of a running kernel.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: powerpc: RTAS calls can be used to compromise kernel integrity",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue is rated as having Moderate impact due to the required privileges and hardware dependencies.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-27777"
},
{
"category": "external",
"summary": "RHBZ#1900844",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1900844"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-27777",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27777"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-27777",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-27777"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/powerpc/linux.git/commit/?h=next\u0026id=bd59380c5ba4147dcbaad3e582b55ccfd120b764",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/powerpc/linux.git/commit/?h=next\u0026id=bd59380c5ba4147dcbaad3e582b55ccfd120b764"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2020/10/09/1",
"url": "https://www.openwall.com/lists/oss-security/2020/10/09/1"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2020/11/23/2",
"url": "https://www.openwall.com/lists/oss-security/2020/11/23/2"
}
],
"release_date": "2020-10-08T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T18:06:54+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4356"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: powerpc: RTAS calls can be used to compromise kernel integrity"
},
{
"cve": "CVE-2020-29368",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2020-12-01T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1903244"
}
],
"notes": [
{
"category": "description",
"text": "An issue was discovered in __split_huge_pmd in mm/huge_memory.c in the Linux kernel. The copy-on-write implementation can grant unintended write access because of a race condition in a THP mapcount check.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: the copy-on-write implementation can grant unintended write access because of a race condition in a THP mapcount check",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw has been rated as having Moderateimpact because, based on Red Hat\u0027s assessment, this issue is hard to exploit in practice because the race window is too small for it to be reliable.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-29368"
},
{
"category": "external",
"summary": "RHBZ#1903244",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1903244"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-29368",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-29368"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-29368",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-29368"
}
],
"release_date": "2020-06-03T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T18:06:54+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4356"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: the copy-on-write implementation can grant unintended write access because of a race condition in a THP mapcount check"
},
{
"cve": "CVE-2020-29660",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2020-12-09T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1906522"
}
],
"notes": [
{
"category": "description",
"text": "A locking inconsistency issue was discovered in the tty subsystem of the Linux kernel. A local user could use this flaw to read numerical value from memory after free.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: locking inconsistency in drivers/tty/tty_io.c and drivers/tty/tty_jobctrl.c can lead to a read-after-free",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw is rated as having Low impact (Red Hat Enterprise Linux 7) because of the need to have CAP_SYS_TTY_CONFIG privileges.\n\nThis flaw is rated as having Moderate (Red Hat Enterprise Linux 8) impact because of the need to have CAP_SYS_TTY_CONFIG privileges. Red Hat Enterprise Linux 8 enabled unprivileged user/network namespaces by default which can be used to exercise this vulnerability.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-29660"
},
{
"category": "external",
"summary": "RHBZ#1906522",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1906522"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-29660",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-29660"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-29660",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-29660"
}
],
"release_date": "2020-12-04T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T18:06:54+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4356"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: locking inconsistency in drivers/tty/tty_io.c and drivers/tty/tty_jobctrl.c can lead to a read-after-free"
},
{
"cve": "CVE-2020-36158",
"cwe": {
"id": "CWE-120",
"name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)"
},
"discovery_date": "2021-01-05T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1913348"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel. The marvell wifi driver could allow a local attacker to execute arbitrary code via a long SSID value in mwifiex_cmd_802_11_ad_hoc_start function. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: buffer overflow in mwifiex_cmd_802_11_ad_hoc_start function in drivers/net/wireless/marvell/mwifiex/join.c via a long SSID value",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue is rated as having Moderate impact because the attacker needs to be local and privileged enough to be able to initiate ad-hoc WIFI network creation.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-36158"
},
{
"category": "external",
"summary": "RHBZ#1913348",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1913348"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-36158",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36158"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-36158",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-36158"
}
],
"release_date": "2020-12-08T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T18:06:54+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4356"
},
{
"category": "workaround",
"details": "To mitigate this issue, prevent the module mwifiex from being loaded. Please see https://access.redhat.com/solutions/41278 for information on how to blacklist a kernel module to prevent it from loading automatically.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: buffer overflow in mwifiex_cmd_802_11_ad_hoc_start function in drivers/net/wireless/marvell/mwifiex/join.c via a long SSID value"
},
{
"cve": "CVE-2020-36312",
"cwe": {
"id": "CWE-772",
"name": "Missing Release of Resource after Effective Lifetime"
},
"discovery_date": "2021-04-07T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1947991"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the KVM hypervisor of the Linux kernel. A memory leak could occur in kvm_io_bus_unregister_dev() upon a kmalloc failure. The highest threat from this vulnerability is to system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: memory leak upon a kmalloc failure in kvm_io_bus_unregister_dev function in virt/kvm/kvm_main.c",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-36312"
},
{
"category": "external",
"summary": "RHBZ#1947991",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1947991"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-36312",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36312"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-36312",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-36312"
}
],
"release_date": "2020-09-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T18:06:54+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4356"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 3.3,
"baseSeverity": "LOW",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: memory leak upon a kmalloc failure in kvm_io_bus_unregister_dev function in virt/kvm/kvm_main.c"
},
{
"cve": "CVE-2020-36386",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"discovery_date": "2021-06-07T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1969489"
}
],
"notes": [
{
"category": "description",
"text": "A flaw out of bounds memory access in the Linux kernel bluetooth subsystem was found in the way when some data being read about the bluetooth device with the hci_extended_inquiry_result_evt call. A local user could use this flaw to crash the system or read some data out of memory bounds that can lead to data confidentiality threat.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: slab out-of-bounds read in hci_extended_inquiry_result_evt() in net/bluetooth/hci_event.c",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw is rated as having a Moderate impact because even the data being read out of memory bounds is written to some cache, it was known before that this data from non-safe source and as result no any sensitive dependencies on this data.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-36386"
},
{
"category": "external",
"summary": "RHBZ#1969489",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1969489"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-36386",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36386"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-36386",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-36386"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=51c19bf3d5cfaa66571e4b88ba2a6f6295311101",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=51c19bf3d5cfaa66571e4b88ba2a6f6295311101"
}
],
"release_date": "2020-07-10T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T18:06:54+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4356"
},
{
"category": "workaround",
"details": "To mitigate this issue, prevent the module bluetooth from being loaded (if Bluetooth not required for the system). Please see https://access.redhat.com/solutions/41278 for information on how to blacklist a kernel module to prevent it from loading automatically.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: slab out-of-bounds read in hci_extended_inquiry_result_evt() in net/bluetooth/hci_event.c"
},
{
"cve": "CVE-2021-0129",
"cwe": {
"id": "CWE-287",
"name": "Improper Authentication"
},
"discovery_date": "2021-05-26T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1965038"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel. Improper access control in BlueZ may allow an authenticated user to potentially enable information disclosure via adjacent access. The highest threat from this vulnerability is to data confidentiality and integrity.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Improper access control in BlueZ may allow information disclosure vulnerability.",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-0129"
},
{
"category": "external",
"summary": "RHBZ#1965038",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965038"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-0129",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0129"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-0129",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-0129"
}
],
"release_date": "2021-06-08T03:30:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T18:06:54+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4356"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: Improper access control in BlueZ may allow information disclosure vulnerability."
},
{
"cve": "CVE-2021-3348",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2021-01-28T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1921958"
}
],
"notes": [
{
"category": "description",
"text": "A use after free flaw in the Linux kernel network block device (NBD) subsystem was found in the way user calls an ioctl NBD_SET_SOCK at a certain point during device setup.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Use-after-free in ndb_queue_rq() in drivers/block/nbd.c",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw is rated as having a Moderate impact because in the default configuration, the issue can only be triggered by a privileged local user (with access to the nbd device).",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-3348"
},
{
"category": "external",
"summary": "RHBZ#1921958",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1921958"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-3348",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3348"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3348",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3348"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-block/24dff677353e2e30a71d8b66c4dffdbdf77c4dbd.1611595239.git.josef@toxicpanda.com/",
"url": "https://lore.kernel.org/linux-block/24dff677353e2e30a71d8b66c4dffdbdf77c4dbd.1611595239.git.josef@toxicpanda.com/"
}
],
"release_date": "2021-01-28T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T18:06:54+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4356"
},
{
"category": "workaround",
"details": "To mitigate this issue, prevent the module nbd from being loaded. Please see https://access.redhat.com/solutions/41278 for information on how to blacklist a kernel module to prevent it from loading automatically.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: Use-after-free in ndb_queue_rq() in drivers/block/nbd.c"
},
{
"cve": "CVE-2021-3444",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2021-03-23T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1942667"
}
],
"notes": [
{
"category": "description",
"text": "An out-of-bounds access flaw was found in the Linux kernel\u0027s implementation of the eBPF code verifier in the way a user running the eBPF script uses mod32 destination register truncation when the source register was known to be 0. This flaw allows a local user to crash the system or possibly escalate their privileges. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: bpf verifier incorrect mod32 truncation",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw is rated as having Moderate impact because of the need to have elevated privileges or non-standard configuration for running BPF script.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-3444"
},
{
"category": "external",
"summary": "RHBZ#1942667",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1942667"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-3444",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3444"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3444",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3444"
}
],
"release_date": "2021-02-13T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T18:06:54+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4356"
},
{
"category": "workaround",
"details": "The default Red Hat Enterprise Linux kernel prevents unprivileged users from being able to use eBPF by the kernel.unprivileged_bpf_disabled sysctl. This would require a privileged user with CAP_SYS_ADMIN or root to be able to abuse this flaw reducing its attack space.\n\nFor the Red Hat Enterprise Linux 7 the eBPF for unprivileged users is always disabled.\nFor the Red Hat Enterprise Linux 8 to confirm the current state, inspect the sysctl with the command:\n\n# cat /proc/sys/kernel/unprivileged_bpf_disabled\n\nThe setting of 1 would mean that unprivileged users can not use eBPF, mitigating the flaw.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: bpf verifier incorrect mod32 truncation"
},
{
"acknowledgments": [
{
"names": [
"Ryota Shiga"
]
}
],
"cve": "CVE-2021-3489",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"discovery_date": "2021-05-11T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1959559"
}
],
"notes": [
{
"category": "description",
"text": "A flaw out of bound memory write in the Linux kernel BPF subsystem was found in the way user writes to BPF ring buffer too fast, so larger buffer than available memory could be allocated. A local user could use this flaw to crash the system or possibly escalate their privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Linux kernel eBPF RINGBUF map oversized allocation",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-3489"
},
{
"category": "external",
"summary": "RHBZ#1959559",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1959559"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-3489",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3489"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3489",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3489"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf.git/commit/?id=4b81ccebaeee885ab1aa1438133f2991e3a2b6ea",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf.git/commit/?id=4b81ccebaeee885ab1aa1438133f2991e3a2b6ea"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2021/05/11/10",
"url": "https://www.openwall.com/lists/oss-security/2021/05/11/10"
}
],
"release_date": "2021-05-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T18:06:54+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4356"
},
{
"category": "workaround",
"details": "The default Red Hat Enterprise Linux kernel prevents unprivileged users from being able to use eBPF by the kernel.unprivileged_bpf_disabled sysctl. This would require a privileged user with CAP_SYS_ADMIN or root to be able to abuse this flaw reducing its attack space.\n\nFor the Red Hat Enterprise Linux 7 the eBPF for unprivileged users is always disabled.\nFor the Red Hat Enterprise Linux 8 to confirm the current state, inspect the sysctl with the command:\n\n# cat /proc/sys/kernel/unprivileged_bpf_disabled\n\nThe setting of 1 would mean that unprivileged users can not use eBPF, mitigating the flaw.\n\nA kernel update will be required to mitigate the flaw for the root or users with CAP_SYS_ADMIN capabilities.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: Linux kernel eBPF RINGBUF map oversized allocation"
},
{
"acknowledgments": [
{
"names": [
"HaoXiong, LinMa"
],
"organization": "ckSec"
}
],
"cve": "CVE-2021-3564",
"cwe": {
"id": "CWE-415",
"name": "Double Free"
},
"discovery_date": "2021-05-19T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1964139"
}
],
"notes": [
{
"category": "description",
"text": "A flaw double-free memory corruption in the Linux kernel HCI device initialization subsystem was found in the way user attach malicious HCI TTY Bluetooth device. A local user could use this flaw to crash the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: double free in bluetooth subsystem when the HCI device initialization fails",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The impact is Moderate, because the double free happens during flush procedure, and no use of incorrect data during flush finishing even if double free could happen without kernel crash.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-3564"
},
{
"category": "external",
"summary": "RHBZ#1964139",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1964139"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-3564",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3564"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3564",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3564"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2021/05/25/1",
"url": "https://www.openwall.com/lists/oss-security/2021/05/25/1"
}
],
"release_date": "2021-05-25T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T18:06:54+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4356"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: double free in bluetooth subsystem when the HCI device initialization fails"
},
{
"cve": "CVE-2021-3573",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2021-05-31T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1966578"
}
],
"notes": [
{
"category": "description",
"text": "A flaw use-after-free in function hci_sock_bound_ioctl() of the Linux kernel HCI subsystem was found in the way user calls ioct HCIUNBLOCKADDR or other way triggers race condition of the call hci_unregister_dev() together with one of the calls hci_sock_blacklist_add(), hci_sock_blacklist_del(), hci_get_conn_info(), hci_get_auth_info(). A privileged local user could use this flaw to crash the system or escalate their privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: use-after-free in function hci_sock_bound_ioctl()",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue is rated as having a Moderate impact because of the privileges (CAP_NET_ADMIN in initial namespace) required for exploiting the issue.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-3573"
},
{
"category": "external",
"summary": "RHBZ#1966578",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1966578"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-3573",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3573"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3573",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3573"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/bluetooth/bluetooth.git/commit/?id=e305509e678b3a4af2b3cfd410f409f7cdaabb52",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/bluetooth/bluetooth.git/commit/?id=e305509e678b3a4af2b3cfd410f409f7cdaabb52"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2021/06/08/2",
"url": "https://www.openwall.com/lists/oss-security/2021/06/08/2"
}
],
"release_date": "2021-06-08T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T18:06:54+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4356"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising easThe required privileges is CAP_NET_ADMIN capabilities. This would require a privileged user with CAP_SYS_ADMIN or root to be able to abuse this flaw reducing its attack space.e of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: use-after-free in function hci_sock_bound_ioctl()"
},
{
"cve": "CVE-2021-3600",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2021-06-23T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1981954"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel\u2019s eBPF verification code, where the eBPF 32-bit div/mod source register truncation could lead to out-of-bounds reads and writes. By default, accessing the eBPF verifier is only possible to privileged users with CAP_SYS_ADMIN. This flaw allows a local user who can run eBPF instructions to crash the system or possibly escalate their privileges on the system. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: eBPF 32-bit source register truncation on div/mod",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-3600"
},
{
"category": "external",
"summary": "RHBZ#1981954",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1981954"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-3600",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3600"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3600",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3600"
},
{
"category": "external",
"summary": "https://lore.kernel.org/patchwork/patch/1379497/",
"url": "https://lore.kernel.org/patchwork/patch/1379497/"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2021/06/23/1",
"url": "https://www.openwall.com/lists/oss-security/2021/06/23/1"
}
],
"release_date": "2021-06-23T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T18:06:54+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4356"
},
{
"category": "workaround",
"details": "The default Red Hat Enterprise Linux kernel prevents unprivileged users from being able to use eBPF by the kernel.unprivileged_bpf_disabled sysctl. This would require a privileged user with CAP_SYS_ADMIN or root to be able to abuse this flaw reducing its attack space.\n\nFor the Red Hat Enterprise Linux 7 the eBPF for unprivileged users is always disabled.\nFor the Red Hat Enterprise Linux 8 to confirm the current state, inspect the sysctl with the command:\n\n# cat /proc/sys/kernel/unprivileged_bpf_disabled\n\nThe setting of 1 would mean that unprivileged users can not use eBPF, mitigating the flaw.\n\nA kernel update will be required to mitigate the flaw for the root or users with CAP_SYS_ADMIN capabilities.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: eBPF 32-bit source register truncation on div/mod"
},
{
"cve": "CVE-2021-3635",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"discovery_date": "2021-06-22T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1976946"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel netfilter implementation. A user with root (CAP_SYS_ADMIN) access is able to panic the system when issuing netfilter netflow commands",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: flowtable list del corruption with kernel BUG at lib/list_debug.c:50",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-3635"
},
{
"category": "external",
"summary": "RHBZ#1976946",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1976946"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-3635",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3635"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3635",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3635"
}
],
"release_date": "2021-08-06T04:47:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T18:06:54+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4356"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options does not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 4.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: flowtable list del corruption with kernel BUG at lib/list_debug.c:50"
},
{
"cve": "CVE-2021-3659",
"cwe": {
"id": "CWE-252",
"name": "Unchecked Return Value"
},
"discovery_date": "2021-05-14T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1975949"
}
],
"notes": [
{
"category": "description",
"text": "A NULL pointer dereference flaw was found in the Linux kernel\u2019s IEEE 802.15.4 wireless networking subsystem in the way the user closes the LR-WPAN connection. This flaw allows a local user to crash the system. The highest threat from this vulnerability is to system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: NULL pointer dereference in llsec_key_alloc() in net/mac802154/llsec.c",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-3659"
},
{
"category": "external",
"summary": "RHBZ#1975949",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1975949"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-3659",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3659"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3659",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3659"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=1165affd484889d4986cf3b724318935a0b120d8",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=1165affd484889d4986cf3b724318935a0b120d8"
}
],
"release_date": "2021-04-06T19:22:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T18:06:54+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4356"
},
{
"category": "workaround",
"details": "To mitigate this issue, prevent the module mac802154 from being loaded. Please see https://access.redhat.com/solutions/41278 for information on how to blacklist a kernel module to prevent it from loading automatically.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: NULL pointer dereference in llsec_key_alloc() in net/mac802154/llsec.c"
},
{
"acknowledgments": [
{
"names": [
"Haoran Luo"
],
"organization": "Chaitin Tech"
}
],
"cve": "CVE-2021-3679",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2021-07-25T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1989165"
}
],
"notes": [
{
"category": "description",
"text": "A lack of CPU resources in the Linux kernel tracing module functionality was found in the way users use the trace ring buffer in specific way. Only privileged local users (with CAP_SYS_ADMIN capability) could use this flaw to starve the resources causing denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: DoS in rb_per_cpu_empty()",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-3679"
},
{
"category": "external",
"summary": "RHBZ#1989165",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1989165"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-3679",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3679"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3679",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3679"
},
{
"category": "external",
"summary": "https://lore.kernel.org/lkml/20210723125527.767d1c18@oasis.local.home/",
"url": "https://lore.kernel.org/lkml/20210723125527.767d1c18@oasis.local.home/"
}
],
"release_date": "2021-07-20T09:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T18:06:54+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4356"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: DoS in rb_per_cpu_empty()"
},
{
"acknowledgments": [
{
"names": [
"Miklos Szeredi"
],
"organization": "Red Hat",
"summary": "This issue was discovered by Red Hat."
}
],
"cve": "CVE-2021-3732",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2021-08-12T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1995249"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel\u2019s OverlayFS subsystem in the way the user mounts the TmpFS filesystem with OverlayFS. This flaw allows a local user to gain access to hidden files that should not be accessible.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: overlayfs: Mounting overlayfs inside an unprivileged user namespace can reveal files",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-3732"
},
{
"category": "external",
"summary": "RHBZ#1995249",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1995249"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-3732",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3732"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3732",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3732"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=427215d85e8d",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=427215d85e8d"
}
],
"release_date": "2021-08-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T18:06:54+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4356"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 3.3,
"baseSeverity": "LOW",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: overlayfs: Mounting overlayfs inside an unprivileged user namespace can reveal files"
},
{
"cve": "CVE-2021-4442",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2024-08-29T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2308455"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntcp: add sanity tests to TCP_QUEUE_SEQ\n\nQingyu Li reported a syzkaller bug where the repro\nchanges RCV SEQ _after_ restoring data in the receive queue.\n\nmprotect(0x4aa000, 12288, PROT_READ) = 0\nmmap(0x1ffff000, 4096, PROT_NONE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x1ffff000\nmmap(0x20000000, 16777216, PROT_READ|PROT_WRITE|PROT_EXEC, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x20000000\nmmap(0x21000000, 4096, PROT_NONE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x21000000\nsocket(AF_INET6, SOCK_STREAM, IPPROTO_IP) = 3\nsetsockopt(3, SOL_TCP, TCP_REPAIR, [1], 4) = 0\nconnect(3, {sa_family=AF_INET6, sin6_port=htons(0), sin6_flowinfo=htonl(0), inet_pton(AF_INET6, \"::1\", \u0026sin6_addr), sin6_scope_id=0}, 28) = 0\nsetsockopt(3, SOL_TCP, TCP_REPAIR_QUEUE, [1], 4) = 0\nsendmsg(3, {msg_name=NULL, msg_namelen=0, msg_iov=[{iov_base=\"0x0000000000000003\\0\\0\", iov_len=20}], msg_iovlen=1, msg_controllen=0, msg_flags=0}, 0) = 20\nsetsockopt(3, SOL_TCP, TCP_REPAIR, [0], 4) = 0\nsetsockopt(3, SOL_TCP, TCP_QUEUE_SEQ, [128], 4) = 0\nrecvfrom(3, NULL, 20, 0, NULL, NULL) = -1 ECONNRESET (Connection reset by peer)\n\nsyslog shows:\n[ 111.205099] TCP recvmsg seq # bug 2: copied 80, seq 0, rcvnxt 80, fl 0\n[ 111.207894] WARNING: CPU: 1 PID: 356 at net/ipv4/tcp.c:2343 tcp_recvmsg_locked+0x90e/0x29a0\n\nThis should not be allowed. TCP_QUEUE_SEQ should only be used\nwhen queues are empty.\n\nThis patch fixes this case, and the tx path as well.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: tcp: add sanity tests to TCP_QUEUE_SEQ",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue is fixed in RHEL-8.5 and above\n~~~\nin (rhel-8.5, rhel-8.6, rhel-8.7, rhel-8.8, rhel-8.9, rhel-8.10) tcp: add sanity tests to TCP_QUEUE_SEQ\n~~~",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-4442"
},
{
"category": "external",
"summary": "RHBZ#2308455",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2308455"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-4442",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4442"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-4442",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-4442"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024082945-CVE-2021-4442-0a5f@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024082945-CVE-2021-4442-0a5f@gregkh/T"
}
],
"release_date": "2024-08-29T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T18:06:54+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4356"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: tcp: add sanity tests to TCP_QUEUE_SEQ"
},
{
"acknowledgments": [
{
"names": [
"Loris Reiff"
]
}
],
"cve": "CVE-2021-20194",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2020-12-30T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1912683"
}
],
"notes": [
{
"category": "description",
"text": "A flaw buffer overflow in the Linux kernel BPF subsystem was found in the way user running BPF script calling getsockopt. A local user could use this flaw to crash the system or possibly escalate their privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: heap overflow in __cgroup_bpf_run_filter_getsockopt()",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw is rated as having Moderate impact because of the need to have elevated privileges or non-standard configuration for running BPF script.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-20194"
},
{
"category": "external",
"summary": "RHBZ#1912683",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1912683"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-20194",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20194"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-20194",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-20194"
}
],
"release_date": "2021-01-22T10:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T18:06:54+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4356"
},
{
"category": "workaround",
"details": "The default Red Hat Enterprise Linux kernel prevents unprivileged users from being able to use eBPF by the kernel.unprivileged_bpf_disabled sysctl. This would require a privileged user with CAP_SYS_ADMIN or root to be able to abuse this flaw reducing its attack space.\n\nFor the Red Hat Enterprise Linux 7 the eBPF for unprivileged users is always disabled.\n\nFor the Red Hat Enterprise Linux 8 to confirm the current state, inspect the sysctl with the command:\n\n# cat /proc/sys/kernel/unprivileged_bpf_disabled\n\nThe setting of 1 would mean that unprivileged users can not use eBPF.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: heap overflow in __cgroup_bpf_run_filter_getsockopt()"
},
{
"cve": "CVE-2021-20239",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2021-02-01T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1923636"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the BPF protocol. This flaw allows an attacker with a local account to leak information about kernel internal addresses. The highest threat from this vulnerability is to confidentiality.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: setsockopt System Call Untrusted Pointer Dereference Information Disclosure",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-20239"
},
{
"category": "external",
"summary": "RHBZ#1923636",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1923636"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-20239",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20239"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-20239",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-20239"
}
],
"release_date": "2021-02-01T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T18:06:54+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4356"
},
{
"category": "workaround",
"details": "Loading a filter is a privileged (CAP_SYS_ADMIN or root) operation. Once any filter is used, this attack is capable of being used by an unprivileged user. There is no known mitigation that product security finds suitable for this flaw.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 3.8,
"baseSeverity": "LOW",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: setsockopt System Call Untrusted Pointer Dereference Information Disclosure"
},
{
"acknowledgments": [
{
"names": [
"Or Cohen"
],
"organization": "Palo Alto Networks"
}
],
"cve": "CVE-2021-23133",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2021-04-09T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1948772"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free flaw was found in the Linux kernel\u0027s SCTP socket functionality that triggers a race condition. This flaw allows a local user to escalate their privileges on the system. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Race condition in sctp_destroy_sock list_del",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue is rated as having a Moderate impact because of the privileges required for running the known reproducer. The required privileges are CAP_BPF and CAP_NET_ADMIN capabilities that are disabled by default in Red Hat Enterprise Linux 7. For Red Hat Enterprise Linux 8, the SCTP protocol itself is disabled by default and cannot be used by a user without enablement by an administrator.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-23133"
},
{
"category": "external",
"summary": "RHBZ#1948772",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1948772"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-23133",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23133"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-23133",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-23133"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=b166a20b07382b8bc1dcee2a448715c9c2c81b5b",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=b166a20b07382b8bc1dcee2a448715c9c2c81b5b"
}
],
"release_date": "2021-04-18T09:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T18:06:54+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4356"
},
{
"category": "workaround",
"details": "To mitigate this issue, prevent the module sctp from being loaded (and this is so by default for Red Hat Enterprise Linux 8). Please see https://access.redhat.com/solutions/41278 for information on how to blacklist a kernel module to prevent it from loading automatically.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: Race condition in sctp_destroy_sock list_del"
},
{
"cve": "CVE-2021-28950",
"cwe": {
"id": "CWE-835",
"name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)"
},
"discovery_date": "2021-03-22T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1941762"
}
],
"notes": [
{
"category": "description",
"text": "A denial of service in the kernel side of the FUSE functionality can allow a local system to create a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: fuse: stall on CPU can occur because a retry loop continually finds the same bad inode",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-28950"
},
{
"category": "external",
"summary": "RHBZ#1941762",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1941762"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-28950",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-28950"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-28950",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-28950"
}
],
"release_date": "2021-03-04T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T18:06:54+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4356"
},
{
"category": "workaround",
"details": "As the FUSE module will be auto-loaded when required, its use can be disabled by preventing the module from loading with the following instructions:\n\n# echo \"install fuse /bin/true\" \u003e\u003e /etc/modprobe.d/disable-fuse.conf\n\nThe system will need to be restarted if the FUSE modules are loaded. In most circumstances, the CIFS kernel modules will be unable to be unloaded while the FUSE filesystems are in use.\n\nIf the system requires this module to work correctly, this mitigation may not be suitable.\n\nIf you need further assistance, see KCS article https://access.redhat.com/solutions/41278 or contact Red Hat Global Support Services.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: fuse: stall on CPU can occur because a retry loop continually finds the same bad inode"
},
{
"cve": "CVE-2021-28971",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"discovery_date": "2021-03-22T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1941784"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel. On some Haswell CPUs, userspace applications (such as perf-fuzzer) can cause a system crash because the PEBS status in a PEBS record is mishandled.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: System crash in intel_pmu_drain_pebs_nhm in arch/x86/events/intel/ds.c",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-28971"
},
{
"category": "external",
"summary": "RHBZ#1941784",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1941784"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-28971",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-28971"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-28971",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-28971"
}
],
"release_date": "2021-03-22T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T18:06:54+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4356"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options does not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: System crash in intel_pmu_drain_pebs_nhm in arch/x86/events/intel/ds.c"
},
{
"cve": "CVE-2021-29155",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"discovery_date": "2021-04-18T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1951595"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was discovered in retrieve_ptr_limit in kernel/bpf/verifier.c in the Linux kernel mechanism to mitigate speculatively out-of-bounds loads (Spectre mitigation). In this flaw a local, special user privileged (CAP_SYS_ADMIN) BPF program running on affected systems may bypass the protection, and execute speculatively out-of-bounds loads from the kernel memory. This can be abused to extract contents of kernel memory via side-channel.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: protection for sequences of pointer arithmetic operations against speculatively out-of-bounds loads can be bypassed to leak content of kernel memory",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-29155"
},
{
"category": "external",
"summary": "RHBZ#1951595",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1951595"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-29155",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29155"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-29155",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-29155"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2021/04/18/4",
"url": "https://www.openwall.com/lists/oss-security/2021/04/18/4"
}
],
"release_date": "2021-04-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T18:06:54+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4356"
},
{
"category": "workaround",
"details": "The default Red Hat Enterprise Linux kernel prevents unprivileged users from being able to use eBPF by the kernel.unprivileged_bpf_disabled sysctl. This would require a privileged user with CAP_SYS_ADMIN or root to be able to abuse this flaw reducing its attack space.\n\nFor the Red Hat Enterprise Linux 7 the eBPF for unprivileged users is always disabled.\nFor the Red Hat Enterprise Linux 8 to confirm the current state, inspect the sysctl with the command:\n\n# cat /proc/sys/kernel/unprivileged_bpf_disabled\n\nThe setting of 1 would mean that unprivileged users can not use eBPF, mitigating the flaw.\n\nA kernel update will be required to mitigate the flaw for the root or users with CAP_SYS_ADMIN capabilities.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: protection for sequences of pointer arithmetic operations against speculatively out-of-bounds loads can be bypassed to leak content of kernel memory"
},
{
"cve": "CVE-2021-29646",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2021-03-30T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1945345"
}
],
"notes": [
{
"category": "description",
"text": "A flaw buffer overflow in the Linux kernel TIPC protocol functionality was found in the way user uses protocol with encryption enabled. A local user could use this flaw to crash the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: improper input validation in tipc_nl_retrieve_key function in net/tipc/node.c",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-29646"
},
{
"category": "external",
"summary": "RHBZ#1945345",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1945345"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-29646",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29646"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-29646",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-29646"
}
],
"release_date": "2021-03-15T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T18:06:54+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4356"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: improper input validation in tipc_nl_retrieve_key function in net/tipc/node.c"
},
{
"cve": "CVE-2021-29650",
"cwe": {
"id": "CWE-662",
"name": "Improper Synchronization"
},
"discovery_date": "2021-03-30T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1945388"
}
],
"notes": [
{
"category": "description",
"text": "A denial-of-service (DoS) flaw was identified in the Linux kernel due to an incorrect memory barrier in xt_replace_table in net/netfilter/x_tables.c in the netfilter subsystem.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: lack a full memory barrier upon the assignment of a new table value in net/netfilter/x_tables.c and include/linux/netfilter/x_tables.h may lead to DoS",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-29650"
},
{
"category": "external",
"summary": "RHBZ#1945388",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1945388"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-29650",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29650"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-29650",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-29650"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=175e476b8cdf2a4de7432583b49c871345e4f8a1",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=175e476b8cdf2a4de7432583b49c871345e4f8a1"
}
],
"release_date": "2021-03-15T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T18:06:54+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4356"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: lack a full memory barrier upon the assignment of a new table value in net/netfilter/x_tables.c and include/linux/netfilter/x_tables.h may lead to DoS"
},
{
"cve": "CVE-2021-29657",
"cwe": {
"id": "CWE-367",
"name": "Time-of-check Time-of-use (TOCTOU) Race Condition"
},
"discovery_date": "2021-08-18T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1995153"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel. A KVM guest on AMD can launch a nested guest without the Intercept VMRUN control bit by exploiting a TOCTOU vulnerability in nested_svm_vmrun. A malicious guest could use this flaw to gain unrestricted access to host MSRs, possibly leading to guest-to-host escape scenario.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: KVM: double fetch in nested_svm_vmrun can lead to unrestricted MSR access",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The nested virtualization feature is not enabled by default up to Red Hat Enterprise Linux 8.4. Most importantly, Red Hat currently provides nested virtualization only as a Technology Preview, and is therefore unsupported for production use. For additional details please see https://access.redhat.com/solutions/21101 and https://access.redhat.com/support/offerings/techpreview.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-29657"
},
{
"category": "external",
"summary": "RHBZ#1995153",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1995153"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-29657",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29657"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-29657",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-29657"
},
{
"category": "external",
"summary": "https://bugs.chromium.org/p/project-zero/issues/detail?id=2177",
"url": "https://bugs.chromium.org/p/project-zero/issues/detail?id=2177"
}
],
"release_date": "2021-03-31T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T18:06:54+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4356"
},
{
"category": "workaround",
"details": "This vulnerability can be mitigated by disabling the nested virtualization feature:\n```\n# modprobe -r kvm_amd\n# modprobe kvm_amd nested=0\n```",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: KVM: double fetch in nested_svm_vmrun can lead to unrestricted MSR access"
},
{
"acknowledgments": [
{
"names": [
"Manfred Paul"
],
"organization": "RedRocket CTF team"
}
],
"cve": "CVE-2021-31440",
"cwe": {
"id": "CWE-682",
"name": "Incorrect Calculation"
},
"discovery_date": "2021-05-21T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1964028"
}
],
"notes": [
{
"category": "description",
"text": "An out-of-bounds access flaw was found in the Linux kernel\u2019s implementation of the eBPF code verifier, where an incorrect register bounds calculation while checking unsigned 32-bit instructions in an eBPF program occurs.. By default accessing the eBPF verifier is only accessible to privileged users with CAP_SYS_ADMIN. The issue results from the lack of proper validation of user-supplied eBPF programs prior to executing them. A local user could use this flaw to crash the system or possibly escalate their privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: local escalation of privileges in handling of eBPF programs",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-31440"
},
{
"category": "external",
"summary": "RHBZ#1964028",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1964028"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-31440",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-31440"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-31440",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-31440"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=10bf4e83167cc68595b85fd73bb91e8f2c086e36",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=10bf4e83167cc68595b85fd73bb91e8f2c086e36"
},
{
"category": "external",
"summary": "https://www.zerodayinitiative.com/blog/2021/5/26/cve-2021-31440-an-incorrect-bounds-calculation-in-the-linux-kernel-ebpf-verifier",
"url": "https://www.zerodayinitiative.com/blog/2021/5/26/cve-2021-31440-an-incorrect-bounds-calculation-in-the-linux-kernel-ebpf-verifier"
}
],
"release_date": "2021-05-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T18:06:54+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4356"
},
{
"category": "workaround",
"details": "The default Red Hat Enterprise Linux kernel prevents unprivileged users from being able to use eBPF by the kernel.unprivileged_bpf_disabled sysctl. This would require a privileged user with CAP_SYS_ADMIN or root to be able to abuse this flaw reducing its attack space.\n\nFor the Red Hat Enterprise Linux 7 the eBPF for unprivileged users is always disabled.\nFor the Red Hat Enterprise Linux 8 to confirm the current state, inspect the sysctl with the command:\n\n# cat /proc/sys/kernel/unprivileged_bpf_disabled\n\nThe setting of 1 would mean that unprivileged users can not use eBPF, mitigating the flaw.\n\nA kernel update will be required to mitigate the flaw for the root or users with CAP_SYS_ADMIN capabilities.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: local escalation of privileges in handling of eBPF programs"
},
{
"cve": "CVE-2021-31829",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2021-05-04T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1957788"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel\u0027s eBPF verification code. By default, accessing the eBPF verifier is only accessible to privileged users with CAP_SYS_ADMIN. This flaw allows a local user who can insert eBPF instructions, to use the eBPF verifier to abuse a spectre-like flaw and infer all system memory. The highest threat from this vulnerability is to confidentiality.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: protection of stack pointer against speculative pointer arithmetic can be bypassed to leak content of kernel memory",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-31829"
},
{
"category": "external",
"summary": "RHBZ#1957788",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1957788"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-31829",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-31829"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-31829",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-31829"
}
],
"release_date": "2021-04-30T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T18:06:54+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4356"
},
{
"category": "workaround",
"details": "The default Red Hat Enterprise Linux kernel prevents unprivileged users from being able to use eBPF by the kernel.unprivileged_bpf_disabled sysctl. This would require a privileged user with CAP_SYS_ADMIN or root to be able to abuse this flaw reducing its attack space.\n\nFor the Red Hat Enterprise Linux 7 and 8 kernel to confirm the current state, inspect the sysctl with the command:\n\n# cat /proc/sys/kernel/unprivileged_bpf_disabled\n\nThe setting of 1 would mean that unprivileged users can not use eBPF, mitigating the flaw.\n\nA kernel update will be required to mitigate the flaw for the root or users with CAP_SYS_ADMIN capabilities.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: protection of stack pointer against speculative pointer arithmetic can be bypassed to leak content of kernel memory"
},
{
"cve": "CVE-2021-31916",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2021-03-29T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1946965"
}
],
"notes": [
{
"category": "description",
"text": "An out-of-bounds (OOB) memory write flaw was found in list_devices in drivers/md/dm-ioctl.c in the Multi-device driver module in the Linux kernel. A bound check failure allows an attacker with special user (CAP_SYS_ADMIN) privilege to gain access to out-of-bounds memory leading to a system crash, a leak of internal kernel information, or a privilege escalation problem.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: out of bounds array access in drivers/md/dm-ioctl.c",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw is rated a Low impact because in the default configuration, the issue can only be triggered by a privileged local user.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-31916"
},
{
"category": "external",
"summary": "RHBZ#1946965",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1946965"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-31916",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-31916"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-31916",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-31916"
},
{
"category": "external",
"summary": "https://github.com/torvalds/linux/commit/4edbe1d7bcffcd6269f3b5eb63f710393ff2ec7a",
"url": "https://github.com/torvalds/linux/commit/4edbe1d7bcffcd6269f3b5eb63f710393ff2ec7a"
},
{
"category": "external",
"summary": "https://seclists.org/oss-sec/2021/q1/268",
"url": "https://seclists.org/oss-sec/2021/q1/268"
}
],
"release_date": "2021-03-29T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T18:06:54+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4356"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: out of bounds array access in drivers/md/dm-ioctl.c"
},
{
"cve": "CVE-2021-33033",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2021-05-14T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1961300"
}
],
"notes": [
{
"category": "description",
"text": "A flaw use-after-free in the Linux kernel CIPSO network packet labeling protocol functionality was found in the way user open local network connection with the usage of the security labeling that is IP option number 134. A local user could use this flaw to crash the system or possibly escalate their privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: use-after-free in cipso_v4_genopt in net/ipv4/cipso_ipv4.c",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Considered to be Moderate rate, because by default CIPSO non-enabled and both no known way to reproduce the attack remotely and both it looks complex if even possible to use the attack in any way apart from crashing the system. For the usage of the inbound CIPSO connections, the administrator have to enable it with netlabelctl utility first. The vulnerability is considered to be for local user, because it can happen only when a local user opens a socket for sending packets, but not during receiving packets.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-33033"
},
{
"category": "external",
"summary": "RHBZ#1961300",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1961300"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-33033",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33033"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-33033",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33033"
}
],
"release_date": "2021-03-04T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T18:06:54+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4356"
},
{
"category": "workaround",
"details": "The mitigation would be not allowing CIPSO labeling for the inbound network connections. For the most of the default configurations both for network routers and for the Linux servers itself it is disabled by default.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: use-after-free in cipso_v4_genopt in net/ipv4/cipso_ipv4.c"
},
{
"cve": "CVE-2021-33098",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2021-11-17T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2068236"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel. This flaw allows an attacker who can modify the MTU of a virtualized PCIe device (in a guest, for example) to crash the host system\u2019s kernel if they set the MTU of the VF device to an unsupported value.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Improper input validation in the Intel(R) Ethernet ixgbe driver may allow an authenticated user to potentially enable DoS via local access",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-33098"
},
{
"category": "external",
"summary": "RHBZ#2068236",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2068236"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-33098",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33098"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-33098",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33098"
}
],
"release_date": "2021-11-09T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T18:06:54+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4356"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options does not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: Improper input validation in the Intel(R) Ethernet ixgbe driver may allow an authenticated user to potentially enable DoS via local access"
},
{
"cve": "CVE-2021-33200",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2021-05-27T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1965458"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in kernel/bpf/verifier.c in BPF in the Linux kernel. An incorrect limit is enforced for pointer arithmetic operations which can be abused to perform out-of-bounds reads and writes in kernel memory, leading to local privilege escalation. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: out-of-bounds reads and writes due to enforcing incorrect limits for pointer arithmetic operations by BPF verifier",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-33200"
},
{
"category": "external",
"summary": "RHBZ#1965458",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965458"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-33200",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33200"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-33200",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33200"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf.git/patch/?id=3d0220f6861d713213b015b582e9f21e5b28d2e0",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf.git/patch/?id=3d0220f6861d713213b015b582e9f21e5b28d2e0"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf.git/patch/?id=a7036191277f9fa68d92f2071ddc38c09b1e5ee5",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf.git/patch/?id=a7036191277f9fa68d92f2071ddc38c09b1e5ee5"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf.git/patch/?id=bb01a1bba579b4b1c5566af24d95f1767859771e",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf.git/patch/?id=bb01a1bba579b4b1c5566af24d95f1767859771e"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2021/05/27/1",
"url": "https://www.openwall.com/lists/oss-security/2021/05/27/1"
}
],
"release_date": "2021-05-26T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T18:06:54+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4356"
},
{
"category": "workaround",
"details": "The default Red Hat Enterprise Linux kernel prevents unprivileged users from being able to use eBPF by the kernel.unprivileged_bpf_disabled sysctl. This would require a privileged user with CAP_SYS_ADMIN or root to be able to abuse this flaw reducing its attack space.\n\nFor the Red Hat Enterprise Linux 7 the eBPF for unprivileged users is always disabled.\nFor the Red Hat Enterprise Linux 8 to confirm the current state, inspect the sysctl with the command:\n\n# cat /proc/sys/kernel/unprivileged_bpf_disabled\n\nThe setting of 1 would mean that unprivileged users can not use eBPF, mitigating the flaw.\n\nA kernel update will be required to mitigate the flaw for the root or users with CAP_SYS_ADMIN capabilities.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: out-of-bounds reads and writes due to enforcing incorrect limits for pointer arithmetic operations by BPF verifier"
},
{
"cve": "CVE-2021-46905",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"discovery_date": "2024-02-27T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2266253"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in the Linux kernel. This flaw occurs due to an unconditional NULL-pointer dereference on every disconnect in the Linux kernel.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: NULL-deref on disconnect regression",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-46905"
},
{
"category": "external",
"summary": "RHBZ#2266253",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2266253"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-46905",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46905"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-46905",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-46905"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024022557-CVE-2021-46905-6507@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024022557-CVE-2021-46905-6507@gregkh/T"
}
],
"release_date": "2024-02-26T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T18:06:54+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4356"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: NULL-deref on disconnect regression"
},
{
"cve": "CVE-2021-46983",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"discovery_date": "2024-02-28T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2266906"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in an error-handling function in the Linux kernel\u0027s NVMe driver. This flaw allows an attacker with control over NVMe links to cause a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: nvmet-rdma: Fix NULL deref when SEND is completed with error",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-46983"
},
{
"category": "external",
"summary": "RHBZ#2266906",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2266906"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-46983",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46983"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-46983",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-46983"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024022824-CVE-2021-46983-f808@gregkh/T/#u",
"url": "https://lore.kernel.org/linux-cve-announce/2024022824-CVE-2021-46983-f808@gregkh/T/#u"
}
],
"release_date": "2024-02-28T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T18:06:54+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4356"
},
{
"category": "workaround",
"details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: nvmet-rdma: Fix NULL deref when SEND is completed with error"
},
{
"cve": "CVE-2021-47011",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2024-02-28T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2266847"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmm: memcontrol: slab: fix obtain a reference to a freeing memcg\n\nPatch series \"Use obj_cgroup APIs to charge kmem pages\", v5.\n\nSince Roman\u0027s series \"The new cgroup slab memory controller\" applied.\nAll slab objects are charged with the new APIs of obj_cgroup. The new\nAPIs introduce a struct obj_cgroup to charge slab objects. It prevents\nlong-living objects from pinning the original memory cgroup in the\nmemory. But there are still some corner objects (e.g. allocations\nlarger than order-1 page on SLUB) which are not charged with the new\nAPIs. Those objects (include the pages which are allocated from buddy\nallocator directly) are charged as kmem pages which still hold a\nreference to the memory cgroup.\n\nE.g. We know that the kernel stack is charged as kmem pages because the\nsize of the kernel stack can be greater than 2 pages (e.g. 16KB on\nx86_64 or arm64). If we create a thread (suppose the thread stack is\ncharged to memory cgroup A) and then move it from memory cgroup A to\nmemory cgroup B. Because the kernel stack of the thread hold a\nreference to the memory cgroup A. The thread can pin the memory cgroup\nA in the memory even if we remove the cgroup A. If we want to see this\nscenario by using the following script. We can see that the system has\nadded 500 dying cgroups (This is not a real world issue, just a script\nto show that the large kmallocs are charged as kmem pages which can pin\nthe memory cgroup in the memory).\n\n\t#!/bin/bash\n\n\tcat /proc/cgroups | grep memory\n\n\tcd /sys/fs/cgroup/memory\n\techo 1 \u003e memory.move_charge_at_immigrate\n\n\tfor i in range{1..500}\n\tdo\n\t\tmkdir kmem_test\n\t\techo $$ \u003e kmem_test/cgroup.procs\n\t\tsleep 3600 \u0026\n\t\techo $$ \u003e cgroup.procs\n\t\techo `cat kmem_test/cgroup.procs` \u003e cgroup.procs\n\t\trmdir kmem_test\n\tdone\n\n\tcat /proc/cgroups | grep memory\n\nThis patchset aims to make those kmem pages to drop the reference to\nmemory cgroup by using the APIs of obj_cgroup. Finally, we can see that\nthe number of the dying cgroups will not increase if we run the above test\nscript.\n\nThis patch (of 7):\n\nThe rcu_read_lock/unlock only can guarantee that the memcg will not be\nfreed, but it cannot guarantee the success of css_get (which is in the\nrefill_stock when cached memcg changed) to memcg.\n\n rcu_read_lock()\n memcg = obj_cgroup_memcg(old)\n __memcg_kmem_uncharge(memcg)\n refill_stock(memcg)\n if (stock-\u003ecached != memcg)\n // css_get can change the ref counter from 0 back to 1.\n css_get(\u0026memcg-\u003ecss)\n rcu_read_unlock()\n\nThis fix is very like the commit:\n\n eefbfa7fd678 (\"mm: memcg/slab: fix use after free in obj_cgroup_charge\")\n\nFix this by holding a reference to the memcg which is passed to the\n__memcg_kmem_uncharge() before calling __memcg_kmem_uncharge().",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: mm: memcontrol: slab: fix obtain a reference to a freeing memcg",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-47011"
},
{
"category": "external",
"summary": "RHBZ#2266847",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2266847"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-47011",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47011"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-47011",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-47011"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024022831-CVE-2021-47011-5b75@gregkh/T/#u",
"url": "https://lore.kernel.org/linux-cve-announce/2024022831-CVE-2021-47011-5b75@gregkh/T/#u"
}
],
"release_date": "2024-02-28T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T18:06:54+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4356"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: mm: memcontrol: slab: fix obtain a reference to a freeing memcg"
},
{
"cve": "CVE-2021-47080",
"cwe": {
"id": "CWE-369",
"name": "Divide By Zero"
},
"discovery_date": "2024-03-01T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2267533"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nRDMA/core: Prevent divide-by-zero error triggered by the user\n\nThe user_entry_size is supplied by the user and later used as a\ndenominator to calculate number of entries. The zero supplied by the user\nwill trigger the following divide-by-zero error:\n\n divide error: 0000 [#1] SMP KASAN PTI\n CPU: 4 PID: 497 Comm: c_repro Not tainted 5.13.0-rc1+ #281\n Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.13.0-0-gf21b5a4aeb02-prebuilt.qemu.org 04/01/2014\n RIP: 0010:ib_uverbs_handler_UVERBS_METHOD_QUERY_GID_TABLE+0x1b1/0x510\n Code: 87 59 03 00 00 e8 9f ab 1e ff 48 8d bd a8 00 00 00 e8 d3 70 41 ff 44 0f b7 b5 a8 00 00 00 e8 86 ab 1e ff 31 d2 4c 89 f0 31 ff \u003c49\u003e f7 f5 48 89 d6 48 89 54 24 10 48 89 04 24 e8 1b ad 1e ff 48 8b\n RSP: 0018:ffff88810416f828 EFLAGS: 00010246\n RAX: 0000000000000008 RBX: 1ffff1102082df09 RCX: ffffffff82183f3d\n RDX: 0000000000000000 RSI: ffff888105f2da00 RDI: 0000000000000000\n RBP: ffff88810416fa98 R08: 0000000000000001 R09: ffffed102082df5f\n R10: ffff88810416faf7 R11: ffffed102082df5e R12: 0000000000000000\n R13: 0000000000000000 R14: 0000000000000008 R15: ffff88810416faf0\n FS: 00007f5715efa740(0000) GS:ffff88811a700000(0000) knlGS:0000000000000000\n CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n CR2: 0000000020000840 CR3: 000000010c2e0001 CR4: 0000000000370ea0\n DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\n DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\n Call Trace:\n ? ib_uverbs_handler_UVERBS_METHOD_INFO_HANDLES+0x4b0/0x4b0\n ib_uverbs_cmd_verbs+0x1546/0x1940\n ib_uverbs_ioctl+0x186/0x240\n __x64_sys_ioctl+0x38a/0x1220\n do_syscall_64+0x3f/0x80\n entry_SYSCALL_64_after_hwframe+0x44/0xae",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: RDMA/core: Prevent divide-by-zero error triggered by the user",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-47080"
},
{
"category": "external",
"summary": "RHBZ#2267533",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2267533"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-47080",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47080"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-47080",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-47080"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024030142-CVE-2021-47080-eb20@gregkh/T/#u",
"url": "https://lore.kernel.org/linux-cve-announce/2024030142-CVE-2021-47080-eb20@gregkh/T/#u"
}
],
"release_date": "2024-03-01T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T18:06:54+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4356"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: RDMA/core: Prevent divide-by-zero error triggered by the user"
},
{
"cve": "CVE-2022-20166",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2022-08-29T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2122089"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel\u2019s sysfs layer. This flaw allows a local user who can read files under the /sysfs mount point to corrupt memory or possibly crash the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: possible buffer overflow in sysfs reading",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-20166"
},
{
"category": "external",
"summary": "RHBZ#2122089",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2122089"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-20166",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-20166"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-20166",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-20166"
}
],
"release_date": "2022-08-15T14:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T18:06:54+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4356"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options does not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: possible buffer overflow in sysfs reading"
},
{
"cve": "CVE-2022-50042",
"cwe": {
"id": "CWE-401",
"name": "Missing Release of Memory after Effective Lifetime"
},
"discovery_date": "2025-06-18T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2373691"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the netlink driver in the Linux kernel. A memory leak can occur when allocated memory is not released in certain error cases, potentially impacting system performance and resulting in a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: net: genl: fix error path memory leak in policy dumping",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue has been fixed in Red Hat Enterprise Linux 8.5, 9.2 and 9.3 via RHSA-2021:4356 [1], RHSA-2023:7370 [2] and RHSA-2023:6583 [3], respectively.\n\n[1]. https://access.redhat.com/errata/RHSA-2021:4356\n\n[2]. https://access.redhat.com/errata/RHSA-2023:7370\n\n[3]. https://access.redhat.com/errata/RHSA-2023:6583",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-50042"
},
{
"category": "external",
"summary": "RHBZ#2373691",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2373691"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-50042",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50042"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-50042",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-50042"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2025061843-CVE-2022-50042-7d6f@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2025061843-CVE-2022-50042-7d6f@gregkh/T"
}
],
"release_date": "2025-06-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T18:06:54+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4356"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: net: genl: fix error path memory leak in policy dumping"
},
{
"cve": "CVE-2022-50073",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"discovery_date": "2025-06-18T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2373494"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the tap module in the Linux kernel. A NULL pointer dereference can be triggered due to a missing initialization, resulting in a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: net: tap: NULL pointer derefence in dev_parse_header_protocol when skb-\u003edev is null",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue has been fixed in Red Hat Enterprise Linux 8.5 and 9.5 via RHSA-2021:4356 [1] and RHSA-2024:9315 [2], respectively.\n\n[1]. https://access.redhat.com/errata/RHSA-2021:4356\n\n[2]. https://access.redhat.com/errata/RHSA-2024:9315",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-50073"
},
{
"category": "external",
"summary": "RHBZ#2373494",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2373494"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-50073",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50073"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-50073",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-50073"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2025061854-CVE-2022-50073-7199@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2025061854-CVE-2022-50073-7199@gregkh/T"
}
],
"release_date": "2025-06-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T18:06:54+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4356"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: net: tap: NULL pointer derefence in dev_parse_header_protocol when skb-\u003edev is null"
},
{
"cve": "CVE-2023-53598",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2025-10-04T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2401500"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbus: mhi: host: Range check CHDBOFF and ERDBOFF\n\nIf the value read from the CHDBOFF and ERDBOFF registers is outside the\nrange of the MHI register space then an invalid address might be computed\nwhich later causes a kernel panic. Range check the read value to prevent\na crash due to bad data from the device.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: bus: mhi: host: Range check CHDBOFF and ERDBOFF",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "MHI devices communicate channel configuration through doorbell offset values (CHDBOFF and ERDBOFF) that index into the device\u0027s register space. The driver reads these offsets from device memory during initialization but historically failed to validate that they fall within legitimate bounds. A malicious device\u2014or a legitimate device with corrupted firmware\u2014can supply offset values that point outside the allocated channel context array. When the driver attempts to use these offsets, it accesses arbitrary kernel memory, typically triggering an immediate panic. Physical access is generally required to connect a malicious device, though in some cases (like M.2 modems) a compromised device firmware could supply bad values.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-53598"
},
{
"category": "external",
"summary": "RHBZ#2401500",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2401500"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-53598",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53598"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-53598",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-53598"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2025100429-CVE-2023-53598-cbd8@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2025100429-CVE-2023-53598-cbd8@gregkh/T"
}
],
"release_date": "2025-10-04T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T18:06:54+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4356"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: bus: mhi: host: Range check CHDBOFF and ERDBOFF"
}
]
}
rhsa-2021_4140
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel-rt is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.\n\nSecurity Fix(es):\n* kernel: out-of-bounds reads in pinctrl subsystem. (CVE-2020-0427)\n* kernel: Improper input validation in some Intel(R) Ethernet E810 Adapter drivers (CVE-2020-24502)\n* kernel: Insufficient access control in some Intel(R) Ethernet E810 Adapter drivers (CVE-2020-24503)\n* kernel: Uncontrolled resource consumption in some Intel(R) Ethernet E810 Adapter drivers (CVE-2020-24504)\n* kernel: Fragmentation cache not cleared on reconnection (CVE-2020-24586)\n* kernel: Reassembling fragments encrypted under different keys (CVE-2020-24587)\n* kernel: wifi frame payload being parsed incorrectly as an L2 frame (CVE-2020-24588)\n* kernel: Forwarding EAPOL from unauthenticated wifi client (CVE-2020-26139)\n* kernel: accepting plaintext data frames in protected networks (CVE-2020-26140)\n* kernel: not verifying TKIP MIC of fragmented frames (CVE-2020-26141)\n* kernel: accepting fragmented plaintext frames in protected networks (CVE-2020-26143)\n* kernel: accepting unencrypted A-MSDU frames that start with RFC1042 header (CVE-2020-26144)\n* kernel: accepting plaintext broadcast fragments as full frames (CVE-2020-26145)\n* kernel: locking inconsistency in tty_io.c and tty_jobctrl.c can lead to a read-after-free (CVE-2020-29660)\n* kernel: buffer overflow in mwifiex_cmd_802_11_ad_hoc_start function via a long SSID value (CVE-2020-36158)\n* kernel: slab out-of-bounds read in hci_extended_inquiry_result_evt() (CVE-2020-36386)\n* kernel: Improper access control in BlueZ may allow information disclosure vulnerability. (CVE-2021-0129)\n* kernel: Use-after-free in ndb_queue_rq() (CVE-2021-3348)\n* kernel: Linux kernel eBPF RINGBUF map oversized allocation (CVE-2021-3489)\n* kernel: double free in bluetooth subsystem when the HCI device initialization fails (CVE-2021-3564)\n* kernel: use-after-free in function hci_sock_bound_ioctl() (CVE-2021-3573)\n* kernel: eBPF 32-bit source register truncation on div/mod (CVE-2021-3600)\n* kernel: DoS in rb_per_cpu_empty() (CVE-2021-3679)\n* kernel: overlayfs: Mounting overlayfs inside an unprivileged user namespace can reveal files (CVE-2021-3732)\n* kernel: heap overflow in __cgroup_bpf_run_filter_getsockopt() (CVE-2021-20194)\n* kernel: Race condition in sctp_destroy_sock list_del (CVE-2021-23133)\n* kernel: fuse: stall on CPU can occur because a retry loop continually finds the same bad inode (CVE-2021-28950)\n* kernel: System crash in intel_pmu_drain_pebs_nhm (CVE-2021-28971)\n* kernel: protection for sequences of pointer arithmetic operations against speculatively out-of-bounds loads can be bypassed to leak content of kernel memory (CVE-2021-29155)\n* kernel: improper input validation in tipc_nl_retrieve_key function (CVE-2021-29646)\n* kernel: lack a full memory barrier upon the assignment of a new table value in x_tables.h may lead to DoS (CVE-2021-29650)\n* kernel: local escalation of privileges in handling of eBPF programs (CVE-2021-31440)\n* kernel: protection of stack pointer against speculative pointer arithmetic can be bypassed to leak content of kernel memory (CVE-2021-31829)\n* kernel: out-of-bounds reads and writes due to enforcing incorrect limits for pointer arithmetic operations by BPF verifier (CVE-2021-33200)\n* kernel: reassembling encrypted fragments with non-consecutive packet numbers (CVE-2020-26146)\n* kernel: reassembling mixed encrypted/plaintext fragments (CVE-2020-26147)\n* kernel: the copy-on-write implementation can grant unintended write access because of a race condition in a THP mapcount check (CVE-2020-29368)\n* kernel: flowtable list del corruption with kernel BUG (CVE-2021-3635)\n* kernel: NULL pointer dereference in llsec_key_alloc() (CVE-2021-3659)\n* kernel: setsockopt System Call Untrusted Pointer Dereference Information Disclosure (CVE-2021-20239)\n* kernel: out of bounds array access in drivers/md/dm-ioctl.c (CVE-2021-31916)",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2021:4140",
"url": "https://access.redhat.com/errata/RHSA-2021:4140"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.5_release_notes/",
"url": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.5_release_notes/"
},
{
"category": "external",
"summary": "1875275",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1875275"
},
{
"category": "external",
"summary": "1902412",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1902412"
},
{
"category": "external",
"summary": "1903244",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1903244"
},
{
"category": "external",
"summary": "1905747",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1905747"
},
{
"category": "external",
"summary": "1906522",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1906522"
},
{
"category": "external",
"summary": "1912683",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1912683"
},
{
"category": "external",
"summary": "1913348",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1913348"
},
{
"category": "external",
"summary": "1919893",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1919893"
},
{
"category": "external",
"summary": "1921958",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1921958"
},
{
"category": "external",
"summary": "1923636",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1923636"
},
{
"category": "external",
"summary": "1930376",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1930376"
},
{
"category": "external",
"summary": "1930379",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1930379"
},
{
"category": "external",
"summary": "1930381",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1930381"
},
{
"category": "external",
"summary": "1941762",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1941762"
},
{
"category": "external",
"summary": "1941784",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1941784"
},
{
"category": "external",
"summary": "1945345",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1945345"
},
{
"category": "external",
"summary": "1945388",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1945388"
},
{
"category": "external",
"summary": "1946965",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1946965"
},
{
"category": "external",
"summary": "1948772",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1948772"
},
{
"category": "external",
"summary": "1951595",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1951595"
},
{
"category": "external",
"summary": "1957788",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1957788"
},
{
"category": "external",
"summary": "1959559",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1959559"
},
{
"category": "external",
"summary": "1959642",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1959642"
},
{
"category": "external",
"summary": "1959654",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1959654"
},
{
"category": "external",
"summary": "1959657",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1959657"
},
{
"category": "external",
"summary": "1959663",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1959663"
},
{
"category": "external",
"summary": "1960490",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1960490"
},
{
"category": "external",
"summary": "1960492",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1960492"
},
{
"category": "external",
"summary": "1960496",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1960496"
},
{
"category": "external",
"summary": "1960498",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1960498"
},
{
"category": "external",
"summary": "1960500",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1960500"
},
{
"category": "external",
"summary": "1960502",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1960502"
},
{
"category": "external",
"summary": "1960504",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1960504"
},
{
"category": "external",
"summary": "1964028",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1964028"
},
{
"category": "external",
"summary": "1964139",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1964139"
},
{
"category": "external",
"summary": "1965038",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965038"
},
{
"category": "external",
"summary": "1965458",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965458"
},
{
"category": "external",
"summary": "1966578",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1966578"
},
{
"category": "external",
"summary": "1969489",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1969489"
},
{
"category": "external",
"summary": "1975949",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1975949"
},
{
"category": "external",
"summary": "1976946",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1976946"
},
{
"category": "external",
"summary": "1981954",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1981954"
},
{
"category": "external",
"summary": "1989165",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1989165"
},
{
"category": "external",
"summary": "1995249",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1995249"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_4140.json"
}
],
"title": "Red Hat Security Advisory: kernel-rt security and bug fix update",
"tracking": {
"current_release_date": "2024-12-20T20:35:51+00:00",
"generator": {
"date": "2024-12-20T20:35:51+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.4"
}
},
"id": "RHSA-2021:4140",
"initial_release_date": "2021-11-09T17:26:23+00:00",
"revision_history": [
{
"date": "2021-11-09T17:26:23+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2021-11-09T17:26:23+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-12-20T20:35:51+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product": {
"name": "Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.5.0.GA",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:8::nfv"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Real Time (v. 8)",
"product": {
"name": "Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.5.0.GA",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:8::realtime"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"product": {
"name": "kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"product_id": "kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt@4.18.0-348.rt7.130.el8?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"product": {
"name": "kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"product_id": "kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt@4.18.0-348.rt7.130.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"product": {
"name": "kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"product_id": "kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-core@4.18.0-348.rt7.130.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"product": {
"name": "kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"product_id": "kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug@4.18.0-348.rt7.130.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"product": {
"name": "kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"product_id": "kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-core@4.18.0-348.rt7.130.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"product": {
"name": "kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"product_id": "kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-devel@4.18.0-348.rt7.130.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"product": {
"name": "kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"product_id": "kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-kvm@4.18.0-348.rt7.130.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"product": {
"name": "kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"product_id": "kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-modules@4.18.0-348.rt7.130.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"product": {
"name": "kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"product_id": "kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-modules-extra@4.18.0-348.rt7.130.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"product": {
"name": "kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"product_id": "kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-devel@4.18.0-348.rt7.130.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"product": {
"name": "kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"product_id": "kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-kvm@4.18.0-348.rt7.130.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"product": {
"name": "kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"product_id": "kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-modules@4.18.0-348.rt7.130.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"product": {
"name": "kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"product_id": "kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-modules-extra@4.18.0-348.rt7.130.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"product": {
"name": "kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"product_id": "kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-debuginfo@4.18.0-348.rt7.130.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"product": {
"name": "kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"product_id": "kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debuginfo@4.18.0-348.rt7.130.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"product": {
"name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"product_id": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debuginfo-common-x86_64@4.18.0-348.rt7.130.el8?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:4.18.0-348.rt7.130.el8.src as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src"
},
"product_reference": "kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"relates_to_product_reference": "NFV-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64"
},
"product_reference": "kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"relates_to_product_reference": "NFV-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64"
},
"product_reference": "kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"relates_to_product_reference": "NFV-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64"
},
"product_reference": "kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"relates_to_product_reference": "NFV-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64"
},
"product_reference": "kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"relates_to_product_reference": "NFV-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64"
},
"product_reference": "kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"relates_to_product_reference": "NFV-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64"
},
"product_reference": "kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"relates_to_product_reference": "NFV-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64"
},
"product_reference": "kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"relates_to_product_reference": "NFV-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64"
},
"product_reference": "kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"relates_to_product_reference": "NFV-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
},
"product_reference": "kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"relates_to_product_reference": "NFV-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64"
},
"product_reference": "kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"relates_to_product_reference": "NFV-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64"
},
"product_reference": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"relates_to_product_reference": "NFV-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64"
},
"product_reference": "kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"relates_to_product_reference": "NFV-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64"
},
"product_reference": "kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"relates_to_product_reference": "NFV-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64"
},
"product_reference": "kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"relates_to_product_reference": "NFV-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
},
"product_reference": "kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"relates_to_product_reference": "NFV-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:4.18.0-348.rt7.130.el8.src as a component of Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src"
},
"product_reference": "kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"relates_to_product_reference": "RT-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64"
},
"product_reference": "kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"relates_to_product_reference": "RT-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64"
},
"product_reference": "kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"relates_to_product_reference": "RT-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64"
},
"product_reference": "kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"relates_to_product_reference": "RT-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64"
},
"product_reference": "kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"relates_to_product_reference": "RT-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64"
},
"product_reference": "kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"relates_to_product_reference": "RT-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64"
},
"product_reference": "kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"relates_to_product_reference": "RT-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64"
},
"product_reference": "kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"relates_to_product_reference": "RT-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64"
},
"product_reference": "kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"relates_to_product_reference": "RT-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
},
"product_reference": "kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"relates_to_product_reference": "RT-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64"
},
"product_reference": "kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"relates_to_product_reference": "RT-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64"
},
"product_reference": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"relates_to_product_reference": "RT-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64"
},
"product_reference": "kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"relates_to_product_reference": "RT-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64"
},
"product_reference": "kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"relates_to_product_reference": "RT-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64"
},
"product_reference": "kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"relates_to_product_reference": "RT-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
},
"product_reference": "kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"relates_to_product_reference": "RT-8.5.0.GA"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2019-14615",
"cwe": {
"id": "CWE-212",
"name": "Improper Removal of Sensitive Information Before Storage or Transfer"
},
"discovery_date": "2020-01-09T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1789209"
}
],
"notes": [
{
"category": "description",
"text": "An information disclosure flaw was found in the Linux kernel. The i915 graphics driver lacks control of flow for data structures which may allow a local, authenticated user to disclose information when using ioctl commands with an attached i915 device. The highest threat from this vulnerability is to data confidentiality.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Intel graphics card information leak.",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue affects the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 6, 7, 8 and Red Hat Enterprise MRG 2. Future kernel updates for Red Hat Enterprise Linux 6, 7, and 8 may address this issue.\n\nThis has been rated as having Moderate security impact and is not currently planned to be addressed in future updates of Red Hat Enterprise MRG 2.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-14615"
},
{
"category": "external",
"summary": "RHBZ#1789209",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1789209"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-14615",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14615"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-14615",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-14615"
}
],
"release_date": "2020-01-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T17:26:23+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4140"
},
{
"category": "workaround",
"details": "Preventing loading of the i915 kernel module will prevent attackers from using this exploit against the system; however, the power management functionality of the card will be disabled and the system may draw additional power. See the kcs \u201cHow do I blacklist a kernel module to prevent it from loading automatically?\u201c (https://access.redhat.com/solutions/41278) for instructions on how to disable a kernel module from autoloading. Graphical displays may also be at low resolution or not work correctly.\n\nThis mitigation may not be suitable if the graphical login functionality is required.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: Intel graphics card information leak."
},
{
"cve": "CVE-2020-0427",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2021-01-24T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1919893"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux pinctrl system. It is possible to trigger an of bounds read due to a use after free. This could lead to local information disclosure with no additional execution privileges needed.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: out-of-bounds reads in pinctrl subsystem.",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-0427"
},
{
"category": "external",
"summary": "RHBZ#1919893",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1919893"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-0427",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0427"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-0427",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-0427"
}
],
"release_date": "2020-11-22T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T17:26:23+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4140"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: out-of-bounds reads in pinctrl subsystem."
},
{
"cve": "CVE-2020-24502",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2021-02-17T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1930379"
}
],
"notes": [
{
"category": "description",
"text": "Improper input validation in some Intel(R) Ethernet E810 Adapter drivers for Linux may allow an authenticated user to potentially enable a denial of service via local access.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Improper input validation in some Intel(R) Ethernet E810 Adapter drivers",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-24502"
},
{
"category": "external",
"summary": "RHBZ#1930379",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1930379"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-24502",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24502"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-24502",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-24502"
}
],
"release_date": "2021-02-17T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T17:26:23+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4140"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: Improper input validation in some Intel(R) Ethernet E810 Adapter drivers"
},
{
"cve": "CVE-2020-24503",
"cwe": {
"id": "CWE-863",
"name": "Incorrect Authorization"
},
"discovery_date": "2021-02-17T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1930381"
}
],
"notes": [
{
"category": "description",
"text": "Insufficient access control in some Intel(R) Ethernet E810 Adapter drivers for Linux may allow an authenticated user to potentially enable information disclosure via local access.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Insufficient access control in some Intel(R) Ethernet E810 Adapter drivers",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-24503"
},
{
"category": "external",
"summary": "RHBZ#1930381",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1930381"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-24503",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24503"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-24503",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-24503"
}
],
"release_date": "2021-02-17T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T17:26:23+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4140"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: Insufficient access control in some Intel(R) Ethernet E810 Adapter drivers"
},
{
"cve": "CVE-2020-24504",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2021-02-17T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1930376"
}
],
"notes": [
{
"category": "description",
"text": "An uncontrolled resource consumption in some Intel(R) Ethernet E810 Adapter drivers for Linux may allow an authenticated user to potentially cause a denial of service via local access.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Uncontrolled resource consumption in some Intel(R) Ethernet E810 Adapter drivers",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-24504"
},
{
"category": "external",
"summary": "RHBZ#1930376",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1930376"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-24504",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24504"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-24504",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-24504"
},
{
"category": "external",
"summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00462.html",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00462.html"
}
],
"release_date": "2021-02-17T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T17:26:23+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4140"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: Uncontrolled resource consumption in some Intel(R) Ethernet E810 Adapter drivers"
},
{
"cve": "CVE-2020-24586",
"cwe": {
"id": "CWE-212",
"name": "Improper Removal of Sensitive Information Before Storage or Transfer"
},
"discovery_date": "2021-05-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1959642"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernels implementation of wifi fragmentation handling. An attacker with the ability to transmit within the wireless transmission range of an access point can abuse a flaw where previous contents of wifi fragments can be unintentionally transmitted to another device.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Fragmentation cache not cleared on reconnection",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-24586"
},
{
"category": "external",
"summary": "RHBZ#1959642",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1959642"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-24586",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24586"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-24586",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-24586"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-wireless/20210511200110.3f8290e59823.I622a67769ed39257327a362cfc09c812320eb979@changeid/",
"url": "https://lore.kernel.org/linux-wireless/20210511200110.3f8290e59823.I622a67769ed39257327a362cfc09c812320eb979@changeid/"
}
],
"release_date": "2021-05-12T01:20:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T17:26:23+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4140"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options does not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: Fragmentation cache not cleared on reconnection"
},
{
"cve": "CVE-2020-24587",
"cwe": {
"id": "CWE-345",
"name": "Insufficient Verification of Data Authenticity"
},
"discovery_date": "2021-05-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1959654"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel\u0027s WiFi implementation. An attacker within the wireless range can abuse a logic flaw in the WiFi implementation by reassembling packets from multiple fragments under different keys, treating them as valid. This flaw allows an attacker to send a fragment under an incorrect key, treating them as a valid fragment under the new key. The highest threat from this vulnerability is to confidentiality.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Reassembling fragments encrypted under different keys",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-24587"
},
{
"category": "external",
"summary": "RHBZ#1959654",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1959654"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-24587",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24587"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-24587",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-24587"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-wireless/20210511200110.3f8290e59823.I622a67769ed39257327a362cfc09c812320eb979@changeid/",
"url": "https://lore.kernel.org/linux-wireless/20210511200110.3f8290e59823.I622a67769ed39257327a362cfc09c812320eb979@changeid/"
}
],
"release_date": "2021-05-11T14:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T17:26:23+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4140"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options does not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "NONE",
"baseScore": 3.1,
"baseSeverity": "LOW",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: Reassembling fragments encrypted under different keys"
},
{
"cve": "CVE-2020-24588",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2021-05-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1959657"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernels wifi implementation. An attacker within wireless broadcast range can inject custom data into the wireless communication circumventing checks on the data. This can cause the frame to pass checks and be considered a valid frame of a different type.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: wifi frame payload being parsed incorrectly as an L2 frame",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-24588"
},
{
"category": "external",
"summary": "RHBZ#1959657",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1959657"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-24588",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24588"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-24588",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-24588"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-wireless/20210511200110.25d93176ddaf.I9e265b597f2cd23eb44573f35b625947b386a9de@changeid/",
"url": "https://lore.kernel.org/linux-wireless/20210511200110.25d93176ddaf.I9e265b597f2cd23eb44573f35b625947b386a9de@changeid/"
}
],
"release_date": "2021-05-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T17:26:23+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4140"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options does not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: wifi frame payload being parsed incorrectly as an L2 frame"
},
{
"cve": "CVE-2020-26139",
"cwe": {
"id": "CWE-829",
"name": "Inclusion of Functionality from Untrusted Control Sphere"
},
"discovery_date": "2021-05-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1959663"
}
],
"notes": [
{
"category": "description",
"text": "Frames used for authentication and key management between the AP and connected clients. Some clients may take these redirected frames masquerading as control mechanisms from the AP.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Forwarding EAPOL from unauthenticated wifi client",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-26139"
},
{
"category": "external",
"summary": "RHBZ#1959663",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1959663"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-26139",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26139"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-26139",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-26139"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-wireless/20210511200110.cb327ed0cabe.Ib7dcffa2a31f0913d660de65ba3c8aca75b1d10f@changeid/",
"url": "https://lore.kernel.org/linux-wireless/20210511200110.cb327ed0cabe.Ib7dcffa2a31f0913d660de65ba3c8aca75b1d10f@changeid/"
}
],
"release_date": "2021-05-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T17:26:23+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4140"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options does not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "NONE",
"baseScore": 3.5,
"baseSeverity": "LOW",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: Forwarding EAPOL from unauthenticated wifi client"
},
{
"cve": "CVE-2020-26140",
"cwe": {
"id": "CWE-346",
"name": "Origin Validation Error"
},
"discovery_date": "2021-05-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1960490"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in Linux kernel. Where the WiFi implementations accept plaintext frames in a protected WiFi network. An adversary can abuse this to inject arbitrary data frames independent of the network configuration.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: accepting plaintext data frames in protected networks",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-26140"
},
{
"category": "external",
"summary": "RHBZ#1960490",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1960490"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-26140",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26140"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-26140",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-26140"
}
],
"release_date": "2021-05-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T17:26:23+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4140"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: accepting plaintext data frames in protected networks"
},
{
"cve": "CVE-2020-26141",
"cwe": {
"id": "CWE-863",
"name": "Incorrect Authorization"
},
"discovery_date": "2021-05-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1960492"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in Linux kernel\u0027s WiFi implementation. An attacker within wireless range can inject a control packet fragment where the kernel does not verify the Message Integrity Check (authenticity) of fragmented TKIP frames.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: not verifying TKIP MIC of fragmented frames",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-26141"
},
{
"category": "external",
"summary": "RHBZ#1960492",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1960492"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-26141",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26141"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-26141",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-26141"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-wireless/20210511200110.c3f1d42c6746.I795593fcaae941c471425b8c7d5f7bb185d29142@changeid/",
"url": "https://lore.kernel.org/linux-wireless/20210511200110.c3f1d42c6746.I795593fcaae941c471425b8c7d5f7bb185d29142@changeid/"
}
],
"release_date": "2021-05-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T17:26:23+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4140"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options does not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: not verifying TKIP MIC of fragmented frames"
},
{
"cve": "CVE-2020-26143",
"cwe": {
"id": "CWE-346",
"name": "Origin Validation Error"
},
"discovery_date": "2021-05-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1960496"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in Linux kernel, where the WiFi implementations assemble fragments even though some of them were sent in plaintext. This vulnerability can be abused to inject packets and/or exfiltrate selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP data-confidentiality protocol is used.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: accepting fragmented plaintext frames in protected networks",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-26143"
},
{
"category": "external",
"summary": "RHBZ#1960496",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1960496"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-26143",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26143"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-26143",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-26143"
}
],
"release_date": "2021-05-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T17:26:23+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4140"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: accepting fragmented plaintext frames in protected networks"
},
{
"cve": "CVE-2020-26144",
"cwe": {
"id": "CWE-290",
"name": "Authentication Bypass by Spoofing"
},
"discovery_date": "2021-05-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1960498"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel, where the WiFi implementations accept plaintext A-MSDU frames as long as the first 8 bytes correspond to a valid RFC1042 (ex., LLC/SNAP) header for EAPOL. The highest threat from this vulnerability is to integrity.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: accepting unencrypted A-MSDU frames that start with RFC1042 header",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-26144"
},
{
"category": "external",
"summary": "RHBZ#1960498",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1960498"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-26144",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26144"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-26144",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-26144"
}
],
"release_date": "2021-05-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T17:26:23+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4140"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options does not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: accepting unencrypted A-MSDU frames that start with RFC1042 header"
},
{
"cve": "CVE-2020-26145",
"cwe": {
"id": "CWE-307",
"name": "Improper Restriction of Excessive Authentication Attempts"
},
"discovery_date": "2021-05-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1960500"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in ath10k_htt_rx_proc_rx_frag_ind_hl in drivers/net/wireless/ath/ath10k/htt_rx.c in the Linux kernel WiFi implementations, where it accepts a second (or subsequent) broadcast fragments even when sent in plaintext and then process them as full unfragmented frames. The highest threat from this vulnerability is to integrity.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: accepting plaintext broadcast fragments as full frames",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-26145"
},
{
"category": "external",
"summary": "RHBZ#1960500",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1960500"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-26145",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26145"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-26145",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-26145"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-wireless/20210511200110.9ca6ca7945a9.I1e18b514590af17c155bda86699bc3a971a8dcf4@changeid/",
"url": "https://lore.kernel.org/linux-wireless/20210511200110.9ca6ca7945a9.I1e18b514590af17c155bda86699bc3a971a8dcf4@changeid/"
}
],
"release_date": "2021-05-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T17:26:23+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4140"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options does not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: accepting plaintext broadcast fragments as full frames"
},
{
"cve": "CVE-2020-26146",
"cwe": {
"id": "CWE-307",
"name": "Improper Restriction of Excessive Authentication Attempts"
},
"discovery_date": "2021-05-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1960502"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in Linux kernel, where the WiFi implementation reassemble fragments with non-consecutive packet numbers. An adversary can abuse this to exfiltrate selected fragments. This vulnerability is exploitable when another device sends fragmented frames and the WEP, CCMP, or GCMP data-confidentiality protocol is used. Note that WEP is vulnerable to this attack by design.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: reassembling encrypted fragments with non-consecutive packet numbers",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-26146"
},
{
"category": "external",
"summary": "RHBZ#1960502",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1960502"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-26146",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26146"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-26146",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-26146"
}
],
"release_date": "2021-05-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T17:26:23+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4140"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: reassembling encrypted fragments with non-consecutive packet numbers"
},
{
"cve": "CVE-2020-26147",
"cwe": {
"id": "CWE-307",
"name": "Improper Restriction of Excessive Authentication Attempts"
},
"discovery_date": "2021-05-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1960504"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in ieee80211_rx_h_defragment in net/mac80211/rx.c in the Linux Kernel\u0027s WiFi implementation. This vulnerability can be abused to inject packets or exfiltrate selected fragments when another device sends fragmented frames, and the WEP, CCMP, or GCMP data-confidentiality protocol is used. The highest threat from this vulnerability is to integrity.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: reassembling mixed encrypted/plaintext fragments",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-26147"
},
{
"category": "external",
"summary": "RHBZ#1960504",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1960504"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-26147",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26147"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-26147",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-26147"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-wireless/20210511200110.30c4394bb835.I5acfdb552cc1d20c339c262315950b3eac491397@changeid/",
"url": "https://lore.kernel.org/linux-wireless/20210511200110.30c4394bb835.I5acfdb552cc1d20c339c262315950b3eac491397@changeid/"
}
],
"release_date": "2021-05-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T17:26:23+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4140"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options does not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:L/I:H/A:N",
"version": "3.1"
},
"products": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: reassembling mixed encrypted/plaintext fragments"
},
{
"cve": "CVE-2020-29368",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2020-12-01T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1903244"
}
],
"notes": [
{
"category": "description",
"text": "An issue was discovered in __split_huge_pmd in mm/huge_memory.c in the Linux kernel. The copy-on-write implementation can grant unintended write access because of a race condition in a THP mapcount check.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: the copy-on-write implementation can grant unintended write access because of a race condition in a THP mapcount check",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw has been rated as having Moderateimpact because, based on Red Hat\u0027s assessment, this issue is hard to exploit in practice because the race window is too small for it to be reliable.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-29368"
},
{
"category": "external",
"summary": "RHBZ#1903244",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1903244"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-29368",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-29368"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-29368",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-29368"
}
],
"release_date": "2020-06-03T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T17:26:23+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4140"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: the copy-on-write implementation can grant unintended write access because of a race condition in a THP mapcount check"
},
{
"cve": "CVE-2020-29660",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2020-12-09T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1906522"
}
],
"notes": [
{
"category": "description",
"text": "A locking inconsistency issue was discovered in the tty subsystem of the Linux kernel. A local user could use this flaw to read numerical value from memory after free.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: locking inconsistency in drivers/tty/tty_io.c and drivers/tty/tty_jobctrl.c can lead to a read-after-free",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw is rated as having Low impact (Red Hat Enterprise Linux 7) because of the need to have CAP_SYS_TTY_CONFIG privileges.\n\nThis flaw is rated as having Moderate (Red Hat Enterprise Linux 8) impact because of the need to have CAP_SYS_TTY_CONFIG privileges. Red Hat Enterprise Linux 8 enabled unprivileged user/network namespaces by default which can be used to exercise this vulnerability.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-29660"
},
{
"category": "external",
"summary": "RHBZ#1906522",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1906522"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-29660",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-29660"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-29660",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-29660"
}
],
"release_date": "2020-12-04T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T17:26:23+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4140"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: locking inconsistency in drivers/tty/tty_io.c and drivers/tty/tty_jobctrl.c can lead to a read-after-free"
},
{
"cve": "CVE-2020-36158",
"cwe": {
"id": "CWE-120",
"name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)"
},
"discovery_date": "2021-01-05T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1913348"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel. The marvell wifi driver could allow a local attacker to execute arbitrary code via a long SSID value in mwifiex_cmd_802_11_ad_hoc_start function. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: buffer overflow in mwifiex_cmd_802_11_ad_hoc_start function in drivers/net/wireless/marvell/mwifiex/join.c via a long SSID value",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue is rated as having Moderate impact because the attacker needs to be local and privileged enough to be able to initiate ad-hoc WIFI network creation.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-36158"
},
{
"category": "external",
"summary": "RHBZ#1913348",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1913348"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-36158",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36158"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-36158",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-36158"
}
],
"release_date": "2020-12-08T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T17:26:23+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4140"
},
{
"category": "workaround",
"details": "To mitigate this issue, prevent the module mwifiex from being loaded. Please see https://access.redhat.com/solutions/41278 for information on how to blacklist a kernel module to prevent it from loading automatically.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: buffer overflow in mwifiex_cmd_802_11_ad_hoc_start function in drivers/net/wireless/marvell/mwifiex/join.c via a long SSID value"
},
{
"cve": "CVE-2020-36312",
"cwe": {
"id": "CWE-772",
"name": "Missing Release of Resource after Effective Lifetime"
},
"discovery_date": "2021-04-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1947991"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the KVM hypervisor of the Linux kernel. A memory leak could occur in kvm_io_bus_unregister_dev() upon a kmalloc failure. The highest threat from this vulnerability is to system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: memory leak upon a kmalloc failure in kvm_io_bus_unregister_dev function in virt/kvm/kvm_main.c",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-36312"
},
{
"category": "external",
"summary": "RHBZ#1947991",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1947991"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-36312",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36312"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-36312",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-36312"
}
],
"release_date": "2020-09-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T17:26:23+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4140"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 3.3,
"baseSeverity": "LOW",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: memory leak upon a kmalloc failure in kvm_io_bus_unregister_dev function in virt/kvm/kvm_main.c"
},
{
"cve": "CVE-2020-36386",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"discovery_date": "2021-06-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1969489"
}
],
"notes": [
{
"category": "description",
"text": "A flaw out of bounds memory access in the Linux kernel bluetooth subsystem was found in the way when some data being read about the bluetooth device with the hci_extended_inquiry_result_evt call. A local user could use this flaw to crash the system or read some data out of memory bounds that can lead to data confidentiality threat.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: slab out-of-bounds read in hci_extended_inquiry_result_evt() in net/bluetooth/hci_event.c",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw is rated as having a Moderate impact because even the data being read out of memory bounds is written to some cache, it was known before that this data from non-safe source and as result no any sensitive dependencies on this data.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-36386"
},
{
"category": "external",
"summary": "RHBZ#1969489",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1969489"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-36386",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36386"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-36386",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-36386"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=51c19bf3d5cfaa66571e4b88ba2a6f6295311101",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=51c19bf3d5cfaa66571e4b88ba2a6f6295311101"
}
],
"release_date": "2020-07-10T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T17:26:23+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4140"
},
{
"category": "workaround",
"details": "To mitigate this issue, prevent the module bluetooth from being loaded (if Bluetooth not required for the system). Please see https://access.redhat.com/solutions/41278 for information on how to blacklist a kernel module to prevent it from loading automatically.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: slab out-of-bounds read in hci_extended_inquiry_result_evt() in net/bluetooth/hci_event.c"
},
{
"cve": "CVE-2021-0129",
"cwe": {
"id": "CWE-287",
"name": "Improper Authentication"
},
"discovery_date": "2021-05-26T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1965038"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel. Improper access control in BlueZ may allow an authenticated user to potentially enable information disclosure via adjacent access. The highest threat from this vulnerability is to data confidentiality and integrity.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Improper access control in BlueZ may allow information disclosure vulnerability.",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-0129"
},
{
"category": "external",
"summary": "RHBZ#1965038",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965038"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-0129",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0129"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-0129",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-0129"
}
],
"release_date": "2021-06-08T03:30:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T17:26:23+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4140"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: Improper access control in BlueZ may allow information disclosure vulnerability."
},
{
"cve": "CVE-2021-3348",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2021-01-28T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1921958"
}
],
"notes": [
{
"category": "description",
"text": "A use after free flaw in the Linux kernel network block device (NBD) subsystem was found in the way user calls an ioctl NBD_SET_SOCK at a certain point during device setup.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Use-after-free in ndb_queue_rq() in drivers/block/nbd.c",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw is rated as having a Moderate impact because in the default configuration, the issue can only be triggered by a privileged local user (with access to the nbd device).",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-3348"
},
{
"category": "external",
"summary": "RHBZ#1921958",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1921958"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-3348",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3348"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3348",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3348"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-block/24dff677353e2e30a71d8b66c4dffdbdf77c4dbd.1611595239.git.josef@toxicpanda.com/",
"url": "https://lore.kernel.org/linux-block/24dff677353e2e30a71d8b66c4dffdbdf77c4dbd.1611595239.git.josef@toxicpanda.com/"
}
],
"release_date": "2021-01-28T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T17:26:23+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4140"
},
{
"category": "workaround",
"details": "To mitigate this issue, prevent the module nbd from being loaded. Please see https://access.redhat.com/solutions/41278 for information on how to blacklist a kernel module to prevent it from loading automatically.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: Use-after-free in ndb_queue_rq() in drivers/block/nbd.c"
},
{
"acknowledgments": [
{
"names": [
"Ryota Shiga"
]
}
],
"cve": "CVE-2021-3489",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"discovery_date": "2021-05-11T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1959559"
}
],
"notes": [
{
"category": "description",
"text": "A flaw out of bound memory write in the Linux kernel BPF subsystem was found in the way user writes to BPF ring buffer too fast, so larger buffer than available memory could be allocated. A local user could use this flaw to crash the system or possibly escalate their privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Linux kernel eBPF RINGBUF map oversized allocation",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-3489"
},
{
"category": "external",
"summary": "RHBZ#1959559",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1959559"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-3489",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3489"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3489",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3489"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf.git/commit/?id=4b81ccebaeee885ab1aa1438133f2991e3a2b6ea",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf.git/commit/?id=4b81ccebaeee885ab1aa1438133f2991e3a2b6ea"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2021/05/11/10",
"url": "https://www.openwall.com/lists/oss-security/2021/05/11/10"
}
],
"release_date": "2021-05-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T17:26:23+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4140"
},
{
"category": "workaround",
"details": "The default Red Hat Enterprise Linux kernel prevents unprivileged users from being able to use eBPF by the kernel.unprivileged_bpf_disabled sysctl. This would require a privileged user with CAP_SYS_ADMIN or root to be able to abuse this flaw reducing its attack space.\n\nFor the Red Hat Enterprise Linux 7 the eBPF for unprivileged users is always disabled.\nFor the Red Hat Enterprise Linux 8 to confirm the current state, inspect the sysctl with the command:\n\n# cat /proc/sys/kernel/unprivileged_bpf_disabled\n\nThe setting of 1 would mean that unprivileged users can not use eBPF, mitigating the flaw.\n\nA kernel update will be required to mitigate the flaw for the root or users with CAP_SYS_ADMIN capabilities.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: Linux kernel eBPF RINGBUF map oversized allocation"
},
{
"acknowledgments": [
{
"names": [
"HaoXiong, LinMa"
],
"organization": "ckSec"
}
],
"cve": "CVE-2021-3564",
"cwe": {
"id": "CWE-415",
"name": "Double Free"
},
"discovery_date": "2021-05-19T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1964139"
}
],
"notes": [
{
"category": "description",
"text": "A flaw double-free memory corruption in the Linux kernel HCI device initialization subsystem was found in the way user attach malicious HCI TTY Bluetooth device. A local user could use this flaw to crash the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: double free in bluetooth subsystem when the HCI device initialization fails",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The impact is Moderate, because the double free happens during flush procedure, and no use of incorrect data during flush finishing even if double free could happen without kernel crash.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-3564"
},
{
"category": "external",
"summary": "RHBZ#1964139",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1964139"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-3564",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3564"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3564",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3564"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2021/05/25/1",
"url": "https://www.openwall.com/lists/oss-security/2021/05/25/1"
}
],
"release_date": "2021-05-25T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T17:26:23+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4140"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: double free in bluetooth subsystem when the HCI device initialization fails"
},
{
"cve": "CVE-2021-3573",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2021-05-31T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1966578"
}
],
"notes": [
{
"category": "description",
"text": "A flaw use-after-free in function hci_sock_bound_ioctl() of the Linux kernel HCI subsystem was found in the way user calls ioct HCIUNBLOCKADDR or other way triggers race condition of the call hci_unregister_dev() together with one of the calls hci_sock_blacklist_add(), hci_sock_blacklist_del(), hci_get_conn_info(), hci_get_auth_info(). A privileged local user could use this flaw to crash the system or escalate their privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: use-after-free in function hci_sock_bound_ioctl()",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue is rated as having a Moderate impact because of the privileges (CAP_NET_ADMIN in initial namespace) required for exploiting the issue.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-3573"
},
{
"category": "external",
"summary": "RHBZ#1966578",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1966578"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-3573",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3573"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3573",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3573"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/bluetooth/bluetooth.git/commit/?id=e305509e678b3a4af2b3cfd410f409f7cdaabb52",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/bluetooth/bluetooth.git/commit/?id=e305509e678b3a4af2b3cfd410f409f7cdaabb52"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2021/06/08/2",
"url": "https://www.openwall.com/lists/oss-security/2021/06/08/2"
}
],
"release_date": "2021-06-08T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T17:26:23+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4140"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising easThe required privileges is CAP_NET_ADMIN capabilities. This would require a privileged user with CAP_SYS_ADMIN or root to be able to abuse this flaw reducing its attack space.e of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: use-after-free in function hci_sock_bound_ioctl()"
},
{
"cve": "CVE-2021-3600",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2021-06-23T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1981954"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel\u2019s eBPF verification code, where the eBPF 32-bit div/mod source register truncation could lead to out-of-bounds reads and writes. By default, accessing the eBPF verifier is only possible to privileged users with CAP_SYS_ADMIN. This flaw allows a local user who can run eBPF instructions to crash the system or possibly escalate their privileges on the system. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: eBPF 32-bit source register truncation on div/mod",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-3600"
},
{
"category": "external",
"summary": "RHBZ#1981954",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1981954"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-3600",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3600"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3600",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3600"
},
{
"category": "external",
"summary": "https://lore.kernel.org/patchwork/patch/1379497/",
"url": "https://lore.kernel.org/patchwork/patch/1379497/"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2021/06/23/1",
"url": "https://www.openwall.com/lists/oss-security/2021/06/23/1"
}
],
"release_date": "2021-06-23T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T17:26:23+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4140"
},
{
"category": "workaround",
"details": "The default Red Hat Enterprise Linux kernel prevents unprivileged users from being able to use eBPF by the kernel.unprivileged_bpf_disabled sysctl. This would require a privileged user with CAP_SYS_ADMIN or root to be able to abuse this flaw reducing its attack space.\n\nFor the Red Hat Enterprise Linux 7 the eBPF for unprivileged users is always disabled.\nFor the Red Hat Enterprise Linux 8 to confirm the current state, inspect the sysctl with the command:\n\n# cat /proc/sys/kernel/unprivileged_bpf_disabled\n\nThe setting of 1 would mean that unprivileged users can not use eBPF, mitigating the flaw.\n\nA kernel update will be required to mitigate the flaw for the root or users with CAP_SYS_ADMIN capabilities.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: eBPF 32-bit source register truncation on div/mod"
},
{
"cve": "CVE-2021-3635",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"discovery_date": "2021-06-22T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1976946"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel netfilter implementation. A user with root (CAP_SYS_ADMIN) access is able to panic the system when issuing netfilter netflow commands",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: flowtable list del corruption with kernel BUG at lib/list_debug.c:50",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-3635"
},
{
"category": "external",
"summary": "RHBZ#1976946",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1976946"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-3635",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3635"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3635",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3635"
}
],
"release_date": "2021-08-06T04:47:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T17:26:23+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4140"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options does not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 4.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: flowtable list del corruption with kernel BUG at lib/list_debug.c:50"
},
{
"cve": "CVE-2021-3659",
"cwe": {
"id": "CWE-252",
"name": "Unchecked Return Value"
},
"discovery_date": "2021-05-14T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1975949"
}
],
"notes": [
{
"category": "description",
"text": "A NULL pointer dereference flaw was found in the Linux kernel\u2019s IEEE 802.15.4 wireless networking subsystem in the way the user closes the LR-WPAN connection. This flaw allows a local user to crash the system. The highest threat from this vulnerability is to system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: NULL pointer dereference in llsec_key_alloc() in net/mac802154/llsec.c",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-3659"
},
{
"category": "external",
"summary": "RHBZ#1975949",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1975949"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-3659",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3659"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3659",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3659"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=1165affd484889d4986cf3b724318935a0b120d8",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=1165affd484889d4986cf3b724318935a0b120d8"
}
],
"release_date": "2021-04-06T19:22:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T17:26:23+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4140"
},
{
"category": "workaround",
"details": "To mitigate this issue, prevent the module mac802154 from being loaded. Please see https://access.redhat.com/solutions/41278 for information on how to blacklist a kernel module to prevent it from loading automatically.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: NULL pointer dereference in llsec_key_alloc() in net/mac802154/llsec.c"
},
{
"acknowledgments": [
{
"names": [
"Haoran Luo"
],
"organization": "Chaitin Tech"
}
],
"cve": "CVE-2021-3679",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2021-07-25T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1989165"
}
],
"notes": [
{
"category": "description",
"text": "A lack of CPU resources in the Linux kernel tracing module functionality was found in the way users use the trace ring buffer in specific way. Only privileged local users (with CAP_SYS_ADMIN capability) could use this flaw to starve the resources causing denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: DoS in rb_per_cpu_empty()",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-3679"
},
{
"category": "external",
"summary": "RHBZ#1989165",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1989165"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-3679",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3679"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3679",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3679"
},
{
"category": "external",
"summary": "https://lore.kernel.org/lkml/20210723125527.767d1c18@oasis.local.home/",
"url": "https://lore.kernel.org/lkml/20210723125527.767d1c18@oasis.local.home/"
}
],
"release_date": "2021-07-20T09:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T17:26:23+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4140"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: DoS in rb_per_cpu_empty()"
},
{
"acknowledgments": [
{
"names": [
"Miklos Szeredi"
],
"organization": "Red Hat",
"summary": "This issue was discovered by Red Hat."
}
],
"cve": "CVE-2021-3732",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2021-08-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1995249"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel\u2019s OverlayFS subsystem in the way the user mounts the TmpFS filesystem with OverlayFS. This flaw allows a local user to gain access to hidden files that should not be accessible.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: overlayfs: Mounting overlayfs inside an unprivileged user namespace can reveal files",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-3732"
},
{
"category": "external",
"summary": "RHBZ#1995249",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1995249"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-3732",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3732"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3732",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3732"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=427215d85e8d",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=427215d85e8d"
}
],
"release_date": "2021-08-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T17:26:23+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4140"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 3.3,
"baseSeverity": "LOW",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: overlayfs: Mounting overlayfs inside an unprivileged user namespace can reveal files"
},
{
"acknowledgments": [
{
"names": [
"Loris Reiff"
]
}
],
"cve": "CVE-2021-20194",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2020-12-30T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1912683"
}
],
"notes": [
{
"category": "description",
"text": "A flaw buffer overflow in the Linux kernel BPF subsystem was found in the way user running BPF script calling getsockopt. A local user could use this flaw to crash the system or possibly escalate their privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: heap overflow in __cgroup_bpf_run_filter_getsockopt()",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw is rated as having Moderate impact because of the need to have elevated privileges or non-standard configuration for running BPF script.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-20194"
},
{
"category": "external",
"summary": "RHBZ#1912683",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1912683"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-20194",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20194"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-20194",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-20194"
}
],
"release_date": "2021-01-22T10:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T17:26:23+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4140"
},
{
"category": "workaround",
"details": "The default Red Hat Enterprise Linux kernel prevents unprivileged users from being able to use eBPF by the kernel.unprivileged_bpf_disabled sysctl. This would require a privileged user with CAP_SYS_ADMIN or root to be able to abuse this flaw reducing its attack space.\n\nFor the Red Hat Enterprise Linux 7 the eBPF for unprivileged users is always disabled.\n\nFor the Red Hat Enterprise Linux 8 to confirm the current state, inspect the sysctl with the command:\n\n# cat /proc/sys/kernel/unprivileged_bpf_disabled\n\nThe setting of 1 would mean that unprivileged users can not use eBPF.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: heap overflow in __cgroup_bpf_run_filter_getsockopt()"
},
{
"cve": "CVE-2021-20239",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2021-02-01T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1923636"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the BPF protocol. This flaw allows an attacker with a local account to leak information about kernel internal addresses. The highest threat from this vulnerability is to confidentiality.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: setsockopt System Call Untrusted Pointer Dereference Information Disclosure",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-20239"
},
{
"category": "external",
"summary": "RHBZ#1923636",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1923636"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-20239",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20239"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-20239",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-20239"
}
],
"release_date": "2021-02-01T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T17:26:23+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4140"
},
{
"category": "workaround",
"details": "Loading a filter is a privileged (CAP_SYS_ADMIN or root) operation. Once any filter is used, this attack is capable of being used by an unprivileged user. There is no known mitigation that product security finds suitable for this flaw.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 3.8,
"baseSeverity": "LOW",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: setsockopt System Call Untrusted Pointer Dereference Information Disclosure"
},
{
"acknowledgments": [
{
"names": [
"Or Cohen"
],
"organization": "Palo Alto Networks"
}
],
"cve": "CVE-2021-23133",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2021-04-09T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1948772"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free flaw was found in the Linux kernel\u0027s SCTP socket functionality that triggers a race condition. This flaw allows a local user to escalate their privileges on the system. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Race condition in sctp_destroy_sock list_del",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue is rated as having a Moderate impact because of the privileges required for running the known reproducer. The required privileges are CAP_BPF and CAP_NET_ADMIN capabilities that are disabled by default in Red Hat Enterprise Linux 7. For Red Hat Enterprise Linux 8, the SCTP protocol itself is disabled by default and cannot be used by a user without enablement by an administrator.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-23133"
},
{
"category": "external",
"summary": "RHBZ#1948772",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1948772"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-23133",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23133"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-23133",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-23133"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=b166a20b07382b8bc1dcee2a448715c9c2c81b5b",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=b166a20b07382b8bc1dcee2a448715c9c2c81b5b"
}
],
"release_date": "2021-04-18T09:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T17:26:23+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4140"
},
{
"category": "workaround",
"details": "To mitigate this issue, prevent the module sctp from being loaded (and this is so by default for Red Hat Enterprise Linux 8). Please see https://access.redhat.com/solutions/41278 for information on how to blacklist a kernel module to prevent it from loading automatically.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: Race condition in sctp_destroy_sock list_del"
},
{
"cve": "CVE-2021-28950",
"cwe": {
"id": "CWE-835",
"name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)"
},
"discovery_date": "2021-03-22T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1941762"
}
],
"notes": [
{
"category": "description",
"text": "A denial of service in the kernel side of the FUSE functionality can allow a local system to create a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: fuse: stall on CPU can occur because a retry loop continually finds the same bad inode",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-28950"
},
{
"category": "external",
"summary": "RHBZ#1941762",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1941762"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-28950",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-28950"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-28950",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-28950"
}
],
"release_date": "2021-03-04T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T17:26:23+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4140"
},
{
"category": "workaround",
"details": "As the FUSE module will be auto-loaded when required, its use can be disabled by preventing the module from loading with the following instructions:\n\n# echo \"install fuse /bin/true\" \u003e\u003e /etc/modprobe.d/disable-fuse.conf\n\nThe system will need to be restarted if the FUSE modules are loaded. In most circumstances, the CIFS kernel modules will be unable to be unloaded while the FUSE filesystems are in use.\n\nIf the system requires this module to work correctly, this mitigation may not be suitable.\n\nIf you need further assistance, see KCS article https://access.redhat.com/solutions/41278 or contact Red Hat Global Support Services.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: fuse: stall on CPU can occur because a retry loop continually finds the same bad inode"
},
{
"cve": "CVE-2021-28971",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"discovery_date": "2021-03-22T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1941784"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel. On some Haswell CPUs, userspace applications (such as perf-fuzzer) can cause a system crash because the PEBS status in a PEBS record is mishandled.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: System crash in intel_pmu_drain_pebs_nhm in arch/x86/events/intel/ds.c",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-28971"
},
{
"category": "external",
"summary": "RHBZ#1941784",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1941784"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-28971",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-28971"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-28971",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-28971"
}
],
"release_date": "2021-03-22T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T17:26:23+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4140"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options does not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: System crash in intel_pmu_drain_pebs_nhm in arch/x86/events/intel/ds.c"
},
{
"cve": "CVE-2021-29155",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"discovery_date": "2021-04-18T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1951595"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was discovered in retrieve_ptr_limit in kernel/bpf/verifier.c in the Linux kernel mechanism to mitigate speculatively out-of-bounds loads (Spectre mitigation). In this flaw a local, special user privileged (CAP_SYS_ADMIN) BPF program running on affected systems may bypass the protection, and execute speculatively out-of-bounds loads from the kernel memory. This can be abused to extract contents of kernel memory via side-channel.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: protection for sequences of pointer arithmetic operations against speculatively out-of-bounds loads can be bypassed to leak content of kernel memory",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-29155"
},
{
"category": "external",
"summary": "RHBZ#1951595",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1951595"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-29155",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29155"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-29155",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-29155"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2021/04/18/4",
"url": "https://www.openwall.com/lists/oss-security/2021/04/18/4"
}
],
"release_date": "2021-04-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T17:26:23+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4140"
},
{
"category": "workaround",
"details": "The default Red Hat Enterprise Linux kernel prevents unprivileged users from being able to use eBPF by the kernel.unprivileged_bpf_disabled sysctl. This would require a privileged user with CAP_SYS_ADMIN or root to be able to abuse this flaw reducing its attack space.\n\nFor the Red Hat Enterprise Linux 7 the eBPF for unprivileged users is always disabled.\nFor the Red Hat Enterprise Linux 8 to confirm the current state, inspect the sysctl with the command:\n\n# cat /proc/sys/kernel/unprivileged_bpf_disabled\n\nThe setting of 1 would mean that unprivileged users can not use eBPF, mitigating the flaw.\n\nA kernel update will be required to mitigate the flaw for the root or users with CAP_SYS_ADMIN capabilities.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: protection for sequences of pointer arithmetic operations against speculatively out-of-bounds loads can be bypassed to leak content of kernel memory"
},
{
"cve": "CVE-2021-29646",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2021-03-30T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1945345"
}
],
"notes": [
{
"category": "description",
"text": "A flaw buffer overflow in the Linux kernel TIPC protocol functionality was found in the way user uses protocol with encryption enabled. A local user could use this flaw to crash the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: improper input validation in tipc_nl_retrieve_key function in net/tipc/node.c",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-29646"
},
{
"category": "external",
"summary": "RHBZ#1945345",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1945345"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-29646",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29646"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-29646",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-29646"
}
],
"release_date": "2021-03-15T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T17:26:23+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4140"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: improper input validation in tipc_nl_retrieve_key function in net/tipc/node.c"
},
{
"cve": "CVE-2021-29650",
"cwe": {
"id": "CWE-662",
"name": "Improper Synchronization"
},
"discovery_date": "2021-03-30T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1945388"
}
],
"notes": [
{
"category": "description",
"text": "A denial-of-service (DoS) flaw was identified in the Linux kernel due to an incorrect memory barrier in xt_replace_table in net/netfilter/x_tables.c in the netfilter subsystem.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: lack a full memory barrier upon the assignment of a new table value in net/netfilter/x_tables.c and include/linux/netfilter/x_tables.h may lead to DoS",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-29650"
},
{
"category": "external",
"summary": "RHBZ#1945388",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1945388"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-29650",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29650"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-29650",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-29650"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=175e476b8cdf2a4de7432583b49c871345e4f8a1",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=175e476b8cdf2a4de7432583b49c871345e4f8a1"
}
],
"release_date": "2021-03-15T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T17:26:23+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4140"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: lack a full memory barrier upon the assignment of a new table value in net/netfilter/x_tables.c and include/linux/netfilter/x_tables.h may lead to DoS"
},
{
"acknowledgments": [
{
"names": [
"Manfred Paul"
],
"organization": "RedRocket CTF team"
}
],
"cve": "CVE-2021-31440",
"cwe": {
"id": "CWE-682",
"name": "Incorrect Calculation"
},
"discovery_date": "2021-05-21T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1964028"
}
],
"notes": [
{
"category": "description",
"text": "An out-of-bounds access flaw was found in the Linux kernel\u2019s implementation of the eBPF code verifier, where an incorrect register bounds calculation while checking unsigned 32-bit instructions in an eBPF program occurs.. By default accessing the eBPF verifier is only accessible to privileged users with CAP_SYS_ADMIN. The issue results from the lack of proper validation of user-supplied eBPF programs prior to executing them. A local user could use this flaw to crash the system or possibly escalate their privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: local escalation of privileges in handling of eBPF programs",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-31440"
},
{
"category": "external",
"summary": "RHBZ#1964028",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1964028"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-31440",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-31440"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-31440",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-31440"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=10bf4e83167cc68595b85fd73bb91e8f2c086e36",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=10bf4e83167cc68595b85fd73bb91e8f2c086e36"
},
{
"category": "external",
"summary": "https://www.zerodayinitiative.com/blog/2021/5/26/cve-2021-31440-an-incorrect-bounds-calculation-in-the-linux-kernel-ebpf-verifier",
"url": "https://www.zerodayinitiative.com/blog/2021/5/26/cve-2021-31440-an-incorrect-bounds-calculation-in-the-linux-kernel-ebpf-verifier"
}
],
"release_date": "2021-05-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T17:26:23+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4140"
},
{
"category": "workaround",
"details": "The default Red Hat Enterprise Linux kernel prevents unprivileged users from being able to use eBPF by the kernel.unprivileged_bpf_disabled sysctl. This would require a privileged user with CAP_SYS_ADMIN or root to be able to abuse this flaw reducing its attack space.\n\nFor the Red Hat Enterprise Linux 7 the eBPF for unprivileged users is always disabled.\nFor the Red Hat Enterprise Linux 8 to confirm the current state, inspect the sysctl with the command:\n\n# cat /proc/sys/kernel/unprivileged_bpf_disabled\n\nThe setting of 1 would mean that unprivileged users can not use eBPF, mitigating the flaw.\n\nA kernel update will be required to mitigate the flaw for the root or users with CAP_SYS_ADMIN capabilities.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: local escalation of privileges in handling of eBPF programs"
},
{
"cve": "CVE-2021-31829",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2021-05-04T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1957788"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel\u0027s eBPF verification code. By default, accessing the eBPF verifier is only accessible to privileged users with CAP_SYS_ADMIN. This flaw allows a local user who can insert eBPF instructions, to use the eBPF verifier to abuse a spectre-like flaw and infer all system memory. The highest threat from this vulnerability is to confidentiality.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: protection of stack pointer against speculative pointer arithmetic can be bypassed to leak content of kernel memory",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-31829"
},
{
"category": "external",
"summary": "RHBZ#1957788",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1957788"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-31829",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-31829"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-31829",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-31829"
}
],
"release_date": "2021-04-30T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T17:26:23+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4140"
},
{
"category": "workaround",
"details": "The default Red Hat Enterprise Linux kernel prevents unprivileged users from being able to use eBPF by the kernel.unprivileged_bpf_disabled sysctl. This would require a privileged user with CAP_SYS_ADMIN or root to be able to abuse this flaw reducing its attack space.\n\nFor the Red Hat Enterprise Linux 7 and 8 kernel to confirm the current state, inspect the sysctl with the command:\n\n# cat /proc/sys/kernel/unprivileged_bpf_disabled\n\nThe setting of 1 would mean that unprivileged users can not use eBPF, mitigating the flaw.\n\nA kernel update will be required to mitigate the flaw for the root or users with CAP_SYS_ADMIN capabilities.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: protection of stack pointer against speculative pointer arithmetic can be bypassed to leak content of kernel memory"
},
{
"cve": "CVE-2021-31916",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2021-03-29T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1946965"
}
],
"notes": [
{
"category": "description",
"text": "An out-of-bounds (OOB) memory write flaw was found in list_devices in drivers/md/dm-ioctl.c in the Multi-device driver module in the Linux kernel. A bound check failure allows an attacker with special user (CAP_SYS_ADMIN) privilege to gain access to out-of-bounds memory leading to a system crash, a leak of internal kernel information, or a privilege escalation problem.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: out of bounds array access in drivers/md/dm-ioctl.c",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw is rated a Low impact because in the default configuration, the issue can only be triggered by a privileged local user.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-31916"
},
{
"category": "external",
"summary": "RHBZ#1946965",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1946965"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-31916",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-31916"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-31916",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-31916"
},
{
"category": "external",
"summary": "https://github.com/torvalds/linux/commit/4edbe1d7bcffcd6269f3b5eb63f710393ff2ec7a",
"url": "https://github.com/torvalds/linux/commit/4edbe1d7bcffcd6269f3b5eb63f710393ff2ec7a"
},
{
"category": "external",
"summary": "https://seclists.org/oss-sec/2021/q1/268",
"url": "https://seclists.org/oss-sec/2021/q1/268"
}
],
"release_date": "2021-03-29T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T17:26:23+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4140"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: out of bounds array access in drivers/md/dm-ioctl.c"
},
{
"cve": "CVE-2021-33033",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2021-05-14T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1961300"
}
],
"notes": [
{
"category": "description",
"text": "A flaw use-after-free in the Linux kernel CIPSO network packet labeling protocol functionality was found in the way user open local network connection with the usage of the security labeling that is IP option number 134. A local user could use this flaw to crash the system or possibly escalate their privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: use-after-free in cipso_v4_genopt in net/ipv4/cipso_ipv4.c",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Considered to be Moderate rate, because by default CIPSO non-enabled and both no known way to reproduce the attack remotely and both it looks complex if even possible to use the attack in any way apart from crashing the system. For the usage of the inbound CIPSO connections, the administrator have to enable it with netlabelctl utility first. The vulnerability is considered to be for local user, because it can happen only when a local user opens a socket for sending packets, but not during receiving packets.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-33033"
},
{
"category": "external",
"summary": "RHBZ#1961300",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1961300"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-33033",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33033"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-33033",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33033"
}
],
"release_date": "2021-03-04T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T17:26:23+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4140"
},
{
"category": "workaround",
"details": "The mitigation would be not allowing CIPSO labeling for the inbound network connections. For the most of the default configurations both for network routers and for the Linux servers itself it is disabled by default.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: use-after-free in cipso_v4_genopt in net/ipv4/cipso_ipv4.c"
},
{
"cve": "CVE-2021-33200",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2021-05-27T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1965458"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in kernel/bpf/verifier.c in BPF in the Linux kernel. An incorrect limit is enforced for pointer arithmetic operations which can be abused to perform out-of-bounds reads and writes in kernel memory, leading to local privilege escalation. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: out-of-bounds reads and writes due to enforcing incorrect limits for pointer arithmetic operations by BPF verifier",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-33200"
},
{
"category": "external",
"summary": "RHBZ#1965458",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965458"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-33200",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33200"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-33200",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33200"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf.git/patch/?id=3d0220f6861d713213b015b582e9f21e5b28d2e0",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf.git/patch/?id=3d0220f6861d713213b015b582e9f21e5b28d2e0"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf.git/patch/?id=a7036191277f9fa68d92f2071ddc38c09b1e5ee5",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf.git/patch/?id=a7036191277f9fa68d92f2071ddc38c09b1e5ee5"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf.git/patch/?id=bb01a1bba579b4b1c5566af24d95f1767859771e",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf.git/patch/?id=bb01a1bba579b4b1c5566af24d95f1767859771e"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2021/05/27/1",
"url": "https://www.openwall.com/lists/oss-security/2021/05/27/1"
}
],
"release_date": "2021-05-26T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T17:26:23+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4140"
},
{
"category": "workaround",
"details": "The default Red Hat Enterprise Linux kernel prevents unprivileged users from being able to use eBPF by the kernel.unprivileged_bpf_disabled sysctl. This would require a privileged user with CAP_SYS_ADMIN or root to be able to abuse this flaw reducing its attack space.\n\nFor the Red Hat Enterprise Linux 7 the eBPF for unprivileged users is always disabled.\nFor the Red Hat Enterprise Linux 8 to confirm the current state, inspect the sysctl with the command:\n\n# cat /proc/sys/kernel/unprivileged_bpf_disabled\n\nThe setting of 1 would mean that unprivileged users can not use eBPF, mitigating the flaw.\n\nA kernel update will be required to mitigate the flaw for the root or users with CAP_SYS_ADMIN capabilities.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: out-of-bounds reads and writes due to enforcing incorrect limits for pointer arithmetic operations by BPF verifier"
},
{
"cve": "CVE-2021-46905",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"discovery_date": "2024-02-27T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2266253"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in the Linux kernel. This flaw occurs due to an unconditional NULL-pointer dereference on every disconnect in the Linux kernel.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: NULL-deref on disconnect regression",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-46905"
},
{
"category": "external",
"summary": "RHBZ#2266253",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2266253"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-46905",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46905"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-46905",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-46905"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024022557-CVE-2021-46905-6507@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024022557-CVE-2021-46905-6507@gregkh/T"
}
],
"release_date": "2024-02-26T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T17:26:23+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4140"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: NULL-deref on disconnect regression"
},
{
"cve": "CVE-2022-20166",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2022-08-29T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2122089"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel\u2019s sysfs layer. This flaw allows a local user who can read files under the /sysfs mount point to corrupt memory or possibly crash the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: possible buffer overflow in sysfs reading",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-20166"
},
{
"category": "external",
"summary": "RHBZ#2122089",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2122089"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-20166",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-20166"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-20166",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-20166"
}
],
"release_date": "2022-08-15T14:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T17:26:23+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4140"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options does not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: possible buffer overflow in sysfs reading"
}
]
}
RHSA-2021:4140
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel-rt is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.\n\nSecurity Fix(es):\n* kernel: out-of-bounds reads in pinctrl subsystem. (CVE-2020-0427)\n* kernel: Improper input validation in some Intel(R) Ethernet E810 Adapter drivers (CVE-2020-24502)\n* kernel: Insufficient access control in some Intel(R) Ethernet E810 Adapter drivers (CVE-2020-24503)\n* kernel: Uncontrolled resource consumption in some Intel(R) Ethernet E810 Adapter drivers (CVE-2020-24504)\n* kernel: Fragmentation cache not cleared on reconnection (CVE-2020-24586)\n* kernel: Reassembling fragments encrypted under different keys (CVE-2020-24587)\n* kernel: wifi frame payload being parsed incorrectly as an L2 frame (CVE-2020-24588)\n* kernel: Forwarding EAPOL from unauthenticated wifi client (CVE-2020-26139)\n* kernel: accepting plaintext data frames in protected networks (CVE-2020-26140)\n* kernel: not verifying TKIP MIC of fragmented frames (CVE-2020-26141)\n* kernel: accepting fragmented plaintext frames in protected networks (CVE-2020-26143)\n* kernel: accepting unencrypted A-MSDU frames that start with RFC1042 header (CVE-2020-26144)\n* kernel: accepting plaintext broadcast fragments as full frames (CVE-2020-26145)\n* kernel: locking inconsistency in tty_io.c and tty_jobctrl.c can lead to a read-after-free (CVE-2020-29660)\n* kernel: buffer overflow in mwifiex_cmd_802_11_ad_hoc_start function via a long SSID value (CVE-2020-36158)\n* kernel: slab out-of-bounds read in hci_extended_inquiry_result_evt() (CVE-2020-36386)\n* kernel: Improper access control in BlueZ may allow information disclosure vulnerability. (CVE-2021-0129)\n* kernel: Use-after-free in ndb_queue_rq() (CVE-2021-3348)\n* kernel: Linux kernel eBPF RINGBUF map oversized allocation (CVE-2021-3489)\n* kernel: double free in bluetooth subsystem when the HCI device initialization fails (CVE-2021-3564)\n* kernel: use-after-free in function hci_sock_bound_ioctl() (CVE-2021-3573)\n* kernel: eBPF 32-bit source register truncation on div/mod (CVE-2021-3600)\n* kernel: DoS in rb_per_cpu_empty() (CVE-2021-3679)\n* kernel: overlayfs: Mounting overlayfs inside an unprivileged user namespace can reveal files (CVE-2021-3732)\n* kernel: heap overflow in __cgroup_bpf_run_filter_getsockopt() (CVE-2021-20194)\n* kernel: Race condition in sctp_destroy_sock list_del (CVE-2021-23133)\n* kernel: fuse: stall on CPU can occur because a retry loop continually finds the same bad inode (CVE-2021-28950)\n* kernel: System crash in intel_pmu_drain_pebs_nhm (CVE-2021-28971)\n* kernel: protection for sequences of pointer arithmetic operations against speculatively out-of-bounds loads can be bypassed to leak content of kernel memory (CVE-2021-29155)\n* kernel: improper input validation in tipc_nl_retrieve_key function (CVE-2021-29646)\n* kernel: lack a full memory barrier upon the assignment of a new table value in x_tables.h may lead to DoS (CVE-2021-29650)\n* kernel: local escalation of privileges in handling of eBPF programs (CVE-2021-31440)\n* kernel: protection of stack pointer against speculative pointer arithmetic can be bypassed to leak content of kernel memory (CVE-2021-31829)\n* kernel: out-of-bounds reads and writes due to enforcing incorrect limits for pointer arithmetic operations by BPF verifier (CVE-2021-33200)\n* kernel: reassembling encrypted fragments with non-consecutive packet numbers (CVE-2020-26146)\n* kernel: reassembling mixed encrypted/plaintext fragments (CVE-2020-26147)\n* kernel: the copy-on-write implementation can grant unintended write access because of a race condition in a THP mapcount check (CVE-2020-29368)\n* kernel: flowtable list del corruption with kernel BUG (CVE-2021-3635)\n* kernel: NULL pointer dereference in llsec_key_alloc() (CVE-2021-3659)\n* kernel: setsockopt System Call Untrusted Pointer Dereference Information Disclosure (CVE-2021-20239)\n* kernel: out of bounds array access in drivers/md/dm-ioctl.c (CVE-2021-31916)",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2021:4140",
"url": "https://access.redhat.com/errata/RHSA-2021:4140"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.5_release_notes/",
"url": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.5_release_notes/"
},
{
"category": "external",
"summary": "1875275",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1875275"
},
{
"category": "external",
"summary": "1902412",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1902412"
},
{
"category": "external",
"summary": "1903244",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1903244"
},
{
"category": "external",
"summary": "1905747",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1905747"
},
{
"category": "external",
"summary": "1906522",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1906522"
},
{
"category": "external",
"summary": "1912683",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1912683"
},
{
"category": "external",
"summary": "1913348",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1913348"
},
{
"category": "external",
"summary": "1919893",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1919893"
},
{
"category": "external",
"summary": "1921958",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1921958"
},
{
"category": "external",
"summary": "1923636",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1923636"
},
{
"category": "external",
"summary": "1930376",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1930376"
},
{
"category": "external",
"summary": "1930379",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1930379"
},
{
"category": "external",
"summary": "1930381",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1930381"
},
{
"category": "external",
"summary": "1941762",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1941762"
},
{
"category": "external",
"summary": "1941784",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1941784"
},
{
"category": "external",
"summary": "1945345",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1945345"
},
{
"category": "external",
"summary": "1945388",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1945388"
},
{
"category": "external",
"summary": "1946965",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1946965"
},
{
"category": "external",
"summary": "1948772",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1948772"
},
{
"category": "external",
"summary": "1951595",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1951595"
},
{
"category": "external",
"summary": "1957788",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1957788"
},
{
"category": "external",
"summary": "1959559",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1959559"
},
{
"category": "external",
"summary": "1959642",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1959642"
},
{
"category": "external",
"summary": "1959654",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1959654"
},
{
"category": "external",
"summary": "1959657",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1959657"
},
{
"category": "external",
"summary": "1959663",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1959663"
},
{
"category": "external",
"summary": "1960490",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1960490"
},
{
"category": "external",
"summary": "1960492",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1960492"
},
{
"category": "external",
"summary": "1960496",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1960496"
},
{
"category": "external",
"summary": "1960498",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1960498"
},
{
"category": "external",
"summary": "1960500",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1960500"
},
{
"category": "external",
"summary": "1960502",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1960502"
},
{
"category": "external",
"summary": "1960504",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1960504"
},
{
"category": "external",
"summary": "1964028",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1964028"
},
{
"category": "external",
"summary": "1964139",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1964139"
},
{
"category": "external",
"summary": "1965038",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965038"
},
{
"category": "external",
"summary": "1965458",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965458"
},
{
"category": "external",
"summary": "1966578",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1966578"
},
{
"category": "external",
"summary": "1969489",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1969489"
},
{
"category": "external",
"summary": "1975949",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1975949"
},
{
"category": "external",
"summary": "1976946",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1976946"
},
{
"category": "external",
"summary": "1981954",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1981954"
},
{
"category": "external",
"summary": "1989165",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1989165"
},
{
"category": "external",
"summary": "1995249",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1995249"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_4140.json"
}
],
"title": "Red Hat Security Advisory: kernel-rt security and bug fix update",
"tracking": {
"current_release_date": "2025-10-10T02:11:17+00:00",
"generator": {
"date": "2025-10-10T02:11:17+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2021:4140",
"initial_release_date": "2021-11-09T17:26:23+00:00",
"revision_history": [
{
"date": "2021-11-09T17:26:23+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2021-11-09T17:26:23+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-10T02:11:17+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product": {
"name": "Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.5.0.GA",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:8::nfv"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Real Time (v. 8)",
"product": {
"name": "Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.5.0.GA",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:8::realtime"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"product": {
"name": "kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"product_id": "kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt@4.18.0-348.rt7.130.el8?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"product": {
"name": "kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"product_id": "kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt@4.18.0-348.rt7.130.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"product": {
"name": "kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"product_id": "kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-core@4.18.0-348.rt7.130.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"product": {
"name": "kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"product_id": "kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug@4.18.0-348.rt7.130.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"product": {
"name": "kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"product_id": "kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-core@4.18.0-348.rt7.130.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"product": {
"name": "kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"product_id": "kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-devel@4.18.0-348.rt7.130.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"product": {
"name": "kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"product_id": "kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-kvm@4.18.0-348.rt7.130.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"product": {
"name": "kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"product_id": "kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-modules@4.18.0-348.rt7.130.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"product": {
"name": "kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"product_id": "kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-modules-extra@4.18.0-348.rt7.130.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"product": {
"name": "kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"product_id": "kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-devel@4.18.0-348.rt7.130.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"product": {
"name": "kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"product_id": "kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-kvm@4.18.0-348.rt7.130.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"product": {
"name": "kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"product_id": "kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-modules@4.18.0-348.rt7.130.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"product": {
"name": "kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"product_id": "kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-modules-extra@4.18.0-348.rt7.130.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"product": {
"name": "kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"product_id": "kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-debuginfo@4.18.0-348.rt7.130.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"product": {
"name": "kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"product_id": "kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debuginfo@4.18.0-348.rt7.130.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"product": {
"name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"product_id": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debuginfo-common-x86_64@4.18.0-348.rt7.130.el8?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:4.18.0-348.rt7.130.el8.src as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src"
},
"product_reference": "kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"relates_to_product_reference": "NFV-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64"
},
"product_reference": "kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"relates_to_product_reference": "NFV-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64"
},
"product_reference": "kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"relates_to_product_reference": "NFV-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64"
},
"product_reference": "kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"relates_to_product_reference": "NFV-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64"
},
"product_reference": "kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"relates_to_product_reference": "NFV-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64"
},
"product_reference": "kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"relates_to_product_reference": "NFV-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64"
},
"product_reference": "kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"relates_to_product_reference": "NFV-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64"
},
"product_reference": "kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"relates_to_product_reference": "NFV-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64"
},
"product_reference": "kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"relates_to_product_reference": "NFV-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
},
"product_reference": "kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"relates_to_product_reference": "NFV-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64"
},
"product_reference": "kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"relates_to_product_reference": "NFV-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64"
},
"product_reference": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"relates_to_product_reference": "NFV-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64"
},
"product_reference": "kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"relates_to_product_reference": "NFV-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64"
},
"product_reference": "kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"relates_to_product_reference": "NFV-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64"
},
"product_reference": "kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"relates_to_product_reference": "NFV-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
},
"product_reference": "kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"relates_to_product_reference": "NFV-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:4.18.0-348.rt7.130.el8.src as a component of Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src"
},
"product_reference": "kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"relates_to_product_reference": "RT-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64"
},
"product_reference": "kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"relates_to_product_reference": "RT-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64"
},
"product_reference": "kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"relates_to_product_reference": "RT-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64"
},
"product_reference": "kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"relates_to_product_reference": "RT-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64"
},
"product_reference": "kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"relates_to_product_reference": "RT-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64"
},
"product_reference": "kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"relates_to_product_reference": "RT-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64"
},
"product_reference": "kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"relates_to_product_reference": "RT-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64"
},
"product_reference": "kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"relates_to_product_reference": "RT-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64"
},
"product_reference": "kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"relates_to_product_reference": "RT-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
},
"product_reference": "kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"relates_to_product_reference": "RT-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64"
},
"product_reference": "kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"relates_to_product_reference": "RT-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64"
},
"product_reference": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"relates_to_product_reference": "RT-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64"
},
"product_reference": "kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"relates_to_product_reference": "RT-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64"
},
"product_reference": "kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"relates_to_product_reference": "RT-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64"
},
"product_reference": "kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"relates_to_product_reference": "RT-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
},
"product_reference": "kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"relates_to_product_reference": "RT-8.5.0.GA"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2019-14615",
"cwe": {
"id": "CWE-212",
"name": "Improper Removal of Sensitive Information Before Storage or Transfer"
},
"discovery_date": "2020-01-09T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1789209"
}
],
"notes": [
{
"category": "description",
"text": "An information disclosure flaw was found in the Linux kernel. The i915 graphics driver lacks control of flow for data structures which may allow a local, authenticated user to disclose information when using ioctl commands with an attached i915 device. The highest threat from this vulnerability is to data confidentiality.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Intel graphics card information leak.",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue affects the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 6, 7, 8 and Red Hat Enterprise MRG 2. Future kernel updates for Red Hat Enterprise Linux 6, 7, and 8 may address this issue.\n\nThis has been rated as having Moderate security impact and is not currently planned to be addressed in future updates of Red Hat Enterprise MRG 2.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-14615"
},
{
"category": "external",
"summary": "RHBZ#1789209",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1789209"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-14615",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14615"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-14615",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-14615"
}
],
"release_date": "2020-01-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T17:26:23+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4140"
},
{
"category": "workaround",
"details": "Preventing loading of the i915 kernel module will prevent attackers from using this exploit against the system; however, the power management functionality of the card will be disabled and the system may draw additional power. See the kcs \u201cHow do I blacklist a kernel module to prevent it from loading automatically?\u201c (https://access.redhat.com/solutions/41278) for instructions on how to disable a kernel module from autoloading. Graphical displays may also be at low resolution or not work correctly.\n\nThis mitigation may not be suitable if the graphical login functionality is required.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: Intel graphics card information leak."
},
{
"cve": "CVE-2020-0427",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2021-01-24T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1919893"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux pinctrl system. It is possible to trigger an of bounds read due to a use after free. This could lead to local information disclosure with no additional execution privileges needed.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: out-of-bounds reads in pinctrl subsystem.",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-0427"
},
{
"category": "external",
"summary": "RHBZ#1919893",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1919893"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-0427",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0427"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-0427",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-0427"
}
],
"release_date": "2020-11-22T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T17:26:23+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4140"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: out-of-bounds reads in pinctrl subsystem."
},
{
"cve": "CVE-2020-24502",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2021-02-17T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1930379"
}
],
"notes": [
{
"category": "description",
"text": "Improper input validation in some Intel(R) Ethernet E810 Adapter drivers for Linux may allow an authenticated user to potentially enable a denial of service via local access.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Improper input validation in some Intel(R) Ethernet E810 Adapter drivers",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-24502"
},
{
"category": "external",
"summary": "RHBZ#1930379",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1930379"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-24502",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24502"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-24502",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-24502"
}
],
"release_date": "2021-02-17T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T17:26:23+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4140"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: Improper input validation in some Intel(R) Ethernet E810 Adapter drivers"
},
{
"cve": "CVE-2020-24503",
"cwe": {
"id": "CWE-863",
"name": "Incorrect Authorization"
},
"discovery_date": "2021-02-17T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1930381"
}
],
"notes": [
{
"category": "description",
"text": "Insufficient access control in some Intel(R) Ethernet E810 Adapter drivers for Linux may allow an authenticated user to potentially enable information disclosure via local access.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Insufficient access control in some Intel(R) Ethernet E810 Adapter drivers",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-24503"
},
{
"category": "external",
"summary": "RHBZ#1930381",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1930381"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-24503",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24503"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-24503",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-24503"
}
],
"release_date": "2021-02-17T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T17:26:23+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4140"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: Insufficient access control in some Intel(R) Ethernet E810 Adapter drivers"
},
{
"cve": "CVE-2020-24504",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2021-02-17T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1930376"
}
],
"notes": [
{
"category": "description",
"text": "An uncontrolled resource consumption in some Intel(R) Ethernet E810 Adapter drivers for Linux may allow an authenticated user to potentially cause a denial of service via local access.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Uncontrolled resource consumption in some Intel(R) Ethernet E810 Adapter drivers",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-24504"
},
{
"category": "external",
"summary": "RHBZ#1930376",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1930376"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-24504",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24504"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-24504",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-24504"
},
{
"category": "external",
"summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00462.html",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00462.html"
}
],
"release_date": "2021-02-17T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T17:26:23+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4140"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: Uncontrolled resource consumption in some Intel(R) Ethernet E810 Adapter drivers"
},
{
"cve": "CVE-2020-24586",
"cwe": {
"id": "CWE-212",
"name": "Improper Removal of Sensitive Information Before Storage or Transfer"
},
"discovery_date": "2021-05-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1959642"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernels implementation of wifi fragmentation handling. An attacker with the ability to transmit within the wireless transmission range of an access point can abuse a flaw where previous contents of wifi fragments can be unintentionally transmitted to another device.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Fragmentation cache not cleared on reconnection",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-24586"
},
{
"category": "external",
"summary": "RHBZ#1959642",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1959642"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-24586",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24586"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-24586",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-24586"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-wireless/20210511200110.3f8290e59823.I622a67769ed39257327a362cfc09c812320eb979@changeid/",
"url": "https://lore.kernel.org/linux-wireless/20210511200110.3f8290e59823.I622a67769ed39257327a362cfc09c812320eb979@changeid/"
}
],
"release_date": "2021-05-12T01:20:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T17:26:23+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4140"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options does not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: Fragmentation cache not cleared on reconnection"
},
{
"cve": "CVE-2020-24587",
"cwe": {
"id": "CWE-345",
"name": "Insufficient Verification of Data Authenticity"
},
"discovery_date": "2021-05-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1959654"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel\u0027s WiFi implementation. An attacker within the wireless range can abuse a logic flaw in the WiFi implementation by reassembling packets from multiple fragments under different keys, treating them as valid. This flaw allows an attacker to send a fragment under an incorrect key, treating them as a valid fragment under the new key. The highest threat from this vulnerability is to confidentiality.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Reassembling fragments encrypted under different keys",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-24587"
},
{
"category": "external",
"summary": "RHBZ#1959654",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1959654"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-24587",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24587"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-24587",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-24587"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-wireless/20210511200110.3f8290e59823.I622a67769ed39257327a362cfc09c812320eb979@changeid/",
"url": "https://lore.kernel.org/linux-wireless/20210511200110.3f8290e59823.I622a67769ed39257327a362cfc09c812320eb979@changeid/"
}
],
"release_date": "2021-05-11T14:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T17:26:23+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4140"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options does not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "NONE",
"baseScore": 3.1,
"baseSeverity": "LOW",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: Reassembling fragments encrypted under different keys"
},
{
"cve": "CVE-2020-24588",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2021-05-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1959657"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernels wifi implementation. An attacker within wireless broadcast range can inject custom data into the wireless communication circumventing checks on the data. This can cause the frame to pass checks and be considered a valid frame of a different type.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: wifi frame payload being parsed incorrectly as an L2 frame",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-24588"
},
{
"category": "external",
"summary": "RHBZ#1959657",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1959657"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-24588",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24588"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-24588",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-24588"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-wireless/20210511200110.25d93176ddaf.I9e265b597f2cd23eb44573f35b625947b386a9de@changeid/",
"url": "https://lore.kernel.org/linux-wireless/20210511200110.25d93176ddaf.I9e265b597f2cd23eb44573f35b625947b386a9de@changeid/"
}
],
"release_date": "2021-05-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T17:26:23+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4140"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options does not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: wifi frame payload being parsed incorrectly as an L2 frame"
},
{
"cve": "CVE-2020-26139",
"cwe": {
"id": "CWE-829",
"name": "Inclusion of Functionality from Untrusted Control Sphere"
},
"discovery_date": "2021-05-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1959663"
}
],
"notes": [
{
"category": "description",
"text": "Frames used for authentication and key management between the AP and connected clients. Some clients may take these redirected frames masquerading as control mechanisms from the AP.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Forwarding EAPOL from unauthenticated wifi client",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-26139"
},
{
"category": "external",
"summary": "RHBZ#1959663",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1959663"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-26139",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26139"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-26139",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-26139"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-wireless/20210511200110.cb327ed0cabe.Ib7dcffa2a31f0913d660de65ba3c8aca75b1d10f@changeid/",
"url": "https://lore.kernel.org/linux-wireless/20210511200110.cb327ed0cabe.Ib7dcffa2a31f0913d660de65ba3c8aca75b1d10f@changeid/"
}
],
"release_date": "2021-05-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T17:26:23+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4140"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options does not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "NONE",
"baseScore": 3.5,
"baseSeverity": "LOW",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: Forwarding EAPOL from unauthenticated wifi client"
},
{
"cve": "CVE-2020-26140",
"cwe": {
"id": "CWE-346",
"name": "Origin Validation Error"
},
"discovery_date": "2021-05-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1960490"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in Linux kernel. Where the WiFi implementations accept plaintext frames in a protected WiFi network. An adversary can abuse this to inject arbitrary data frames independent of the network configuration.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: accepting plaintext data frames in protected networks",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-26140"
},
{
"category": "external",
"summary": "RHBZ#1960490",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1960490"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-26140",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26140"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-26140",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-26140"
}
],
"release_date": "2021-05-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T17:26:23+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4140"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: accepting plaintext data frames in protected networks"
},
{
"cve": "CVE-2020-26141",
"cwe": {
"id": "CWE-863",
"name": "Incorrect Authorization"
},
"discovery_date": "2021-05-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1960492"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in Linux kernel\u0027s WiFi implementation. An attacker within wireless range can inject a control packet fragment where the kernel does not verify the Message Integrity Check (authenticity) of fragmented TKIP frames.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: not verifying TKIP MIC of fragmented frames",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-26141"
},
{
"category": "external",
"summary": "RHBZ#1960492",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1960492"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-26141",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26141"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-26141",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-26141"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-wireless/20210511200110.c3f1d42c6746.I795593fcaae941c471425b8c7d5f7bb185d29142@changeid/",
"url": "https://lore.kernel.org/linux-wireless/20210511200110.c3f1d42c6746.I795593fcaae941c471425b8c7d5f7bb185d29142@changeid/"
}
],
"release_date": "2021-05-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T17:26:23+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4140"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options does not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: not verifying TKIP MIC of fragmented frames"
},
{
"cve": "CVE-2020-26143",
"cwe": {
"id": "CWE-346",
"name": "Origin Validation Error"
},
"discovery_date": "2021-05-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1960496"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in Linux kernel, where the WiFi implementations assemble fragments even though some of them were sent in plaintext. This vulnerability can be abused to inject packets and/or exfiltrate selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP data-confidentiality protocol is used.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: accepting fragmented plaintext frames in protected networks",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-26143"
},
{
"category": "external",
"summary": "RHBZ#1960496",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1960496"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-26143",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26143"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-26143",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-26143"
}
],
"release_date": "2021-05-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T17:26:23+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4140"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: accepting fragmented plaintext frames in protected networks"
},
{
"cve": "CVE-2020-26144",
"cwe": {
"id": "CWE-290",
"name": "Authentication Bypass by Spoofing"
},
"discovery_date": "2021-05-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1960498"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel, where the WiFi implementations accept plaintext A-MSDU frames as long as the first 8 bytes correspond to a valid RFC1042 (ex., LLC/SNAP) header for EAPOL. The highest threat from this vulnerability is to integrity.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: accepting unencrypted A-MSDU frames that start with RFC1042 header",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-26144"
},
{
"category": "external",
"summary": "RHBZ#1960498",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1960498"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-26144",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26144"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-26144",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-26144"
}
],
"release_date": "2021-05-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T17:26:23+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4140"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options does not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: accepting unencrypted A-MSDU frames that start with RFC1042 header"
},
{
"cve": "CVE-2020-26145",
"cwe": {
"id": "CWE-307",
"name": "Improper Restriction of Excessive Authentication Attempts"
},
"discovery_date": "2021-05-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1960500"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in ath10k_htt_rx_proc_rx_frag_ind_hl in drivers/net/wireless/ath/ath10k/htt_rx.c in the Linux kernel WiFi implementations, where it accepts a second (or subsequent) broadcast fragments even when sent in plaintext and then process them as full unfragmented frames. The highest threat from this vulnerability is to integrity.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: accepting plaintext broadcast fragments as full frames",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-26145"
},
{
"category": "external",
"summary": "RHBZ#1960500",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1960500"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-26145",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26145"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-26145",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-26145"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-wireless/20210511200110.9ca6ca7945a9.I1e18b514590af17c155bda86699bc3a971a8dcf4@changeid/",
"url": "https://lore.kernel.org/linux-wireless/20210511200110.9ca6ca7945a9.I1e18b514590af17c155bda86699bc3a971a8dcf4@changeid/"
}
],
"release_date": "2021-05-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T17:26:23+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4140"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options does not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: accepting plaintext broadcast fragments as full frames"
},
{
"cve": "CVE-2020-26146",
"cwe": {
"id": "CWE-307",
"name": "Improper Restriction of Excessive Authentication Attempts"
},
"discovery_date": "2021-05-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1960502"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in Linux kernel, where the WiFi implementation reassemble fragments with non-consecutive packet numbers. An adversary can abuse this to exfiltrate selected fragments. This vulnerability is exploitable when another device sends fragmented frames and the WEP, CCMP, or GCMP data-confidentiality protocol is used. Note that WEP is vulnerable to this attack by design.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: reassembling encrypted fragments with non-consecutive packet numbers",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-26146"
},
{
"category": "external",
"summary": "RHBZ#1960502",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1960502"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-26146",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26146"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-26146",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-26146"
}
],
"release_date": "2021-05-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T17:26:23+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4140"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: reassembling encrypted fragments with non-consecutive packet numbers"
},
{
"cve": "CVE-2020-26147",
"cwe": {
"id": "CWE-307",
"name": "Improper Restriction of Excessive Authentication Attempts"
},
"discovery_date": "2021-05-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1960504"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in ieee80211_rx_h_defragment in net/mac80211/rx.c in the Linux Kernel\u0027s WiFi implementation. This vulnerability can be abused to inject packets or exfiltrate selected fragments when another device sends fragmented frames, and the WEP, CCMP, or GCMP data-confidentiality protocol is used. The highest threat from this vulnerability is to integrity.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: reassembling mixed encrypted/plaintext fragments",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-26147"
},
{
"category": "external",
"summary": "RHBZ#1960504",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1960504"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-26147",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26147"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-26147",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-26147"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-wireless/20210511200110.30c4394bb835.I5acfdb552cc1d20c339c262315950b3eac491397@changeid/",
"url": "https://lore.kernel.org/linux-wireless/20210511200110.30c4394bb835.I5acfdb552cc1d20c339c262315950b3eac491397@changeid/"
}
],
"release_date": "2021-05-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T17:26:23+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4140"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options does not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:L/I:H/A:N",
"version": "3.1"
},
"products": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: reassembling mixed encrypted/plaintext fragments"
},
{
"cve": "CVE-2020-29368",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2020-12-01T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1903244"
}
],
"notes": [
{
"category": "description",
"text": "An issue was discovered in __split_huge_pmd in mm/huge_memory.c in the Linux kernel. The copy-on-write implementation can grant unintended write access because of a race condition in a THP mapcount check.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: the copy-on-write implementation can grant unintended write access because of a race condition in a THP mapcount check",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw has been rated as having Moderateimpact because, based on Red Hat\u0027s assessment, this issue is hard to exploit in practice because the race window is too small for it to be reliable.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-29368"
},
{
"category": "external",
"summary": "RHBZ#1903244",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1903244"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-29368",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-29368"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-29368",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-29368"
}
],
"release_date": "2020-06-03T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T17:26:23+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4140"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: the copy-on-write implementation can grant unintended write access because of a race condition in a THP mapcount check"
},
{
"cve": "CVE-2020-29660",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2020-12-09T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1906522"
}
],
"notes": [
{
"category": "description",
"text": "A locking inconsistency issue was discovered in the tty subsystem of the Linux kernel. A local user could use this flaw to read numerical value from memory after free.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: locking inconsistency in drivers/tty/tty_io.c and drivers/tty/tty_jobctrl.c can lead to a read-after-free",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw is rated as having Low impact (Red Hat Enterprise Linux 7) because of the need to have CAP_SYS_TTY_CONFIG privileges.\n\nThis flaw is rated as having Moderate (Red Hat Enterprise Linux 8) impact because of the need to have CAP_SYS_TTY_CONFIG privileges. Red Hat Enterprise Linux 8 enabled unprivileged user/network namespaces by default which can be used to exercise this vulnerability.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-29660"
},
{
"category": "external",
"summary": "RHBZ#1906522",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1906522"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-29660",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-29660"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-29660",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-29660"
}
],
"release_date": "2020-12-04T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T17:26:23+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4140"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: locking inconsistency in drivers/tty/tty_io.c and drivers/tty/tty_jobctrl.c can lead to a read-after-free"
},
{
"cve": "CVE-2020-36158",
"cwe": {
"id": "CWE-120",
"name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)"
},
"discovery_date": "2021-01-05T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1913348"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel. The marvell wifi driver could allow a local attacker to execute arbitrary code via a long SSID value in mwifiex_cmd_802_11_ad_hoc_start function. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: buffer overflow in mwifiex_cmd_802_11_ad_hoc_start function in drivers/net/wireless/marvell/mwifiex/join.c via a long SSID value",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue is rated as having Moderate impact because the attacker needs to be local and privileged enough to be able to initiate ad-hoc WIFI network creation.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-36158"
},
{
"category": "external",
"summary": "RHBZ#1913348",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1913348"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-36158",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36158"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-36158",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-36158"
}
],
"release_date": "2020-12-08T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T17:26:23+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4140"
},
{
"category": "workaround",
"details": "To mitigate this issue, prevent the module mwifiex from being loaded. Please see https://access.redhat.com/solutions/41278 for information on how to blacklist a kernel module to prevent it from loading automatically.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: buffer overflow in mwifiex_cmd_802_11_ad_hoc_start function in drivers/net/wireless/marvell/mwifiex/join.c via a long SSID value"
},
{
"cve": "CVE-2020-36312",
"cwe": {
"id": "CWE-772",
"name": "Missing Release of Resource after Effective Lifetime"
},
"discovery_date": "2021-04-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1947991"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the KVM hypervisor of the Linux kernel. A memory leak could occur in kvm_io_bus_unregister_dev() upon a kmalloc failure. The highest threat from this vulnerability is to system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: memory leak upon a kmalloc failure in kvm_io_bus_unregister_dev function in virt/kvm/kvm_main.c",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-36312"
},
{
"category": "external",
"summary": "RHBZ#1947991",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1947991"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-36312",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36312"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-36312",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-36312"
}
],
"release_date": "2020-09-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T17:26:23+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4140"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 3.3,
"baseSeverity": "LOW",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: memory leak upon a kmalloc failure in kvm_io_bus_unregister_dev function in virt/kvm/kvm_main.c"
},
{
"cve": "CVE-2020-36386",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"discovery_date": "2021-06-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1969489"
}
],
"notes": [
{
"category": "description",
"text": "A flaw out of bounds memory access in the Linux kernel bluetooth subsystem was found in the way when some data being read about the bluetooth device with the hci_extended_inquiry_result_evt call. A local user could use this flaw to crash the system or read some data out of memory bounds that can lead to data confidentiality threat.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: slab out-of-bounds read in hci_extended_inquiry_result_evt() in net/bluetooth/hci_event.c",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw is rated as having a Moderate impact because even the data being read out of memory bounds is written to some cache, it was known before that this data from non-safe source and as result no any sensitive dependencies on this data.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-36386"
},
{
"category": "external",
"summary": "RHBZ#1969489",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1969489"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-36386",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36386"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-36386",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-36386"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=51c19bf3d5cfaa66571e4b88ba2a6f6295311101",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=51c19bf3d5cfaa66571e4b88ba2a6f6295311101"
}
],
"release_date": "2020-07-10T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T17:26:23+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4140"
},
{
"category": "workaround",
"details": "To mitigate this issue, prevent the module bluetooth from being loaded (if Bluetooth not required for the system). Please see https://access.redhat.com/solutions/41278 for information on how to blacklist a kernel module to prevent it from loading automatically.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: slab out-of-bounds read in hci_extended_inquiry_result_evt() in net/bluetooth/hci_event.c"
},
{
"cve": "CVE-2021-0129",
"cwe": {
"id": "CWE-287",
"name": "Improper Authentication"
},
"discovery_date": "2021-05-26T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1965038"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel. Improper access control in BlueZ may allow an authenticated user to potentially enable information disclosure via adjacent access. The highest threat from this vulnerability is to data confidentiality and integrity.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Improper access control in BlueZ may allow information disclosure vulnerability.",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-0129"
},
{
"category": "external",
"summary": "RHBZ#1965038",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965038"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-0129",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0129"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-0129",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-0129"
}
],
"release_date": "2021-06-08T03:30:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T17:26:23+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4140"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: Improper access control in BlueZ may allow information disclosure vulnerability."
},
{
"cve": "CVE-2021-3348",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2021-01-28T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1921958"
}
],
"notes": [
{
"category": "description",
"text": "A use after free flaw in the Linux kernel network block device (NBD) subsystem was found in the way user calls an ioctl NBD_SET_SOCK at a certain point during device setup.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Use-after-free in ndb_queue_rq() in drivers/block/nbd.c",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw is rated as having a Moderate impact because in the default configuration, the issue can only be triggered by a privileged local user (with access to the nbd device).",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-3348"
},
{
"category": "external",
"summary": "RHBZ#1921958",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1921958"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-3348",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3348"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3348",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3348"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-block/24dff677353e2e30a71d8b66c4dffdbdf77c4dbd.1611595239.git.josef@toxicpanda.com/",
"url": "https://lore.kernel.org/linux-block/24dff677353e2e30a71d8b66c4dffdbdf77c4dbd.1611595239.git.josef@toxicpanda.com/"
}
],
"release_date": "2021-01-28T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T17:26:23+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4140"
},
{
"category": "workaround",
"details": "To mitigate this issue, prevent the module nbd from being loaded. Please see https://access.redhat.com/solutions/41278 for information on how to blacklist a kernel module to prevent it from loading automatically.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: Use-after-free in ndb_queue_rq() in drivers/block/nbd.c"
},
{
"acknowledgments": [
{
"names": [
"Ryota Shiga"
]
}
],
"cve": "CVE-2021-3489",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"discovery_date": "2021-05-11T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1959559"
}
],
"notes": [
{
"category": "description",
"text": "A flaw out of bound memory write in the Linux kernel BPF subsystem was found in the way user writes to BPF ring buffer too fast, so larger buffer than available memory could be allocated. A local user could use this flaw to crash the system or possibly escalate their privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Linux kernel eBPF RINGBUF map oversized allocation",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-3489"
},
{
"category": "external",
"summary": "RHBZ#1959559",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1959559"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-3489",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3489"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3489",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3489"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf.git/commit/?id=4b81ccebaeee885ab1aa1438133f2991e3a2b6ea",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf.git/commit/?id=4b81ccebaeee885ab1aa1438133f2991e3a2b6ea"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2021/05/11/10",
"url": "https://www.openwall.com/lists/oss-security/2021/05/11/10"
}
],
"release_date": "2021-05-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T17:26:23+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4140"
},
{
"category": "workaround",
"details": "The default Red Hat Enterprise Linux kernel prevents unprivileged users from being able to use eBPF by the kernel.unprivileged_bpf_disabled sysctl. This would require a privileged user with CAP_SYS_ADMIN or root to be able to abuse this flaw reducing its attack space.\n\nFor the Red Hat Enterprise Linux 7 the eBPF for unprivileged users is always disabled.\nFor the Red Hat Enterprise Linux 8 to confirm the current state, inspect the sysctl with the command:\n\n# cat /proc/sys/kernel/unprivileged_bpf_disabled\n\nThe setting of 1 would mean that unprivileged users can not use eBPF, mitigating the flaw.\n\nA kernel update will be required to mitigate the flaw for the root or users with CAP_SYS_ADMIN capabilities.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: Linux kernel eBPF RINGBUF map oversized allocation"
},
{
"acknowledgments": [
{
"names": [
"HaoXiong, LinMa"
],
"organization": "ckSec"
}
],
"cve": "CVE-2021-3564",
"cwe": {
"id": "CWE-415",
"name": "Double Free"
},
"discovery_date": "2021-05-19T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1964139"
}
],
"notes": [
{
"category": "description",
"text": "A flaw double-free memory corruption in the Linux kernel HCI device initialization subsystem was found in the way user attach malicious HCI TTY Bluetooth device. A local user could use this flaw to crash the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: double free in bluetooth subsystem when the HCI device initialization fails",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The impact is Moderate, because the double free happens during flush procedure, and no use of incorrect data during flush finishing even if double free could happen without kernel crash.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-3564"
},
{
"category": "external",
"summary": "RHBZ#1964139",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1964139"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-3564",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3564"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3564",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3564"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2021/05/25/1",
"url": "https://www.openwall.com/lists/oss-security/2021/05/25/1"
}
],
"release_date": "2021-05-25T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T17:26:23+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4140"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: double free in bluetooth subsystem when the HCI device initialization fails"
},
{
"cve": "CVE-2021-3573",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2021-05-31T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1966578"
}
],
"notes": [
{
"category": "description",
"text": "A flaw use-after-free in function hci_sock_bound_ioctl() of the Linux kernel HCI subsystem was found in the way user calls ioct HCIUNBLOCKADDR or other way triggers race condition of the call hci_unregister_dev() together with one of the calls hci_sock_blacklist_add(), hci_sock_blacklist_del(), hci_get_conn_info(), hci_get_auth_info(). A privileged local user could use this flaw to crash the system or escalate their privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: use-after-free in function hci_sock_bound_ioctl()",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue is rated as having a Moderate impact because of the privileges (CAP_NET_ADMIN in initial namespace) required for exploiting the issue.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-3573"
},
{
"category": "external",
"summary": "RHBZ#1966578",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1966578"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-3573",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3573"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3573",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3573"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/bluetooth/bluetooth.git/commit/?id=e305509e678b3a4af2b3cfd410f409f7cdaabb52",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/bluetooth/bluetooth.git/commit/?id=e305509e678b3a4af2b3cfd410f409f7cdaabb52"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2021/06/08/2",
"url": "https://www.openwall.com/lists/oss-security/2021/06/08/2"
}
],
"release_date": "2021-06-08T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T17:26:23+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4140"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising easThe required privileges is CAP_NET_ADMIN capabilities. This would require a privileged user with CAP_SYS_ADMIN or root to be able to abuse this flaw reducing its attack space.e of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: use-after-free in function hci_sock_bound_ioctl()"
},
{
"cve": "CVE-2021-3600",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2021-06-23T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1981954"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel\u2019s eBPF verification code, where the eBPF 32-bit div/mod source register truncation could lead to out-of-bounds reads and writes. By default, accessing the eBPF verifier is only possible to privileged users with CAP_SYS_ADMIN. This flaw allows a local user who can run eBPF instructions to crash the system or possibly escalate their privileges on the system. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: eBPF 32-bit source register truncation on div/mod",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-3600"
},
{
"category": "external",
"summary": "RHBZ#1981954",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1981954"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-3600",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3600"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3600",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3600"
},
{
"category": "external",
"summary": "https://lore.kernel.org/patchwork/patch/1379497/",
"url": "https://lore.kernel.org/patchwork/patch/1379497/"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2021/06/23/1",
"url": "https://www.openwall.com/lists/oss-security/2021/06/23/1"
}
],
"release_date": "2021-06-23T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T17:26:23+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4140"
},
{
"category": "workaround",
"details": "The default Red Hat Enterprise Linux kernel prevents unprivileged users from being able to use eBPF by the kernel.unprivileged_bpf_disabled sysctl. This would require a privileged user with CAP_SYS_ADMIN or root to be able to abuse this flaw reducing its attack space.\n\nFor the Red Hat Enterprise Linux 7 the eBPF for unprivileged users is always disabled.\nFor the Red Hat Enterprise Linux 8 to confirm the current state, inspect the sysctl with the command:\n\n# cat /proc/sys/kernel/unprivileged_bpf_disabled\n\nThe setting of 1 would mean that unprivileged users can not use eBPF, mitigating the flaw.\n\nA kernel update will be required to mitigate the flaw for the root or users with CAP_SYS_ADMIN capabilities.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: eBPF 32-bit source register truncation on div/mod"
},
{
"cve": "CVE-2021-3635",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"discovery_date": "2021-06-22T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1976946"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel netfilter implementation. A user with root (CAP_SYS_ADMIN) access is able to panic the system when issuing netfilter netflow commands",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: flowtable list del corruption with kernel BUG at lib/list_debug.c:50",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-3635"
},
{
"category": "external",
"summary": "RHBZ#1976946",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1976946"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-3635",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3635"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3635",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3635"
}
],
"release_date": "2021-08-06T04:47:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T17:26:23+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4140"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options does not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 4.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: flowtable list del corruption with kernel BUG at lib/list_debug.c:50"
},
{
"cve": "CVE-2021-3659",
"cwe": {
"id": "CWE-252",
"name": "Unchecked Return Value"
},
"discovery_date": "2021-05-14T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1975949"
}
],
"notes": [
{
"category": "description",
"text": "A NULL pointer dereference flaw was found in the Linux kernel\u2019s IEEE 802.15.4 wireless networking subsystem in the way the user closes the LR-WPAN connection. This flaw allows a local user to crash the system. The highest threat from this vulnerability is to system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: NULL pointer dereference in llsec_key_alloc() in net/mac802154/llsec.c",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-3659"
},
{
"category": "external",
"summary": "RHBZ#1975949",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1975949"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-3659",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3659"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3659",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3659"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=1165affd484889d4986cf3b724318935a0b120d8",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=1165affd484889d4986cf3b724318935a0b120d8"
}
],
"release_date": "2021-04-06T19:22:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T17:26:23+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4140"
},
{
"category": "workaround",
"details": "To mitigate this issue, prevent the module mac802154 from being loaded. Please see https://access.redhat.com/solutions/41278 for information on how to blacklist a kernel module to prevent it from loading automatically.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: NULL pointer dereference in llsec_key_alloc() in net/mac802154/llsec.c"
},
{
"acknowledgments": [
{
"names": [
"Haoran Luo"
],
"organization": "Chaitin Tech"
}
],
"cve": "CVE-2021-3679",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2021-07-25T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1989165"
}
],
"notes": [
{
"category": "description",
"text": "A lack of CPU resources in the Linux kernel tracing module functionality was found in the way users use the trace ring buffer in specific way. Only privileged local users (with CAP_SYS_ADMIN capability) could use this flaw to starve the resources causing denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: DoS in rb_per_cpu_empty()",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-3679"
},
{
"category": "external",
"summary": "RHBZ#1989165",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1989165"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-3679",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3679"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3679",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3679"
},
{
"category": "external",
"summary": "https://lore.kernel.org/lkml/20210723125527.767d1c18@oasis.local.home/",
"url": "https://lore.kernel.org/lkml/20210723125527.767d1c18@oasis.local.home/"
}
],
"release_date": "2021-07-20T09:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T17:26:23+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4140"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: DoS in rb_per_cpu_empty()"
},
{
"acknowledgments": [
{
"names": [
"Miklos Szeredi"
],
"organization": "Red Hat",
"summary": "This issue was discovered by Red Hat."
}
],
"cve": "CVE-2021-3732",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2021-08-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1995249"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel\u2019s OverlayFS subsystem in the way the user mounts the TmpFS filesystem with OverlayFS. This flaw allows a local user to gain access to hidden files that should not be accessible.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: overlayfs: Mounting overlayfs inside an unprivileged user namespace can reveal files",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-3732"
},
{
"category": "external",
"summary": "RHBZ#1995249",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1995249"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-3732",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3732"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3732",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3732"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=427215d85e8d",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=427215d85e8d"
}
],
"release_date": "2021-08-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T17:26:23+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4140"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 3.3,
"baseSeverity": "LOW",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: overlayfs: Mounting overlayfs inside an unprivileged user namespace can reveal files"
},
{
"acknowledgments": [
{
"names": [
"Loris Reiff"
]
}
],
"cve": "CVE-2021-20194",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2020-12-30T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1912683"
}
],
"notes": [
{
"category": "description",
"text": "A flaw buffer overflow in the Linux kernel BPF subsystem was found in the way user running BPF script calling getsockopt. A local user could use this flaw to crash the system or possibly escalate their privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: heap overflow in __cgroup_bpf_run_filter_getsockopt()",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw is rated as having Moderate impact because of the need to have elevated privileges or non-standard configuration for running BPF script.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-20194"
},
{
"category": "external",
"summary": "RHBZ#1912683",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1912683"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-20194",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20194"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-20194",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-20194"
}
],
"release_date": "2021-01-22T10:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T17:26:23+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4140"
},
{
"category": "workaround",
"details": "The default Red Hat Enterprise Linux kernel prevents unprivileged users from being able to use eBPF by the kernel.unprivileged_bpf_disabled sysctl. This would require a privileged user with CAP_SYS_ADMIN or root to be able to abuse this flaw reducing its attack space.\n\nFor the Red Hat Enterprise Linux 7 the eBPF for unprivileged users is always disabled.\n\nFor the Red Hat Enterprise Linux 8 to confirm the current state, inspect the sysctl with the command:\n\n# cat /proc/sys/kernel/unprivileged_bpf_disabled\n\nThe setting of 1 would mean that unprivileged users can not use eBPF.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: heap overflow in __cgroup_bpf_run_filter_getsockopt()"
},
{
"cve": "CVE-2021-20239",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2021-02-01T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1923636"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the BPF protocol. This flaw allows an attacker with a local account to leak information about kernel internal addresses. The highest threat from this vulnerability is to confidentiality.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: setsockopt System Call Untrusted Pointer Dereference Information Disclosure",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-20239"
},
{
"category": "external",
"summary": "RHBZ#1923636",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1923636"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-20239",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20239"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-20239",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-20239"
}
],
"release_date": "2021-02-01T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T17:26:23+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4140"
},
{
"category": "workaround",
"details": "Loading a filter is a privileged (CAP_SYS_ADMIN or root) operation. Once any filter is used, this attack is capable of being used by an unprivileged user. There is no known mitigation that product security finds suitable for this flaw.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 3.8,
"baseSeverity": "LOW",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: setsockopt System Call Untrusted Pointer Dereference Information Disclosure"
},
{
"acknowledgments": [
{
"names": [
"Or Cohen"
],
"organization": "Palo Alto Networks"
}
],
"cve": "CVE-2021-23133",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2021-04-09T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1948772"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free flaw was found in the Linux kernel\u0027s SCTP socket functionality that triggers a race condition. This flaw allows a local user to escalate their privileges on the system. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Race condition in sctp_destroy_sock list_del",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue is rated as having a Moderate impact because of the privileges required for running the known reproducer. The required privileges are CAP_BPF and CAP_NET_ADMIN capabilities that are disabled by default in Red Hat Enterprise Linux 7. For Red Hat Enterprise Linux 8, the SCTP protocol itself is disabled by default and cannot be used by a user without enablement by an administrator.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-23133"
},
{
"category": "external",
"summary": "RHBZ#1948772",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1948772"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-23133",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23133"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-23133",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-23133"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=b166a20b07382b8bc1dcee2a448715c9c2c81b5b",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=b166a20b07382b8bc1dcee2a448715c9c2c81b5b"
}
],
"release_date": "2021-04-18T09:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T17:26:23+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4140"
},
{
"category": "workaround",
"details": "To mitigate this issue, prevent the module sctp from being loaded (and this is so by default for Red Hat Enterprise Linux 8). Please see https://access.redhat.com/solutions/41278 for information on how to blacklist a kernel module to prevent it from loading automatically.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: Race condition in sctp_destroy_sock list_del"
},
{
"cve": "CVE-2021-28950",
"cwe": {
"id": "CWE-835",
"name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)"
},
"discovery_date": "2021-03-22T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1941762"
}
],
"notes": [
{
"category": "description",
"text": "A denial of service in the kernel side of the FUSE functionality can allow a local system to create a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: fuse: stall on CPU can occur because a retry loop continually finds the same bad inode",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-28950"
},
{
"category": "external",
"summary": "RHBZ#1941762",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1941762"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-28950",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-28950"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-28950",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-28950"
}
],
"release_date": "2021-03-04T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T17:26:23+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4140"
},
{
"category": "workaround",
"details": "As the FUSE module will be auto-loaded when required, its use can be disabled by preventing the module from loading with the following instructions:\n\n# echo \"install fuse /bin/true\" \u003e\u003e /etc/modprobe.d/disable-fuse.conf\n\nThe system will need to be restarted if the FUSE modules are loaded. In most circumstances, the CIFS kernel modules will be unable to be unloaded while the FUSE filesystems are in use.\n\nIf the system requires this module to work correctly, this mitigation may not be suitable.\n\nIf you need further assistance, see KCS article https://access.redhat.com/solutions/41278 or contact Red Hat Global Support Services.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: fuse: stall on CPU can occur because a retry loop continually finds the same bad inode"
},
{
"cve": "CVE-2021-28971",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"discovery_date": "2021-03-22T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1941784"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel. On some Haswell CPUs, userspace applications (such as perf-fuzzer) can cause a system crash because the PEBS status in a PEBS record is mishandled.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: System crash in intel_pmu_drain_pebs_nhm in arch/x86/events/intel/ds.c",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-28971"
},
{
"category": "external",
"summary": "RHBZ#1941784",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1941784"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-28971",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-28971"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-28971",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-28971"
}
],
"release_date": "2021-03-22T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T17:26:23+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4140"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options does not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: System crash in intel_pmu_drain_pebs_nhm in arch/x86/events/intel/ds.c"
},
{
"cve": "CVE-2021-29155",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"discovery_date": "2021-04-18T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1951595"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was discovered in retrieve_ptr_limit in kernel/bpf/verifier.c in the Linux kernel mechanism to mitigate speculatively out-of-bounds loads (Spectre mitigation). In this flaw a local, special user privileged (CAP_SYS_ADMIN) BPF program running on affected systems may bypass the protection, and execute speculatively out-of-bounds loads from the kernel memory. This can be abused to extract contents of kernel memory via side-channel.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: protection for sequences of pointer arithmetic operations against speculatively out-of-bounds loads can be bypassed to leak content of kernel memory",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-29155"
},
{
"category": "external",
"summary": "RHBZ#1951595",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1951595"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-29155",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29155"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-29155",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-29155"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2021/04/18/4",
"url": "https://www.openwall.com/lists/oss-security/2021/04/18/4"
}
],
"release_date": "2021-04-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T17:26:23+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4140"
},
{
"category": "workaround",
"details": "The default Red Hat Enterprise Linux kernel prevents unprivileged users from being able to use eBPF by the kernel.unprivileged_bpf_disabled sysctl. This would require a privileged user with CAP_SYS_ADMIN or root to be able to abuse this flaw reducing its attack space.\n\nFor the Red Hat Enterprise Linux 7 the eBPF for unprivileged users is always disabled.\nFor the Red Hat Enterprise Linux 8 to confirm the current state, inspect the sysctl with the command:\n\n# cat /proc/sys/kernel/unprivileged_bpf_disabled\n\nThe setting of 1 would mean that unprivileged users can not use eBPF, mitigating the flaw.\n\nA kernel update will be required to mitigate the flaw for the root or users with CAP_SYS_ADMIN capabilities.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: protection for sequences of pointer arithmetic operations against speculatively out-of-bounds loads can be bypassed to leak content of kernel memory"
},
{
"cve": "CVE-2021-29646",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2021-03-30T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1945345"
}
],
"notes": [
{
"category": "description",
"text": "A flaw buffer overflow in the Linux kernel TIPC protocol functionality was found in the way user uses protocol with encryption enabled. A local user could use this flaw to crash the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: improper input validation in tipc_nl_retrieve_key function in net/tipc/node.c",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-29646"
},
{
"category": "external",
"summary": "RHBZ#1945345",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1945345"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-29646",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29646"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-29646",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-29646"
}
],
"release_date": "2021-03-15T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T17:26:23+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4140"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: improper input validation in tipc_nl_retrieve_key function in net/tipc/node.c"
},
{
"cve": "CVE-2021-29650",
"cwe": {
"id": "CWE-662",
"name": "Improper Synchronization"
},
"discovery_date": "2021-03-30T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1945388"
}
],
"notes": [
{
"category": "description",
"text": "A denial-of-service (DoS) flaw was identified in the Linux kernel due to an incorrect memory barrier in xt_replace_table in net/netfilter/x_tables.c in the netfilter subsystem.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: lack a full memory barrier upon the assignment of a new table value in net/netfilter/x_tables.c and include/linux/netfilter/x_tables.h may lead to DoS",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-29650"
},
{
"category": "external",
"summary": "RHBZ#1945388",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1945388"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-29650",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29650"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-29650",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-29650"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=175e476b8cdf2a4de7432583b49c871345e4f8a1",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=175e476b8cdf2a4de7432583b49c871345e4f8a1"
}
],
"release_date": "2021-03-15T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T17:26:23+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4140"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: lack a full memory barrier upon the assignment of a new table value in net/netfilter/x_tables.c and include/linux/netfilter/x_tables.h may lead to DoS"
},
{
"acknowledgments": [
{
"names": [
"Manfred Paul"
],
"organization": "RedRocket CTF team"
}
],
"cve": "CVE-2021-31440",
"cwe": {
"id": "CWE-682",
"name": "Incorrect Calculation"
},
"discovery_date": "2021-05-21T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1964028"
}
],
"notes": [
{
"category": "description",
"text": "An out-of-bounds access flaw was found in the Linux kernel\u2019s implementation of the eBPF code verifier, where an incorrect register bounds calculation while checking unsigned 32-bit instructions in an eBPF program occurs.. By default accessing the eBPF verifier is only accessible to privileged users with CAP_SYS_ADMIN. The issue results from the lack of proper validation of user-supplied eBPF programs prior to executing them. A local user could use this flaw to crash the system or possibly escalate their privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: local escalation of privileges in handling of eBPF programs",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-31440"
},
{
"category": "external",
"summary": "RHBZ#1964028",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1964028"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-31440",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-31440"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-31440",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-31440"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=10bf4e83167cc68595b85fd73bb91e8f2c086e36",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=10bf4e83167cc68595b85fd73bb91e8f2c086e36"
},
{
"category": "external",
"summary": "https://www.zerodayinitiative.com/blog/2021/5/26/cve-2021-31440-an-incorrect-bounds-calculation-in-the-linux-kernel-ebpf-verifier",
"url": "https://www.zerodayinitiative.com/blog/2021/5/26/cve-2021-31440-an-incorrect-bounds-calculation-in-the-linux-kernel-ebpf-verifier"
}
],
"release_date": "2021-05-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T17:26:23+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4140"
},
{
"category": "workaround",
"details": "The default Red Hat Enterprise Linux kernel prevents unprivileged users from being able to use eBPF by the kernel.unprivileged_bpf_disabled sysctl. This would require a privileged user with CAP_SYS_ADMIN or root to be able to abuse this flaw reducing its attack space.\n\nFor the Red Hat Enterprise Linux 7 the eBPF for unprivileged users is always disabled.\nFor the Red Hat Enterprise Linux 8 to confirm the current state, inspect the sysctl with the command:\n\n# cat /proc/sys/kernel/unprivileged_bpf_disabled\n\nThe setting of 1 would mean that unprivileged users can not use eBPF, mitigating the flaw.\n\nA kernel update will be required to mitigate the flaw for the root or users with CAP_SYS_ADMIN capabilities.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: local escalation of privileges in handling of eBPF programs"
},
{
"cve": "CVE-2021-31829",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2021-05-04T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1957788"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel\u0027s eBPF verification code. By default, accessing the eBPF verifier is only accessible to privileged users with CAP_SYS_ADMIN. This flaw allows a local user who can insert eBPF instructions, to use the eBPF verifier to abuse a spectre-like flaw and infer all system memory. The highest threat from this vulnerability is to confidentiality.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: protection of stack pointer against speculative pointer arithmetic can be bypassed to leak content of kernel memory",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-31829"
},
{
"category": "external",
"summary": "RHBZ#1957788",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1957788"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-31829",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-31829"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-31829",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-31829"
}
],
"release_date": "2021-04-30T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T17:26:23+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4140"
},
{
"category": "workaround",
"details": "The default Red Hat Enterprise Linux kernel prevents unprivileged users from being able to use eBPF by the kernel.unprivileged_bpf_disabled sysctl. This would require a privileged user with CAP_SYS_ADMIN or root to be able to abuse this flaw reducing its attack space.\n\nFor the Red Hat Enterprise Linux 7 and 8 kernel to confirm the current state, inspect the sysctl with the command:\n\n# cat /proc/sys/kernel/unprivileged_bpf_disabled\n\nThe setting of 1 would mean that unprivileged users can not use eBPF, mitigating the flaw.\n\nA kernel update will be required to mitigate the flaw for the root or users with CAP_SYS_ADMIN capabilities.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: protection of stack pointer against speculative pointer arithmetic can be bypassed to leak content of kernel memory"
},
{
"cve": "CVE-2021-31916",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2021-03-29T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1946965"
}
],
"notes": [
{
"category": "description",
"text": "An out-of-bounds (OOB) memory write flaw was found in list_devices in drivers/md/dm-ioctl.c in the Multi-device driver module in the Linux kernel. A bound check failure allows an attacker with special user (CAP_SYS_ADMIN) privilege to gain access to out-of-bounds memory leading to a system crash, a leak of internal kernel information, or a privilege escalation problem.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: out of bounds array access in drivers/md/dm-ioctl.c",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw is rated a Low impact because in the default configuration, the issue can only be triggered by a privileged local user.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-31916"
},
{
"category": "external",
"summary": "RHBZ#1946965",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1946965"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-31916",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-31916"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-31916",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-31916"
},
{
"category": "external",
"summary": "https://github.com/torvalds/linux/commit/4edbe1d7bcffcd6269f3b5eb63f710393ff2ec7a",
"url": "https://github.com/torvalds/linux/commit/4edbe1d7bcffcd6269f3b5eb63f710393ff2ec7a"
},
{
"category": "external",
"summary": "https://seclists.org/oss-sec/2021/q1/268",
"url": "https://seclists.org/oss-sec/2021/q1/268"
}
],
"release_date": "2021-03-29T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T17:26:23+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4140"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: out of bounds array access in drivers/md/dm-ioctl.c"
},
{
"cve": "CVE-2021-33033",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2021-05-14T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1961300"
}
],
"notes": [
{
"category": "description",
"text": "A flaw use-after-free in the Linux kernel CIPSO network packet labeling protocol functionality was found in the way user open local network connection with the usage of the security labeling that is IP option number 134. A local user could use this flaw to crash the system or possibly escalate their privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: use-after-free in cipso_v4_genopt in net/ipv4/cipso_ipv4.c",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Considered to be Moderate rate, because by default CIPSO non-enabled and both no known way to reproduce the attack remotely and both it looks complex if even possible to use the attack in any way apart from crashing the system. For the usage of the inbound CIPSO connections, the administrator have to enable it with netlabelctl utility first. The vulnerability is considered to be for local user, because it can happen only when a local user opens a socket for sending packets, but not during receiving packets.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-33033"
},
{
"category": "external",
"summary": "RHBZ#1961300",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1961300"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-33033",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33033"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-33033",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33033"
}
],
"release_date": "2021-03-04T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T17:26:23+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4140"
},
{
"category": "workaround",
"details": "The mitigation would be not allowing CIPSO labeling for the inbound network connections. For the most of the default configurations both for network routers and for the Linux servers itself it is disabled by default.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: use-after-free in cipso_v4_genopt in net/ipv4/cipso_ipv4.c"
},
{
"cve": "CVE-2021-33200",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2021-05-27T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1965458"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in kernel/bpf/verifier.c in BPF in the Linux kernel. An incorrect limit is enforced for pointer arithmetic operations which can be abused to perform out-of-bounds reads and writes in kernel memory, leading to local privilege escalation. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: out-of-bounds reads and writes due to enforcing incorrect limits for pointer arithmetic operations by BPF verifier",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-33200"
},
{
"category": "external",
"summary": "RHBZ#1965458",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965458"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-33200",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33200"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-33200",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33200"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf.git/patch/?id=3d0220f6861d713213b015b582e9f21e5b28d2e0",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf.git/patch/?id=3d0220f6861d713213b015b582e9f21e5b28d2e0"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf.git/patch/?id=a7036191277f9fa68d92f2071ddc38c09b1e5ee5",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf.git/patch/?id=a7036191277f9fa68d92f2071ddc38c09b1e5ee5"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf.git/patch/?id=bb01a1bba579b4b1c5566af24d95f1767859771e",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf.git/patch/?id=bb01a1bba579b4b1c5566af24d95f1767859771e"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2021/05/27/1",
"url": "https://www.openwall.com/lists/oss-security/2021/05/27/1"
}
],
"release_date": "2021-05-26T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T17:26:23+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4140"
},
{
"category": "workaround",
"details": "The default Red Hat Enterprise Linux kernel prevents unprivileged users from being able to use eBPF by the kernel.unprivileged_bpf_disabled sysctl. This would require a privileged user with CAP_SYS_ADMIN or root to be able to abuse this flaw reducing its attack space.\n\nFor the Red Hat Enterprise Linux 7 the eBPF for unprivileged users is always disabled.\nFor the Red Hat Enterprise Linux 8 to confirm the current state, inspect the sysctl with the command:\n\n# cat /proc/sys/kernel/unprivileged_bpf_disabled\n\nThe setting of 1 would mean that unprivileged users can not use eBPF, mitigating the flaw.\n\nA kernel update will be required to mitigate the flaw for the root or users with CAP_SYS_ADMIN capabilities.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: out-of-bounds reads and writes due to enforcing incorrect limits for pointer arithmetic operations by BPF verifier"
},
{
"cve": "CVE-2021-46905",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"discovery_date": "2024-02-27T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2266253"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in the Linux kernel. This flaw occurs due to an unconditional NULL-pointer dereference on every disconnect in the Linux kernel.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: NULL-deref on disconnect regression",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-46905"
},
{
"category": "external",
"summary": "RHBZ#2266253",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2266253"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-46905",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46905"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-46905",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-46905"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024022557-CVE-2021-46905-6507@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024022557-CVE-2021-46905-6507@gregkh/T"
}
],
"release_date": "2024-02-26T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T17:26:23+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4140"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: NULL-deref on disconnect regression"
},
{
"cve": "CVE-2022-20166",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2022-08-29T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2122089"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel\u2019s sysfs layer. This flaw allows a local user who can read files under the /sysfs mount point to corrupt memory or possibly crash the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: possible buffer overflow in sysfs reading",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-20166"
},
{
"category": "external",
"summary": "RHBZ#2122089",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2122089"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-20166",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-20166"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-20166",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-20166"
}
],
"release_date": "2022-08-15T14:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T17:26:23+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4140"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options does not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: possible buffer overflow in sysfs reading"
}
]
}
rhsa-2021_4356
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n* kernel: out-of-bounds reads in pinctrl subsystem (CVE-2020-0427)\n* kernel: Improper input validation in some Intel(R) Ethernet E810 Adapter drivers (CVE-2020-24502)\n* kernel: Insufficient access control in some Intel(R) Ethernet E810 Adapter drivers (CVE-2020-24503)\n* kernel: Uncontrolled resource consumption in some Intel(R) Ethernet E810 Adapter drivers (CVE-2020-24504)\n* kernel: Fragmentation cache not cleared on reconnection (CVE-2020-24586)\n* kernel: Reassembling fragments encrypted under different keys (CVE-2020-24587)\n* kernel: wifi frame payload being parsed incorrectly as an L2 frame (CVE-2020-24588)\n* kernel: Forwarding EAPOL from unauthenticated wifi client (CVE-2020-26139)\n* kernel: accepting plaintext data frames in protected networks (CVE-2020-26140)\n* kernel: not verifying TKIP MIC of fragmented frames (CVE-2020-26141)\n* kernel: accepting fragmented plaintext frames in protected networks (CVE-2020-26143)\n* kernel: accepting unencrypted A-MSDU frames that start with RFC1042 header (CVE-2020-26144)\n* kernel: accepting plaintext broadcast fragments as full frames (CVE-2020-26145)\n* kernel: powerpc: RTAS calls can be used to compromise kernel integrity (CVE-2020-27777)\n* kernel: locking inconsistency in tty_io.c and tty_jobctrl.c can lead to a read-after-free (CVE-2020-29660)\n* kernel: buffer overflow in mwifiex_cmd_802_11_ad_hoc_start function via a long SSID value (CVE-2020-36158)\n* kernel: slab out-of-bounds read in hci_extended_inquiry_result_evt() (CVE-2020-36386)\n* kernel: Improper access control in BlueZ may allow information disclosure vulnerability. (CVE-2021-0129)\n* kernel: Use-after-free in ndb_queue_rq() in drivers/block/nbd.c (CVE-2021-3348)\n* kernel: Linux kernel eBPF RINGBUF map oversized allocation (CVE-2021-3489)\n* kernel: double free in bluetooth subsystem when the HCI device initialization fails (CVE-2021-3564)\n* kernel: use-after-free in function hci_sock_bound_ioctl() (CVE-2021-3573)\n* kernel: eBPF 32-bit source register truncation on div/mod (CVE-2021-3600)\n* kernel: DoS in rb_per_cpu_empty() (CVE-2021-3679)\n* kernel: Mounting overlayfs inside an unprivileged user namespace can reveal files (CVE-2021-3732)\n* kernel: heap overflow in __cgroup_bpf_run_filter_getsockopt() (CVE-2021-20194)\n* kernel: Race condition in sctp_destroy_sock list_del (CVE-2021-23133)\n* kernel: fuse: stall on CPU can occur because a retry loop continually finds the same bad inode (CVE-2021-28950)\n* kernel: System crash in intel_pmu_drain_pebs_nhm in arch/x86/events/intel/ds.c (CVE-2021-28971)\n* kernel: protection can be bypassed to leak content of kernel memory (CVE-2021-29155)\n* kernel: improper input validation in tipc_nl_retrieve_key function in net/tipc/node.c (CVE-2021-29646)\n* kernel: lack a full memory barrier may lead to DoS (CVE-2021-29650)\n* kernel: local escalation of privileges in handling of eBPF programs (CVE-2021-31440)\n* kernel: protection of stack pointer against speculative pointer arithmetic can be bypassed to leak content of kernel memory (CVE-2021-31829)\n* kernel: out-of-bounds reads and writes due to enforcing incorrect limits for pointer arithmetic operations by BPF verifier (CVE-2021-33200)\n* kernel: reassembling encrypted fragments with non-consecutive packet numbers (CVE-2020-26146)\n* kernel: reassembling mixed encrypted/plaintext fragments (CVE-2020-26147)\n* kernel: the copy-on-write implementation can grant unintended write access because of a race condition in a THP mapcount check (CVE-2020-29368)\n* kernel: flowtable list del corruption with kernel BUG at lib/list_debug.c:50 (CVE-2021-3635)\n* kernel: NULL pointer dereference in llsec_key_alloc() in net/mac802154/llsec.c (CVE-2021-3659)\n* kernel: setsockopt System Call Untrusted Pointer Dereference Information Disclosure (CVE-2021-20239)\n* kernel: out of bounds array access in drivers/md/dm-ioctl.c (CVE-2021-31916)",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2021:4356",
"url": "https://access.redhat.com/errata/RHSA-2021:4356"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.5_release_notes/",
"url": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.5_release_notes/"
},
{
"category": "external",
"summary": "1509204",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1509204"
},
{
"category": "external",
"summary": "1793880",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1793880"
},
{
"category": "external",
"summary": "1816493",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1816493"
},
{
"category": "external",
"summary": "1894101",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1894101"
},
{
"category": "external",
"summary": "1900844",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1900844"
},
{
"category": "external",
"summary": "1903244",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1903244"
},
{
"category": "external",
"summary": "1906522",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1906522"
},
{
"category": "external",
"summary": "1912683",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1912683"
},
{
"category": "external",
"summary": "1913348",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1913348"
},
{
"category": "external",
"summary": "1915825",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1915825"
},
{
"category": "external",
"summary": "1919893",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1919893"
},
{
"category": "external",
"summary": "1921958",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1921958"
},
{
"category": "external",
"summary": "1923636",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1923636"
},
{
"category": "external",
"summary": "1930376",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1930376"
},
{
"category": "external",
"summary": "1930379",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1930379"
},
{
"category": "external",
"summary": "1930381",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1930381"
},
{
"category": "external",
"summary": "1933527",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1933527"
},
{
"category": "external",
"summary": "1939341",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1939341"
},
{
"category": "external",
"summary": "1941762",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1941762"
},
{
"category": "external",
"summary": "1941784",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1941784"
},
{
"category": "external",
"summary": "1945345",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1945345"
},
{
"category": "external",
"summary": "1945388",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1945388"
},
{
"category": "external",
"summary": "1946965",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1946965"
},
{
"category": "external",
"summary": "1948772",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1948772"
},
{
"category": "external",
"summary": "1951595",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1951595"
},
{
"category": "external",
"summary": "1953847",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1953847"
},
{
"category": "external",
"summary": "1954588",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1954588"
},
{
"category": "external",
"summary": "1957788",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1957788"
},
{
"category": "external",
"summary": "1959559",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1959559"
},
{
"category": "external",
"summary": "1959642",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1959642"
},
{
"category": "external",
"summary": "1959654",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1959654"
},
{
"category": "external",
"summary": "1959657",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1959657"
},
{
"category": "external",
"summary": "1959663",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1959663"
},
{
"category": "external",
"summary": "1960490",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1960490"
},
{
"category": "external",
"summary": "1960492",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1960492"
},
{
"category": "external",
"summary": "1960496",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1960496"
},
{
"category": "external",
"summary": "1960498",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1960498"
},
{
"category": "external",
"summary": "1960500",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1960500"
},
{
"category": "external",
"summary": "1960502",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1960502"
},
{
"category": "external",
"summary": "1960504",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1960504"
},
{
"category": "external",
"summary": "1960708",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1960708"
},
{
"category": "external",
"summary": "1964028",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1964028"
},
{
"category": "external",
"summary": "1964139",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1964139"
},
{
"category": "external",
"summary": "1965038",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965038"
},
{
"category": "external",
"summary": "1965360",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965360"
},
{
"category": "external",
"summary": "1965458",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965458"
},
{
"category": "external",
"summary": "1966578",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1966578"
},
{
"category": "external",
"summary": "1969489",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1969489"
},
{
"category": "external",
"summary": "1971101",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1971101"
},
{
"category": "external",
"summary": "1972278",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1972278"
},
{
"category": "external",
"summary": "1974627",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1974627"
},
{
"category": "external",
"summary": "1975182",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1975182"
},
{
"category": "external",
"summary": "1975949",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1975949"
},
{
"category": "external",
"summary": "1976679",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1976679"
},
{
"category": "external",
"summary": "1976699",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1976699"
},
{
"category": "external",
"summary": "1976946",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1976946"
},
{
"category": "external",
"summary": "1976969",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1976969"
},
{
"category": "external",
"summary": "1977162",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1977162"
},
{
"category": "external",
"summary": "1977422",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1977422"
},
{
"category": "external",
"summary": "1977537",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1977537"
},
{
"category": "external",
"summary": "1977850",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1977850"
},
{
"category": "external",
"summary": "1978369",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1978369"
},
{
"category": "external",
"summary": "1979070",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1979070"
},
{
"category": "external",
"summary": "1979680",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1979680"
},
{
"category": "external",
"summary": "1981954",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1981954"
},
{
"category": "external",
"summary": "1986138",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986138"
},
{
"category": "external",
"summary": "1989165",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1989165"
},
{
"category": "external",
"summary": "1989999",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1989999"
},
{
"category": "external",
"summary": "1991976",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1991976"
},
{
"category": "external",
"summary": "1992700",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1992700"
},
{
"category": "external",
"summary": "1995249",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1995249"
},
{
"category": "external",
"summary": "1996854",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1996854"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_4356.json"
}
],
"title": "Red Hat Security Advisory: kernel security, bug fix, and enhancement update",
"tracking": {
"current_release_date": "2024-12-20T20:35:58+00:00",
"generator": {
"date": "2024-12-20T20:35:58+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.4"
}
},
"id": "RHSA-2021:4356",
"initial_release_date": "2021-11-09T18:06:54+00:00",
"revision_history": [
{
"date": "2021-11-09T18:06:54+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2021-11-09T18:06:54+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-12-20T20:35:58+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux BaseOS (v. 8)",
"product": {
"name": "Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:8::baseos"
}
}
},
{
"category": "product_name",
"name": "Red Hat CodeReady Linux Builder (v. 8)",
"product": {
"name": "Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:8::crb"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:4.18.0-348.el8.aarch64",
"product": {
"name": "bpftool-0:4.18.0-348.el8.aarch64",
"product_id": "bpftool-0:4.18.0-348.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@4.18.0-348.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.18.0-348.el8.aarch64",
"product": {
"name": "kernel-0:4.18.0-348.el8.aarch64",
"product_id": "kernel-0:4.18.0-348.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-348.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:4.18.0-348.el8.aarch64",
"product": {
"name": "kernel-core-0:4.18.0-348.el8.aarch64",
"product_id": "kernel-core-0:4.18.0-348.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@4.18.0-348.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"product": {
"name": "kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"product_id": "kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-348.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.18.0-348.el8.aarch64",
"product": {
"name": "kernel-debug-0:4.18.0-348.el8.aarch64",
"product_id": "kernel-debug-0:4.18.0-348.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.18.0-348.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:4.18.0-348.el8.aarch64",
"product": {
"name": "kernel-debug-core-0:4.18.0-348.el8.aarch64",
"product_id": "kernel-debug-core-0:4.18.0-348.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-348.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"product": {
"name": "kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"product_id": "kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-348.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"product": {
"name": "kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"product_id": "kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-348.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"product": {
"name": "kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"product_id": "kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-348.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.18.0-348.el8.aarch64",
"product": {
"name": "kernel-devel-0:4.18.0-348.el8.aarch64",
"product_id": "kernel-devel-0:4.18.0-348.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.18.0-348.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:4.18.0-348.el8.aarch64",
"product": {
"name": "kernel-headers-0:4.18.0-348.el8.aarch64",
"product_id": "kernel-headers-0:4.18.0-348.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@4.18.0-348.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:4.18.0-348.el8.aarch64",
"product": {
"name": "kernel-modules-0:4.18.0-348.el8.aarch64",
"product_id": "kernel-modules-0:4.18.0-348.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@4.18.0-348.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"product": {
"name": "kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"product_id": "kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-348.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:4.18.0-348.el8.aarch64",
"product": {
"name": "kernel-tools-0:4.18.0-348.el8.aarch64",
"product_id": "kernel-tools-0:4.18.0-348.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@4.18.0-348.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"product": {
"name": "kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"product_id": "kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-348.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.18.0-348.el8.aarch64",
"product": {
"name": "perf-0:4.18.0-348.el8.aarch64",
"product_id": "perf-0:4.18.0-348.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.18.0-348.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:4.18.0-348.el8.aarch64",
"product": {
"name": "python3-perf-0:4.18.0-348.el8.aarch64",
"product_id": "python3-perf-0:4.18.0-348.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@4.18.0-348.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"product": {
"name": "bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"product_id": "bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-348.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"product": {
"name": "kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"product_id": "kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-348.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"product": {
"name": "kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"product_id": "kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-348.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"product": {
"name": "kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"product_id": "kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-aarch64@4.18.0-348.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"product": {
"name": "kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"product_id": "kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-348.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.18.0-348.el8.aarch64",
"product": {
"name": "perf-debuginfo-0:4.18.0-348.el8.aarch64",
"product_id": "perf-debuginfo-0:4.18.0-348.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-348.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"product": {
"name": "python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"product_id": "python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-348.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"product": {
"name": "kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"product_id": "kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.18.0-348.el8?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:4.18.0-348.el8.ppc64le",
"product": {
"name": "bpftool-0:4.18.0-348.el8.ppc64le",
"product_id": "bpftool-0:4.18.0-348.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@4.18.0-348.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.18.0-348.el8.ppc64le",
"product": {
"name": "kernel-0:4.18.0-348.el8.ppc64le",
"product_id": "kernel-0:4.18.0-348.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-348.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:4.18.0-348.el8.ppc64le",
"product": {
"name": "kernel-core-0:4.18.0-348.el8.ppc64le",
"product_id": "kernel-core-0:4.18.0-348.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@4.18.0-348.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"product": {
"name": "kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"product_id": "kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-348.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.18.0-348.el8.ppc64le",
"product": {
"name": "kernel-debug-0:4.18.0-348.el8.ppc64le",
"product_id": "kernel-debug-0:4.18.0-348.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.18.0-348.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"product": {
"name": "kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"product_id": "kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-348.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"product": {
"name": "kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"product_id": "kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-348.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"product": {
"name": "kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"product_id": "kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-348.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"product": {
"name": "kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"product_id": "kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-348.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.18.0-348.el8.ppc64le",
"product": {
"name": "kernel-devel-0:4.18.0-348.el8.ppc64le",
"product_id": "kernel-devel-0:4.18.0-348.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.18.0-348.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:4.18.0-348.el8.ppc64le",
"product": {
"name": "kernel-headers-0:4.18.0-348.el8.ppc64le",
"product_id": "kernel-headers-0:4.18.0-348.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@4.18.0-348.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:4.18.0-348.el8.ppc64le",
"product": {
"name": "kernel-modules-0:4.18.0-348.el8.ppc64le",
"product_id": "kernel-modules-0:4.18.0-348.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@4.18.0-348.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"product": {
"name": "kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"product_id": "kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-348.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:4.18.0-348.el8.ppc64le",
"product": {
"name": "kernel-tools-0:4.18.0-348.el8.ppc64le",
"product_id": "kernel-tools-0:4.18.0-348.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@4.18.0-348.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"product": {
"name": "kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"product_id": "kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-348.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.18.0-348.el8.ppc64le",
"product": {
"name": "perf-0:4.18.0-348.el8.ppc64le",
"product_id": "perf-0:4.18.0-348.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.18.0-348.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:4.18.0-348.el8.ppc64le",
"product": {
"name": "python3-perf-0:4.18.0-348.el8.ppc64le",
"product_id": "python3-perf-0:4.18.0-348.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@4.18.0-348.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"product": {
"name": "bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"product_id": "bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-348.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"product": {
"name": "kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"product_id": "kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-348.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"product": {
"name": "kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"product_id": "kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-348.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"product": {
"name": "kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"product_id": "kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64le@4.18.0-348.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"product": {
"name": "kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"product_id": "kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-348.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"product": {
"name": "perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"product_id": "perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-348.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"product": {
"name": "python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"product_id": "python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-348.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"product": {
"name": "kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"product_id": "kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.18.0-348.el8?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:4.18.0-348.el8.x86_64",
"product": {
"name": "bpftool-0:4.18.0-348.el8.x86_64",
"product_id": "bpftool-0:4.18.0-348.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@4.18.0-348.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.18.0-348.el8.x86_64",
"product": {
"name": "kernel-0:4.18.0-348.el8.x86_64",
"product_id": "kernel-0:4.18.0-348.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-348.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:4.18.0-348.el8.x86_64",
"product": {
"name": "kernel-core-0:4.18.0-348.el8.x86_64",
"product_id": "kernel-core-0:4.18.0-348.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@4.18.0-348.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"product": {
"name": "kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"product_id": "kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-348.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.18.0-348.el8.x86_64",
"product": {
"name": "kernel-debug-0:4.18.0-348.el8.x86_64",
"product_id": "kernel-debug-0:4.18.0-348.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.18.0-348.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:4.18.0-348.el8.x86_64",
"product": {
"name": "kernel-debug-core-0:4.18.0-348.el8.x86_64",
"product_id": "kernel-debug-core-0:4.18.0-348.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-348.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"product": {
"name": "kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"product_id": "kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-348.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"product": {
"name": "kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"product_id": "kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-348.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"product": {
"name": "kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"product_id": "kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-348.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.18.0-348.el8.x86_64",
"product": {
"name": "kernel-devel-0:4.18.0-348.el8.x86_64",
"product_id": "kernel-devel-0:4.18.0-348.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.18.0-348.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:4.18.0-348.el8.x86_64",
"product": {
"name": "kernel-headers-0:4.18.0-348.el8.x86_64",
"product_id": "kernel-headers-0:4.18.0-348.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@4.18.0-348.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:4.18.0-348.el8.x86_64",
"product": {
"name": "kernel-modules-0:4.18.0-348.el8.x86_64",
"product_id": "kernel-modules-0:4.18.0-348.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@4.18.0-348.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"product": {
"name": "kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"product_id": "kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-348.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:4.18.0-348.el8.x86_64",
"product": {
"name": "kernel-tools-0:4.18.0-348.el8.x86_64",
"product_id": "kernel-tools-0:4.18.0-348.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@4.18.0-348.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"product": {
"name": "kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"product_id": "kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-348.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.18.0-348.el8.x86_64",
"product": {
"name": "perf-0:4.18.0-348.el8.x86_64",
"product_id": "perf-0:4.18.0-348.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.18.0-348.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:4.18.0-348.el8.x86_64",
"product": {
"name": "python3-perf-0:4.18.0-348.el8.x86_64",
"product_id": "python3-perf-0:4.18.0-348.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@4.18.0-348.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"product": {
"name": "bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"product_id": "bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-348.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"product": {
"name": "kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"product_id": "kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-348.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"product": {
"name": "kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"product_id": "kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-348.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"product": {
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"product_id": "kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@4.18.0-348.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"product": {
"name": "kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"product_id": "kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-348.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.18.0-348.el8.x86_64",
"product": {
"name": "perf-debuginfo-0:4.18.0-348.el8.x86_64",
"product_id": "perf-debuginfo-0:4.18.0-348.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-348.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"product": {
"name": "python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"product_id": "python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-348.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"product": {
"name": "kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"product_id": "kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.18.0-348.el8?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:4.18.0-348.el8.s390x",
"product": {
"name": "bpftool-0:4.18.0-348.el8.s390x",
"product_id": "bpftool-0:4.18.0-348.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@4.18.0-348.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.18.0-348.el8.s390x",
"product": {
"name": "kernel-0:4.18.0-348.el8.s390x",
"product_id": "kernel-0:4.18.0-348.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-348.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:4.18.0-348.el8.s390x",
"product": {
"name": "kernel-core-0:4.18.0-348.el8.s390x",
"product_id": "kernel-core-0:4.18.0-348.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@4.18.0-348.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:4.18.0-348.el8.s390x",
"product": {
"name": "kernel-cross-headers-0:4.18.0-348.el8.s390x",
"product_id": "kernel-cross-headers-0:4.18.0-348.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-348.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.18.0-348.el8.s390x",
"product": {
"name": "kernel-debug-0:4.18.0-348.el8.s390x",
"product_id": "kernel-debug-0:4.18.0-348.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.18.0-348.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:4.18.0-348.el8.s390x",
"product": {
"name": "kernel-debug-core-0:4.18.0-348.el8.s390x",
"product_id": "kernel-debug-core-0:4.18.0-348.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-348.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.18.0-348.el8.s390x",
"product": {
"name": "kernel-debug-devel-0:4.18.0-348.el8.s390x",
"product_id": "kernel-debug-devel-0:4.18.0-348.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-348.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:4.18.0-348.el8.s390x",
"product": {
"name": "kernel-debug-modules-0:4.18.0-348.el8.s390x",
"product_id": "kernel-debug-modules-0:4.18.0-348.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-348.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"product": {
"name": "kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"product_id": "kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-348.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.18.0-348.el8.s390x",
"product": {
"name": "kernel-devel-0:4.18.0-348.el8.s390x",
"product_id": "kernel-devel-0:4.18.0-348.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.18.0-348.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:4.18.0-348.el8.s390x",
"product": {
"name": "kernel-headers-0:4.18.0-348.el8.s390x",
"product_id": "kernel-headers-0:4.18.0-348.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@4.18.0-348.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:4.18.0-348.el8.s390x",
"product": {
"name": "kernel-modules-0:4.18.0-348.el8.s390x",
"product_id": "kernel-modules-0:4.18.0-348.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@4.18.0-348.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:4.18.0-348.el8.s390x",
"product": {
"name": "kernel-modules-extra-0:4.18.0-348.el8.s390x",
"product_id": "kernel-modules-extra-0:4.18.0-348.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-348.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:4.18.0-348.el8.s390x",
"product": {
"name": "kernel-tools-0:4.18.0-348.el8.s390x",
"product_id": "kernel-tools-0:4.18.0-348.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@4.18.0-348.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"product": {
"name": "kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"product_id": "kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump@4.18.0-348.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"product": {
"name": "kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"product_id": "kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-core@4.18.0-348.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"product": {
"name": "kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"product_id": "kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-devel@4.18.0-348.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"product": {
"name": "kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"product_id": "kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-modules@4.18.0-348.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"product": {
"name": "kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"product_id": "kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-modules-extra@4.18.0-348.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.18.0-348.el8.s390x",
"product": {
"name": "perf-0:4.18.0-348.el8.s390x",
"product_id": "perf-0:4.18.0-348.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.18.0-348.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:4.18.0-348.el8.s390x",
"product": {
"name": "python3-perf-0:4.18.0-348.el8.s390x",
"product_id": "python3-perf-0:4.18.0-348.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@4.18.0-348.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"product": {
"name": "bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"product_id": "bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-348.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"product": {
"name": "kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"product_id": "kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-348.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.18.0-348.el8.s390x",
"product": {
"name": "kernel-debuginfo-0:4.18.0-348.el8.s390x",
"product_id": "kernel-debuginfo-0:4.18.0-348.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-348.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"product": {
"name": "kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"product_id": "kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-s390x@4.18.0-348.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"product": {
"name": "kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"product_id": "kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-348.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"product": {
"name": "kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"product_id": "kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-debuginfo@4.18.0-348.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.18.0-348.el8.s390x",
"product": {
"name": "perf-debuginfo-0:4.18.0-348.el8.s390x",
"product_id": "perf-debuginfo-0:4.18.0-348.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-348.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"product": {
"name": "python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"product_id": "python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-348.el8?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:4.18.0-348.el8.src",
"product": {
"name": "kernel-0:4.18.0-348.el8.src",
"product_id": "kernel-0:4.18.0-348.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-348.el8?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"product": {
"name": "kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"product_id": "kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-abi-stablelists@4.18.0-348.el8?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "kernel-doc-0:4.18.0-348.el8.noarch",
"product": {
"name": "kernel-doc-0:4.18.0-348.el8.noarch",
"product_id": "kernel-doc-0:4.18.0-348.el8.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-doc@4.18.0-348.el8?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-348.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64"
},
"product_reference": "bpftool-0:4.18.0-348.el8.aarch64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-348.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le"
},
"product_reference": "bpftool-0:4.18.0-348.el8.ppc64le",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-348.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x"
},
"product_reference": "bpftool-0:4.18.0-348.el8.s390x",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-348.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64"
},
"product_reference": "bpftool-0:4.18.0-348.el8.x86_64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-348.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-348.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-348.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-348.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-348.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64"
},
"product_reference": "kernel-0:4.18.0-348.el8.aarch64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-348.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le"
},
"product_reference": "kernel-0:4.18.0-348.el8.ppc64le",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-348.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x"
},
"product_reference": "kernel-0:4.18.0-348.el8.s390x",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-348.el8.src as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src"
},
"product_reference": "kernel-0:4.18.0-348.el8.src",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-348.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64"
},
"product_reference": "kernel-0:4.18.0-348.el8.x86_64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-stablelists-0:4.18.0-348.el8.noarch as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch"
},
"product_reference": "kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-348.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64"
},
"product_reference": "kernel-core-0:4.18.0-348.el8.aarch64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-348.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le"
},
"product_reference": "kernel-core-0:4.18.0-348.el8.ppc64le",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-348.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x"
},
"product_reference": "kernel-core-0:4.18.0-348.el8.s390x",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-348.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64"
},
"product_reference": "kernel-core-0:4.18.0-348.el8.x86_64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-348.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64"
},
"product_reference": "kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-348.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le"
},
"product_reference": "kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-348.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x"
},
"product_reference": "kernel-cross-headers-0:4.18.0-348.el8.s390x",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-348.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64"
},
"product_reference": "kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-348.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64"
},
"product_reference": "kernel-debug-0:4.18.0-348.el8.aarch64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-348.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le"
},
"product_reference": "kernel-debug-0:4.18.0-348.el8.ppc64le",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-348.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x"
},
"product_reference": "kernel-debug-0:4.18.0-348.el8.s390x",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-348.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64"
},
"product_reference": "kernel-debug-0:4.18.0-348.el8.x86_64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-348.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64"
},
"product_reference": "kernel-debug-core-0:4.18.0-348.el8.aarch64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-348.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le"
},
"product_reference": "kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-348.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x"
},
"product_reference": "kernel-debug-core-0:4.18.0-348.el8.s390x",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-348.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64"
},
"product_reference": "kernel-debug-core-0:4.18.0-348.el8.x86_64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-348.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-348.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64"
},
"product_reference": "kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-348.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le"
},
"product_reference": "kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-348.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x"
},
"product_reference": "kernel-debug-devel-0:4.18.0-348.el8.s390x",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-348.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64"
},
"product_reference": "kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-348.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64"
},
"product_reference": "kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-348.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le"
},
"product_reference": "kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-348.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x"
},
"product_reference": "kernel-debug-modules-0:4.18.0-348.el8.s390x",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-348.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64"
},
"product_reference": "kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-348.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-348.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64"
},
"product_reference": "kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-348.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le"
},
"product_reference": "kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-348.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x"
},
"product_reference": "kernel-debuginfo-0:4.18.0-348.el8.s390x",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-348.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64"
},
"product_reference": "kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64"
},
"product_reference": "kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-348.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64"
},
"product_reference": "kernel-devel-0:4.18.0-348.el8.aarch64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-348.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le"
},
"product_reference": "kernel-devel-0:4.18.0-348.el8.ppc64le",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-348.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x"
},
"product_reference": "kernel-devel-0:4.18.0-348.el8.s390x",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-348.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64"
},
"product_reference": "kernel-devel-0:4.18.0-348.el8.x86_64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:4.18.0-348.el8.noarch as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch"
},
"product_reference": "kernel-doc-0:4.18.0-348.el8.noarch",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-348.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64"
},
"product_reference": "kernel-headers-0:4.18.0-348.el8.aarch64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-348.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le"
},
"product_reference": "kernel-headers-0:4.18.0-348.el8.ppc64le",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-348.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x"
},
"product_reference": "kernel-headers-0:4.18.0-348.el8.s390x",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-348.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
},
"product_reference": "kernel-headers-0:4.18.0-348.el8.x86_64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-348.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64"
},
"product_reference": "kernel-modules-0:4.18.0-348.el8.aarch64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-348.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le"
},
"product_reference": "kernel-modules-0:4.18.0-348.el8.ppc64le",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-348.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x"
},
"product_reference": "kernel-modules-0:4.18.0-348.el8.s390x",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-348.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64"
},
"product_reference": "kernel-modules-0:4.18.0-348.el8.x86_64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-348.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64"
},
"product_reference": "kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-348.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le"
},
"product_reference": "kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-348.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x"
},
"product_reference": "kernel-modules-extra-0:4.18.0-348.el8.s390x",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-348.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64"
},
"product_reference": "kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-348.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64"
},
"product_reference": "kernel-tools-0:4.18.0-348.el8.aarch64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-348.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le"
},
"product_reference": "kernel-tools-0:4.18.0-348.el8.ppc64le",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-348.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x"
},
"product_reference": "kernel-tools-0:4.18.0-348.el8.s390x",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-348.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64"
},
"product_reference": "kernel-tools-0:4.18.0-348.el8.x86_64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-348.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-348.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64"
},
"product_reference": "kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-348.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le"
},
"product_reference": "kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-348.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64"
},
"product_reference": "kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-0:4.18.0-348.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x"
},
"product_reference": "kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-core-0:4.18.0-348.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x"
},
"product_reference": "kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x"
},
"product_reference": "kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x"
},
"product_reference": "kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x"
},
"product_reference": "kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x"
},
"product_reference": "kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-348.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64"
},
"product_reference": "perf-0:4.18.0-348.el8.aarch64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-348.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le"
},
"product_reference": "perf-0:4.18.0-348.el8.ppc64le",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-348.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x"
},
"product_reference": "perf-0:4.18.0-348.el8.s390x",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-348.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64"
},
"product_reference": "perf-0:4.18.0-348.el8.x86_64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-348.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64"
},
"product_reference": "perf-debuginfo-0:4.18.0-348.el8.aarch64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-348.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le"
},
"product_reference": "perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-348.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x"
},
"product_reference": "perf-debuginfo-0:4.18.0-348.el8.s390x",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-348.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64"
},
"product_reference": "perf-debuginfo-0:4.18.0-348.el8.x86_64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-348.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64"
},
"product_reference": "python3-perf-0:4.18.0-348.el8.aarch64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-348.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le"
},
"product_reference": "python3-perf-0:4.18.0-348.el8.ppc64le",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-348.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x"
},
"product_reference": "python3-perf-0:4.18.0-348.el8.s390x",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-348.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64"
},
"product_reference": "python3-perf-0:4.18.0-348.el8.x86_64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-348.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-348.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-348.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-348.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64"
},
"product_reference": "bpftool-0:4.18.0-348.el8.aarch64",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-348.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le"
},
"product_reference": "bpftool-0:4.18.0-348.el8.ppc64le",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-348.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x"
},
"product_reference": "bpftool-0:4.18.0-348.el8.s390x",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-348.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64"
},
"product_reference": "bpftool-0:4.18.0-348.el8.x86_64",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-348.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-348.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-348.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-348.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-348.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64"
},
"product_reference": "kernel-0:4.18.0-348.el8.aarch64",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-348.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le"
},
"product_reference": "kernel-0:4.18.0-348.el8.ppc64le",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-348.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x"
},
"product_reference": "kernel-0:4.18.0-348.el8.s390x",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-348.el8.src as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src"
},
"product_reference": "kernel-0:4.18.0-348.el8.src",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-348.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64"
},
"product_reference": "kernel-0:4.18.0-348.el8.x86_64",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-stablelists-0:4.18.0-348.el8.noarch as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch"
},
"product_reference": "kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-348.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64"
},
"product_reference": "kernel-core-0:4.18.0-348.el8.aarch64",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-348.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le"
},
"product_reference": "kernel-core-0:4.18.0-348.el8.ppc64le",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-348.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x"
},
"product_reference": "kernel-core-0:4.18.0-348.el8.s390x",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-348.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64"
},
"product_reference": "kernel-core-0:4.18.0-348.el8.x86_64",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-348.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64"
},
"product_reference": "kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-348.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le"
},
"product_reference": "kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-348.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x"
},
"product_reference": "kernel-cross-headers-0:4.18.0-348.el8.s390x",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-348.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64"
},
"product_reference": "kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-348.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64"
},
"product_reference": "kernel-debug-0:4.18.0-348.el8.aarch64",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-348.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le"
},
"product_reference": "kernel-debug-0:4.18.0-348.el8.ppc64le",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-348.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x"
},
"product_reference": "kernel-debug-0:4.18.0-348.el8.s390x",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-348.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64"
},
"product_reference": "kernel-debug-0:4.18.0-348.el8.x86_64",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-348.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64"
},
"product_reference": "kernel-debug-core-0:4.18.0-348.el8.aarch64",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-348.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le"
},
"product_reference": "kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-348.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x"
},
"product_reference": "kernel-debug-core-0:4.18.0-348.el8.s390x",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-348.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64"
},
"product_reference": "kernel-debug-core-0:4.18.0-348.el8.x86_64",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-348.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-348.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64"
},
"product_reference": "kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-348.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le"
},
"product_reference": "kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-348.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x"
},
"product_reference": "kernel-debug-devel-0:4.18.0-348.el8.s390x",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-348.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64"
},
"product_reference": "kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-348.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64"
},
"product_reference": "kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-348.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le"
},
"product_reference": "kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-348.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x"
},
"product_reference": "kernel-debug-modules-0:4.18.0-348.el8.s390x",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-348.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64"
},
"product_reference": "kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-348.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-348.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64"
},
"product_reference": "kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-348.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le"
},
"product_reference": "kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-348.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x"
},
"product_reference": "kernel-debuginfo-0:4.18.0-348.el8.s390x",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-348.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64"
},
"product_reference": "kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64"
},
"product_reference": "kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-348.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64"
},
"product_reference": "kernel-devel-0:4.18.0-348.el8.aarch64",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-348.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le"
},
"product_reference": "kernel-devel-0:4.18.0-348.el8.ppc64le",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-348.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x"
},
"product_reference": "kernel-devel-0:4.18.0-348.el8.s390x",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-348.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64"
},
"product_reference": "kernel-devel-0:4.18.0-348.el8.x86_64",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:4.18.0-348.el8.noarch as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch"
},
"product_reference": "kernel-doc-0:4.18.0-348.el8.noarch",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-348.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64"
},
"product_reference": "kernel-headers-0:4.18.0-348.el8.aarch64",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-348.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le"
},
"product_reference": "kernel-headers-0:4.18.0-348.el8.ppc64le",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-348.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x"
},
"product_reference": "kernel-headers-0:4.18.0-348.el8.s390x",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-348.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
},
"product_reference": "kernel-headers-0:4.18.0-348.el8.x86_64",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-348.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64"
},
"product_reference": "kernel-modules-0:4.18.0-348.el8.aarch64",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-348.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le"
},
"product_reference": "kernel-modules-0:4.18.0-348.el8.ppc64le",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-348.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x"
},
"product_reference": "kernel-modules-0:4.18.0-348.el8.s390x",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-348.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64"
},
"product_reference": "kernel-modules-0:4.18.0-348.el8.x86_64",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-348.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64"
},
"product_reference": "kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-348.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le"
},
"product_reference": "kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-348.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x"
},
"product_reference": "kernel-modules-extra-0:4.18.0-348.el8.s390x",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-348.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64"
},
"product_reference": "kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-348.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64"
},
"product_reference": "kernel-tools-0:4.18.0-348.el8.aarch64",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-348.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le"
},
"product_reference": "kernel-tools-0:4.18.0-348.el8.ppc64le",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-348.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x"
},
"product_reference": "kernel-tools-0:4.18.0-348.el8.s390x",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-348.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64"
},
"product_reference": "kernel-tools-0:4.18.0-348.el8.x86_64",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-348.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-348.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64"
},
"product_reference": "kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-348.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le"
},
"product_reference": "kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-348.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64"
},
"product_reference": "kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-0:4.18.0-348.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x"
},
"product_reference": "kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-core-0:4.18.0-348.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x"
},
"product_reference": "kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x"
},
"product_reference": "kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x"
},
"product_reference": "kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x"
},
"product_reference": "kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x"
},
"product_reference": "kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-348.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64"
},
"product_reference": "perf-0:4.18.0-348.el8.aarch64",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-348.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le"
},
"product_reference": "perf-0:4.18.0-348.el8.ppc64le",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-348.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x"
},
"product_reference": "perf-0:4.18.0-348.el8.s390x",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-348.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64"
},
"product_reference": "perf-0:4.18.0-348.el8.x86_64",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-348.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64"
},
"product_reference": "perf-debuginfo-0:4.18.0-348.el8.aarch64",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-348.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le"
},
"product_reference": "perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-348.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x"
},
"product_reference": "perf-debuginfo-0:4.18.0-348.el8.s390x",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-348.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64"
},
"product_reference": "perf-debuginfo-0:4.18.0-348.el8.x86_64",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-348.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64"
},
"product_reference": "python3-perf-0:4.18.0-348.el8.aarch64",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-348.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le"
},
"product_reference": "python3-perf-0:4.18.0-348.el8.ppc64le",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-348.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x"
},
"product_reference": "python3-perf-0:4.18.0-348.el8.s390x",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-348.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64"
},
"product_reference": "python3-perf-0:4.18.0-348.el8.x86_64",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-348.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-348.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-348.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"relates_to_product_reference": "CRB-8.5.0.GA"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2019-14615",
"cwe": {
"id": "CWE-212",
"name": "Improper Removal of Sensitive Information Before Storage or Transfer"
},
"discovery_date": "2020-01-09T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1789209"
}
],
"notes": [
{
"category": "description",
"text": "An information disclosure flaw was found in the Linux kernel. The i915 graphics driver lacks control of flow for data structures which may allow a local, authenticated user to disclose information when using ioctl commands with an attached i915 device. The highest threat from this vulnerability is to data confidentiality.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Intel graphics card information leak.",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue affects the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 6, 7, 8 and Red Hat Enterprise MRG 2. Future kernel updates for Red Hat Enterprise Linux 6, 7, and 8 may address this issue.\n\nThis has been rated as having Moderate security impact and is not currently planned to be addressed in future updates of Red Hat Enterprise MRG 2.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-14615"
},
{
"category": "external",
"summary": "RHBZ#1789209",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1789209"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-14615",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14615"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-14615",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-14615"
}
],
"release_date": "2020-01-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T18:06:54+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4356"
},
{
"category": "workaround",
"details": "Preventing loading of the i915 kernel module will prevent attackers from using this exploit against the system; however, the power management functionality of the card will be disabled and the system may draw additional power. See the kcs \u201cHow do I blacklist a kernel module to prevent it from loading automatically?\u201c (https://access.redhat.com/solutions/41278) for instructions on how to disable a kernel module from autoloading. Graphical displays may also be at low resolution or not work correctly.\n\nThis mitigation may not be suitable if the graphical login functionality is required.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: Intel graphics card information leak."
},
{
"cve": "CVE-2020-0427",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2021-01-24T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1919893"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux pinctrl system. It is possible to trigger an of bounds read due to a use after free. This could lead to local information disclosure with no additional execution privileges needed.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: out-of-bounds reads in pinctrl subsystem.",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-0427"
},
{
"category": "external",
"summary": "RHBZ#1919893",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1919893"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-0427",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0427"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-0427",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-0427"
}
],
"release_date": "2020-11-22T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T18:06:54+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4356"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: out-of-bounds reads in pinctrl subsystem."
},
{
"cve": "CVE-2020-24502",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2021-02-17T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1930379"
}
],
"notes": [
{
"category": "description",
"text": "Improper input validation in some Intel(R) Ethernet E810 Adapter drivers for Linux may allow an authenticated user to potentially enable a denial of service via local access.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Improper input validation in some Intel(R) Ethernet E810 Adapter drivers",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-24502"
},
{
"category": "external",
"summary": "RHBZ#1930379",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1930379"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-24502",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24502"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-24502",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-24502"
}
],
"release_date": "2021-02-17T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T18:06:54+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4356"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: Improper input validation in some Intel(R) Ethernet E810 Adapter drivers"
},
{
"cve": "CVE-2020-24503",
"cwe": {
"id": "CWE-863",
"name": "Incorrect Authorization"
},
"discovery_date": "2021-02-17T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1930381"
}
],
"notes": [
{
"category": "description",
"text": "Insufficient access control in some Intel(R) Ethernet E810 Adapter drivers for Linux may allow an authenticated user to potentially enable information disclosure via local access.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Insufficient access control in some Intel(R) Ethernet E810 Adapter drivers",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-24503"
},
{
"category": "external",
"summary": "RHBZ#1930381",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1930381"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-24503",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24503"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-24503",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-24503"
}
],
"release_date": "2021-02-17T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T18:06:54+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4356"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: Insufficient access control in some Intel(R) Ethernet E810 Adapter drivers"
},
{
"cve": "CVE-2020-24504",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2021-02-17T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1930376"
}
],
"notes": [
{
"category": "description",
"text": "An uncontrolled resource consumption in some Intel(R) Ethernet E810 Adapter drivers for Linux may allow an authenticated user to potentially cause a denial of service via local access.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Uncontrolled resource consumption in some Intel(R) Ethernet E810 Adapter drivers",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-24504"
},
{
"category": "external",
"summary": "RHBZ#1930376",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1930376"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-24504",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24504"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-24504",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-24504"
},
{
"category": "external",
"summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00462.html",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00462.html"
}
],
"release_date": "2021-02-17T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T18:06:54+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4356"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: Uncontrolled resource consumption in some Intel(R) Ethernet E810 Adapter drivers"
},
{
"cve": "CVE-2020-24586",
"cwe": {
"id": "CWE-212",
"name": "Improper Removal of Sensitive Information Before Storage or Transfer"
},
"discovery_date": "2021-05-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1959642"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernels implementation of wifi fragmentation handling. An attacker with the ability to transmit within the wireless transmission range of an access point can abuse a flaw where previous contents of wifi fragments can be unintentionally transmitted to another device.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Fragmentation cache not cleared on reconnection",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-24586"
},
{
"category": "external",
"summary": "RHBZ#1959642",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1959642"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-24586",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24586"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-24586",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-24586"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-wireless/20210511200110.3f8290e59823.I622a67769ed39257327a362cfc09c812320eb979@changeid/",
"url": "https://lore.kernel.org/linux-wireless/20210511200110.3f8290e59823.I622a67769ed39257327a362cfc09c812320eb979@changeid/"
}
],
"release_date": "2021-05-12T01:20:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T18:06:54+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4356"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options does not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: Fragmentation cache not cleared on reconnection"
},
{
"cve": "CVE-2020-24587",
"cwe": {
"id": "CWE-345",
"name": "Insufficient Verification of Data Authenticity"
},
"discovery_date": "2021-05-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1959654"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel\u0027s WiFi implementation. An attacker within the wireless range can abuse a logic flaw in the WiFi implementation by reassembling packets from multiple fragments under different keys, treating them as valid. This flaw allows an attacker to send a fragment under an incorrect key, treating them as a valid fragment under the new key. The highest threat from this vulnerability is to confidentiality.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Reassembling fragments encrypted under different keys",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-24587"
},
{
"category": "external",
"summary": "RHBZ#1959654",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1959654"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-24587",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24587"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-24587",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-24587"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-wireless/20210511200110.3f8290e59823.I622a67769ed39257327a362cfc09c812320eb979@changeid/",
"url": "https://lore.kernel.org/linux-wireless/20210511200110.3f8290e59823.I622a67769ed39257327a362cfc09c812320eb979@changeid/"
}
],
"release_date": "2021-05-11T14:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T18:06:54+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4356"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options does not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "NONE",
"baseScore": 3.1,
"baseSeverity": "LOW",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: Reassembling fragments encrypted under different keys"
},
{
"cve": "CVE-2020-24588",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2021-05-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1959657"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernels wifi implementation. An attacker within wireless broadcast range can inject custom data into the wireless communication circumventing checks on the data. This can cause the frame to pass checks and be considered a valid frame of a different type.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: wifi frame payload being parsed incorrectly as an L2 frame",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-24588"
},
{
"category": "external",
"summary": "RHBZ#1959657",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1959657"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-24588",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24588"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-24588",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-24588"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-wireless/20210511200110.25d93176ddaf.I9e265b597f2cd23eb44573f35b625947b386a9de@changeid/",
"url": "https://lore.kernel.org/linux-wireless/20210511200110.25d93176ddaf.I9e265b597f2cd23eb44573f35b625947b386a9de@changeid/"
}
],
"release_date": "2021-05-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T18:06:54+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4356"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options does not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: wifi frame payload being parsed incorrectly as an L2 frame"
},
{
"cve": "CVE-2020-26139",
"cwe": {
"id": "CWE-829",
"name": "Inclusion of Functionality from Untrusted Control Sphere"
},
"discovery_date": "2021-05-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1959663"
}
],
"notes": [
{
"category": "description",
"text": "Frames used for authentication and key management between the AP and connected clients. Some clients may take these redirected frames masquerading as control mechanisms from the AP.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Forwarding EAPOL from unauthenticated wifi client",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-26139"
},
{
"category": "external",
"summary": "RHBZ#1959663",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1959663"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-26139",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26139"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-26139",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-26139"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-wireless/20210511200110.cb327ed0cabe.Ib7dcffa2a31f0913d660de65ba3c8aca75b1d10f@changeid/",
"url": "https://lore.kernel.org/linux-wireless/20210511200110.cb327ed0cabe.Ib7dcffa2a31f0913d660de65ba3c8aca75b1d10f@changeid/"
}
],
"release_date": "2021-05-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T18:06:54+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4356"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options does not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "NONE",
"baseScore": 3.5,
"baseSeverity": "LOW",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: Forwarding EAPOL from unauthenticated wifi client"
},
{
"cve": "CVE-2020-26140",
"cwe": {
"id": "CWE-346",
"name": "Origin Validation Error"
},
"discovery_date": "2021-05-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1960490"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in Linux kernel. Where the WiFi implementations accept plaintext frames in a protected WiFi network. An adversary can abuse this to inject arbitrary data frames independent of the network configuration.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: accepting plaintext data frames in protected networks",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-26140"
},
{
"category": "external",
"summary": "RHBZ#1960490",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1960490"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-26140",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26140"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-26140",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-26140"
}
],
"release_date": "2021-05-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T18:06:54+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4356"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: accepting plaintext data frames in protected networks"
},
{
"cve": "CVE-2020-26141",
"cwe": {
"id": "CWE-863",
"name": "Incorrect Authorization"
},
"discovery_date": "2021-05-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1960492"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in Linux kernel\u0027s WiFi implementation. An attacker within wireless range can inject a control packet fragment where the kernel does not verify the Message Integrity Check (authenticity) of fragmented TKIP frames.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: not verifying TKIP MIC of fragmented frames",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-26141"
},
{
"category": "external",
"summary": "RHBZ#1960492",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1960492"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-26141",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26141"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-26141",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-26141"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-wireless/20210511200110.c3f1d42c6746.I795593fcaae941c471425b8c7d5f7bb185d29142@changeid/",
"url": "https://lore.kernel.org/linux-wireless/20210511200110.c3f1d42c6746.I795593fcaae941c471425b8c7d5f7bb185d29142@changeid/"
}
],
"release_date": "2021-05-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T18:06:54+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4356"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options does not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: not verifying TKIP MIC of fragmented frames"
},
{
"cve": "CVE-2020-26143",
"cwe": {
"id": "CWE-346",
"name": "Origin Validation Error"
},
"discovery_date": "2021-05-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1960496"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in Linux kernel, where the WiFi implementations assemble fragments even though some of them were sent in plaintext. This vulnerability can be abused to inject packets and/or exfiltrate selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP data-confidentiality protocol is used.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: accepting fragmented plaintext frames in protected networks",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-26143"
},
{
"category": "external",
"summary": "RHBZ#1960496",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1960496"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-26143",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26143"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-26143",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-26143"
}
],
"release_date": "2021-05-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T18:06:54+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4356"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: accepting fragmented plaintext frames in protected networks"
},
{
"cve": "CVE-2020-26144",
"cwe": {
"id": "CWE-290",
"name": "Authentication Bypass by Spoofing"
},
"discovery_date": "2021-05-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1960498"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel, where the WiFi implementations accept plaintext A-MSDU frames as long as the first 8 bytes correspond to a valid RFC1042 (ex., LLC/SNAP) header for EAPOL. The highest threat from this vulnerability is to integrity.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: accepting unencrypted A-MSDU frames that start with RFC1042 header",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-26144"
},
{
"category": "external",
"summary": "RHBZ#1960498",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1960498"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-26144",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26144"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-26144",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-26144"
}
],
"release_date": "2021-05-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T18:06:54+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4356"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options does not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: accepting unencrypted A-MSDU frames that start with RFC1042 header"
},
{
"cve": "CVE-2020-26145",
"cwe": {
"id": "CWE-307",
"name": "Improper Restriction of Excessive Authentication Attempts"
},
"discovery_date": "2021-05-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1960500"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in ath10k_htt_rx_proc_rx_frag_ind_hl in drivers/net/wireless/ath/ath10k/htt_rx.c in the Linux kernel WiFi implementations, where it accepts a second (or subsequent) broadcast fragments even when sent in plaintext and then process them as full unfragmented frames. The highest threat from this vulnerability is to integrity.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: accepting plaintext broadcast fragments as full frames",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-26145"
},
{
"category": "external",
"summary": "RHBZ#1960500",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1960500"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-26145",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26145"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-26145",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-26145"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-wireless/20210511200110.9ca6ca7945a9.I1e18b514590af17c155bda86699bc3a971a8dcf4@changeid/",
"url": "https://lore.kernel.org/linux-wireless/20210511200110.9ca6ca7945a9.I1e18b514590af17c155bda86699bc3a971a8dcf4@changeid/"
}
],
"release_date": "2021-05-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T18:06:54+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4356"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options does not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: accepting plaintext broadcast fragments as full frames"
},
{
"cve": "CVE-2020-26146",
"cwe": {
"id": "CWE-307",
"name": "Improper Restriction of Excessive Authentication Attempts"
},
"discovery_date": "2021-05-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1960502"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in Linux kernel, where the WiFi implementation reassemble fragments with non-consecutive packet numbers. An adversary can abuse this to exfiltrate selected fragments. This vulnerability is exploitable when another device sends fragmented frames and the WEP, CCMP, or GCMP data-confidentiality protocol is used. Note that WEP is vulnerable to this attack by design.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: reassembling encrypted fragments with non-consecutive packet numbers",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-26146"
},
{
"category": "external",
"summary": "RHBZ#1960502",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1960502"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-26146",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26146"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-26146",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-26146"
}
],
"release_date": "2021-05-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T18:06:54+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4356"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: reassembling encrypted fragments with non-consecutive packet numbers"
},
{
"cve": "CVE-2020-26147",
"cwe": {
"id": "CWE-307",
"name": "Improper Restriction of Excessive Authentication Attempts"
},
"discovery_date": "2021-05-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1960504"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in ieee80211_rx_h_defragment in net/mac80211/rx.c in the Linux Kernel\u0027s WiFi implementation. This vulnerability can be abused to inject packets or exfiltrate selected fragments when another device sends fragmented frames, and the WEP, CCMP, or GCMP data-confidentiality protocol is used. The highest threat from this vulnerability is to integrity.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: reassembling mixed encrypted/plaintext fragments",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-26147"
},
{
"category": "external",
"summary": "RHBZ#1960504",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1960504"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-26147",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26147"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-26147",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-26147"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-wireless/20210511200110.30c4394bb835.I5acfdb552cc1d20c339c262315950b3eac491397@changeid/",
"url": "https://lore.kernel.org/linux-wireless/20210511200110.30c4394bb835.I5acfdb552cc1d20c339c262315950b3eac491397@changeid/"
}
],
"release_date": "2021-05-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T18:06:54+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4356"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options does not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:L/I:H/A:N",
"version": "3.1"
},
"products": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: reassembling mixed encrypted/plaintext fragments"
},
{
"acknowledgments": [
{
"names": [
"Daniel Axtens"
],
"organization": "IBM"
}
],
"cve": "CVE-2020-27777",
"cwe": {
"id": "CWE-862",
"name": "Missing Authorization"
},
"discovery_date": "2020-10-09T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1900844"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the way RTAS handled memory accesses in userspace to kernel communication. On a locked down (usually due to Secure Boot) guest system running on top of PowerVM or KVM hypervisors (pseries platform) a root like local user could use this flaw to further increase their privileges to that of a running kernel.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: powerpc: RTAS calls can be used to compromise kernel integrity",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue is rated as having Moderate impact due to the required privileges and hardware dependencies.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-27777"
},
{
"category": "external",
"summary": "RHBZ#1900844",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1900844"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-27777",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27777"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-27777",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-27777"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/powerpc/linux.git/commit/?h=next\u0026id=bd59380c5ba4147dcbaad3e582b55ccfd120b764",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/powerpc/linux.git/commit/?h=next\u0026id=bd59380c5ba4147dcbaad3e582b55ccfd120b764"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2020/10/09/1",
"url": "https://www.openwall.com/lists/oss-security/2020/10/09/1"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2020/11/23/2",
"url": "https://www.openwall.com/lists/oss-security/2020/11/23/2"
}
],
"release_date": "2020-10-08T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T18:06:54+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4356"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: powerpc: RTAS calls can be used to compromise kernel integrity"
},
{
"cve": "CVE-2020-29368",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2020-12-01T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1903244"
}
],
"notes": [
{
"category": "description",
"text": "An issue was discovered in __split_huge_pmd in mm/huge_memory.c in the Linux kernel. The copy-on-write implementation can grant unintended write access because of a race condition in a THP mapcount check.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: the copy-on-write implementation can grant unintended write access because of a race condition in a THP mapcount check",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw has been rated as having Moderateimpact because, based on Red Hat\u0027s assessment, this issue is hard to exploit in practice because the race window is too small for it to be reliable.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-29368"
},
{
"category": "external",
"summary": "RHBZ#1903244",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1903244"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-29368",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-29368"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-29368",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-29368"
}
],
"release_date": "2020-06-03T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T18:06:54+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4356"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: the copy-on-write implementation can grant unintended write access because of a race condition in a THP mapcount check"
},
{
"cve": "CVE-2020-29660",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2020-12-09T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1906522"
}
],
"notes": [
{
"category": "description",
"text": "A locking inconsistency issue was discovered in the tty subsystem of the Linux kernel. A local user could use this flaw to read numerical value from memory after free.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: locking inconsistency in drivers/tty/tty_io.c and drivers/tty/tty_jobctrl.c can lead to a read-after-free",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw is rated as having Low impact (Red Hat Enterprise Linux 7) because of the need to have CAP_SYS_TTY_CONFIG privileges.\n\nThis flaw is rated as having Moderate (Red Hat Enterprise Linux 8) impact because of the need to have CAP_SYS_TTY_CONFIG privileges. Red Hat Enterprise Linux 8 enabled unprivileged user/network namespaces by default which can be used to exercise this vulnerability.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-29660"
},
{
"category": "external",
"summary": "RHBZ#1906522",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1906522"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-29660",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-29660"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-29660",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-29660"
}
],
"release_date": "2020-12-04T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T18:06:54+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4356"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: locking inconsistency in drivers/tty/tty_io.c and drivers/tty/tty_jobctrl.c can lead to a read-after-free"
},
{
"cve": "CVE-2020-36158",
"cwe": {
"id": "CWE-120",
"name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)"
},
"discovery_date": "2021-01-05T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1913348"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel. The marvell wifi driver could allow a local attacker to execute arbitrary code via a long SSID value in mwifiex_cmd_802_11_ad_hoc_start function. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: buffer overflow in mwifiex_cmd_802_11_ad_hoc_start function in drivers/net/wireless/marvell/mwifiex/join.c via a long SSID value",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue is rated as having Moderate impact because the attacker needs to be local and privileged enough to be able to initiate ad-hoc WIFI network creation.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-36158"
},
{
"category": "external",
"summary": "RHBZ#1913348",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1913348"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-36158",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36158"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-36158",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-36158"
}
],
"release_date": "2020-12-08T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T18:06:54+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4356"
},
{
"category": "workaround",
"details": "To mitigate this issue, prevent the module mwifiex from being loaded. Please see https://access.redhat.com/solutions/41278 for information on how to blacklist a kernel module to prevent it from loading automatically.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: buffer overflow in mwifiex_cmd_802_11_ad_hoc_start function in drivers/net/wireless/marvell/mwifiex/join.c via a long SSID value"
},
{
"cve": "CVE-2020-36312",
"cwe": {
"id": "CWE-772",
"name": "Missing Release of Resource after Effective Lifetime"
},
"discovery_date": "2021-04-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1947991"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the KVM hypervisor of the Linux kernel. A memory leak could occur in kvm_io_bus_unregister_dev() upon a kmalloc failure. The highest threat from this vulnerability is to system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: memory leak upon a kmalloc failure in kvm_io_bus_unregister_dev function in virt/kvm/kvm_main.c",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-36312"
},
{
"category": "external",
"summary": "RHBZ#1947991",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1947991"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-36312",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36312"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-36312",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-36312"
}
],
"release_date": "2020-09-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T18:06:54+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4356"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 3.3,
"baseSeverity": "LOW",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: memory leak upon a kmalloc failure in kvm_io_bus_unregister_dev function in virt/kvm/kvm_main.c"
},
{
"cve": "CVE-2020-36386",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"discovery_date": "2021-06-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1969489"
}
],
"notes": [
{
"category": "description",
"text": "A flaw out of bounds memory access in the Linux kernel bluetooth subsystem was found in the way when some data being read about the bluetooth device with the hci_extended_inquiry_result_evt call. A local user could use this flaw to crash the system or read some data out of memory bounds that can lead to data confidentiality threat.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: slab out-of-bounds read in hci_extended_inquiry_result_evt() in net/bluetooth/hci_event.c",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw is rated as having a Moderate impact because even the data being read out of memory bounds is written to some cache, it was known before that this data from non-safe source and as result no any sensitive dependencies on this data.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-36386"
},
{
"category": "external",
"summary": "RHBZ#1969489",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1969489"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-36386",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36386"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-36386",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-36386"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=51c19bf3d5cfaa66571e4b88ba2a6f6295311101",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=51c19bf3d5cfaa66571e4b88ba2a6f6295311101"
}
],
"release_date": "2020-07-10T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T18:06:54+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4356"
},
{
"category": "workaround",
"details": "To mitigate this issue, prevent the module bluetooth from being loaded (if Bluetooth not required for the system). Please see https://access.redhat.com/solutions/41278 for information on how to blacklist a kernel module to prevent it from loading automatically.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: slab out-of-bounds read in hci_extended_inquiry_result_evt() in net/bluetooth/hci_event.c"
},
{
"cve": "CVE-2021-0129",
"cwe": {
"id": "CWE-287",
"name": "Improper Authentication"
},
"discovery_date": "2021-05-26T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1965038"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel. Improper access control in BlueZ may allow an authenticated user to potentially enable information disclosure via adjacent access. The highest threat from this vulnerability is to data confidentiality and integrity.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Improper access control in BlueZ may allow information disclosure vulnerability.",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-0129"
},
{
"category": "external",
"summary": "RHBZ#1965038",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965038"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-0129",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0129"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-0129",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-0129"
}
],
"release_date": "2021-06-08T03:30:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T18:06:54+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4356"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: Improper access control in BlueZ may allow information disclosure vulnerability."
},
{
"cve": "CVE-2021-3348",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2021-01-28T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1921958"
}
],
"notes": [
{
"category": "description",
"text": "A use after free flaw in the Linux kernel network block device (NBD) subsystem was found in the way user calls an ioctl NBD_SET_SOCK at a certain point during device setup.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Use-after-free in ndb_queue_rq() in drivers/block/nbd.c",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw is rated as having a Moderate impact because in the default configuration, the issue can only be triggered by a privileged local user (with access to the nbd device).",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-3348"
},
{
"category": "external",
"summary": "RHBZ#1921958",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1921958"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-3348",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3348"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3348",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3348"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-block/24dff677353e2e30a71d8b66c4dffdbdf77c4dbd.1611595239.git.josef@toxicpanda.com/",
"url": "https://lore.kernel.org/linux-block/24dff677353e2e30a71d8b66c4dffdbdf77c4dbd.1611595239.git.josef@toxicpanda.com/"
}
],
"release_date": "2021-01-28T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T18:06:54+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4356"
},
{
"category": "workaround",
"details": "To mitigate this issue, prevent the module nbd from being loaded. Please see https://access.redhat.com/solutions/41278 for information on how to blacklist a kernel module to prevent it from loading automatically.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: Use-after-free in ndb_queue_rq() in drivers/block/nbd.c"
},
{
"acknowledgments": [
{
"names": [
"Ryota Shiga"
]
}
],
"cve": "CVE-2021-3489",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"discovery_date": "2021-05-11T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1959559"
}
],
"notes": [
{
"category": "description",
"text": "A flaw out of bound memory write in the Linux kernel BPF subsystem was found in the way user writes to BPF ring buffer too fast, so larger buffer than available memory could be allocated. A local user could use this flaw to crash the system or possibly escalate their privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Linux kernel eBPF RINGBUF map oversized allocation",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-3489"
},
{
"category": "external",
"summary": "RHBZ#1959559",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1959559"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-3489",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3489"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3489",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3489"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf.git/commit/?id=4b81ccebaeee885ab1aa1438133f2991e3a2b6ea",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf.git/commit/?id=4b81ccebaeee885ab1aa1438133f2991e3a2b6ea"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2021/05/11/10",
"url": "https://www.openwall.com/lists/oss-security/2021/05/11/10"
}
],
"release_date": "2021-05-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T18:06:54+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4356"
},
{
"category": "workaround",
"details": "The default Red Hat Enterprise Linux kernel prevents unprivileged users from being able to use eBPF by the kernel.unprivileged_bpf_disabled sysctl. This would require a privileged user with CAP_SYS_ADMIN or root to be able to abuse this flaw reducing its attack space.\n\nFor the Red Hat Enterprise Linux 7 the eBPF for unprivileged users is always disabled.\nFor the Red Hat Enterprise Linux 8 to confirm the current state, inspect the sysctl with the command:\n\n# cat /proc/sys/kernel/unprivileged_bpf_disabled\n\nThe setting of 1 would mean that unprivileged users can not use eBPF, mitigating the flaw.\n\nA kernel update will be required to mitigate the flaw for the root or users with CAP_SYS_ADMIN capabilities.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: Linux kernel eBPF RINGBUF map oversized allocation"
},
{
"acknowledgments": [
{
"names": [
"HaoXiong, LinMa"
],
"organization": "ckSec"
}
],
"cve": "CVE-2021-3564",
"cwe": {
"id": "CWE-415",
"name": "Double Free"
},
"discovery_date": "2021-05-19T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1964139"
}
],
"notes": [
{
"category": "description",
"text": "A flaw double-free memory corruption in the Linux kernel HCI device initialization subsystem was found in the way user attach malicious HCI TTY Bluetooth device. A local user could use this flaw to crash the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: double free in bluetooth subsystem when the HCI device initialization fails",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The impact is Moderate, because the double free happens during flush procedure, and no use of incorrect data during flush finishing even if double free could happen without kernel crash.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-3564"
},
{
"category": "external",
"summary": "RHBZ#1964139",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1964139"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-3564",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3564"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3564",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3564"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2021/05/25/1",
"url": "https://www.openwall.com/lists/oss-security/2021/05/25/1"
}
],
"release_date": "2021-05-25T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T18:06:54+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4356"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: double free in bluetooth subsystem when the HCI device initialization fails"
},
{
"cve": "CVE-2021-3573",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2021-05-31T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1966578"
}
],
"notes": [
{
"category": "description",
"text": "A flaw use-after-free in function hci_sock_bound_ioctl() of the Linux kernel HCI subsystem was found in the way user calls ioct HCIUNBLOCKADDR or other way triggers race condition of the call hci_unregister_dev() together with one of the calls hci_sock_blacklist_add(), hci_sock_blacklist_del(), hci_get_conn_info(), hci_get_auth_info(). A privileged local user could use this flaw to crash the system or escalate their privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: use-after-free in function hci_sock_bound_ioctl()",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue is rated as having a Moderate impact because of the privileges (CAP_NET_ADMIN in initial namespace) required for exploiting the issue.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-3573"
},
{
"category": "external",
"summary": "RHBZ#1966578",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1966578"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-3573",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3573"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3573",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3573"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/bluetooth/bluetooth.git/commit/?id=e305509e678b3a4af2b3cfd410f409f7cdaabb52",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/bluetooth/bluetooth.git/commit/?id=e305509e678b3a4af2b3cfd410f409f7cdaabb52"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2021/06/08/2",
"url": "https://www.openwall.com/lists/oss-security/2021/06/08/2"
}
],
"release_date": "2021-06-08T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T18:06:54+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4356"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising easThe required privileges is CAP_NET_ADMIN capabilities. This would require a privileged user with CAP_SYS_ADMIN or root to be able to abuse this flaw reducing its attack space.e of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: use-after-free in function hci_sock_bound_ioctl()"
},
{
"cve": "CVE-2021-3600",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2021-06-23T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1981954"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel\u2019s eBPF verification code, where the eBPF 32-bit div/mod source register truncation could lead to out-of-bounds reads and writes. By default, accessing the eBPF verifier is only possible to privileged users with CAP_SYS_ADMIN. This flaw allows a local user who can run eBPF instructions to crash the system or possibly escalate their privileges on the system. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: eBPF 32-bit source register truncation on div/mod",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-3600"
},
{
"category": "external",
"summary": "RHBZ#1981954",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1981954"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-3600",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3600"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3600",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3600"
},
{
"category": "external",
"summary": "https://lore.kernel.org/patchwork/patch/1379497/",
"url": "https://lore.kernel.org/patchwork/patch/1379497/"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2021/06/23/1",
"url": "https://www.openwall.com/lists/oss-security/2021/06/23/1"
}
],
"release_date": "2021-06-23T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T18:06:54+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4356"
},
{
"category": "workaround",
"details": "The default Red Hat Enterprise Linux kernel prevents unprivileged users from being able to use eBPF by the kernel.unprivileged_bpf_disabled sysctl. This would require a privileged user with CAP_SYS_ADMIN or root to be able to abuse this flaw reducing its attack space.\n\nFor the Red Hat Enterprise Linux 7 the eBPF for unprivileged users is always disabled.\nFor the Red Hat Enterprise Linux 8 to confirm the current state, inspect the sysctl with the command:\n\n# cat /proc/sys/kernel/unprivileged_bpf_disabled\n\nThe setting of 1 would mean that unprivileged users can not use eBPF, mitigating the flaw.\n\nA kernel update will be required to mitigate the flaw for the root or users with CAP_SYS_ADMIN capabilities.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: eBPF 32-bit source register truncation on div/mod"
},
{
"cve": "CVE-2021-3635",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"discovery_date": "2021-06-22T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1976946"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel netfilter implementation. A user with root (CAP_SYS_ADMIN) access is able to panic the system when issuing netfilter netflow commands",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: flowtable list del corruption with kernel BUG at lib/list_debug.c:50",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-3635"
},
{
"category": "external",
"summary": "RHBZ#1976946",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1976946"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-3635",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3635"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3635",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3635"
}
],
"release_date": "2021-08-06T04:47:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T18:06:54+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4356"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options does not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 4.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: flowtable list del corruption with kernel BUG at lib/list_debug.c:50"
},
{
"cve": "CVE-2021-3659",
"cwe": {
"id": "CWE-252",
"name": "Unchecked Return Value"
},
"discovery_date": "2021-05-14T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1975949"
}
],
"notes": [
{
"category": "description",
"text": "A NULL pointer dereference flaw was found in the Linux kernel\u2019s IEEE 802.15.4 wireless networking subsystem in the way the user closes the LR-WPAN connection. This flaw allows a local user to crash the system. The highest threat from this vulnerability is to system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: NULL pointer dereference in llsec_key_alloc() in net/mac802154/llsec.c",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-3659"
},
{
"category": "external",
"summary": "RHBZ#1975949",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1975949"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-3659",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3659"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3659",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3659"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=1165affd484889d4986cf3b724318935a0b120d8",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=1165affd484889d4986cf3b724318935a0b120d8"
}
],
"release_date": "2021-04-06T19:22:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T18:06:54+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4356"
},
{
"category": "workaround",
"details": "To mitigate this issue, prevent the module mac802154 from being loaded. Please see https://access.redhat.com/solutions/41278 for information on how to blacklist a kernel module to prevent it from loading automatically.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: NULL pointer dereference in llsec_key_alloc() in net/mac802154/llsec.c"
},
{
"acknowledgments": [
{
"names": [
"Haoran Luo"
],
"organization": "Chaitin Tech"
}
],
"cve": "CVE-2021-3679",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2021-07-25T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1989165"
}
],
"notes": [
{
"category": "description",
"text": "A lack of CPU resources in the Linux kernel tracing module functionality was found in the way users use the trace ring buffer in specific way. Only privileged local users (with CAP_SYS_ADMIN capability) could use this flaw to starve the resources causing denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: DoS in rb_per_cpu_empty()",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-3679"
},
{
"category": "external",
"summary": "RHBZ#1989165",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1989165"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-3679",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3679"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3679",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3679"
},
{
"category": "external",
"summary": "https://lore.kernel.org/lkml/20210723125527.767d1c18@oasis.local.home/",
"url": "https://lore.kernel.org/lkml/20210723125527.767d1c18@oasis.local.home/"
}
],
"release_date": "2021-07-20T09:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T18:06:54+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4356"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: DoS in rb_per_cpu_empty()"
},
{
"acknowledgments": [
{
"names": [
"Miklos Szeredi"
],
"organization": "Red Hat",
"summary": "This issue was discovered by Red Hat."
}
],
"cve": "CVE-2021-3732",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2021-08-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1995249"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel\u2019s OverlayFS subsystem in the way the user mounts the TmpFS filesystem with OverlayFS. This flaw allows a local user to gain access to hidden files that should not be accessible.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: overlayfs: Mounting overlayfs inside an unprivileged user namespace can reveal files",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-3732"
},
{
"category": "external",
"summary": "RHBZ#1995249",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1995249"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-3732",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3732"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3732",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3732"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=427215d85e8d",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=427215d85e8d"
}
],
"release_date": "2021-08-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T18:06:54+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4356"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 3.3,
"baseSeverity": "LOW",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: overlayfs: Mounting overlayfs inside an unprivileged user namespace can reveal files"
},
{
"cve": "CVE-2021-4442",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2024-08-29T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2308455"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntcp: add sanity tests to TCP_QUEUE_SEQ\n\nQingyu Li reported a syzkaller bug where the repro\nchanges RCV SEQ _after_ restoring data in the receive queue.\n\nmprotect(0x4aa000, 12288, PROT_READ) = 0\nmmap(0x1ffff000, 4096, PROT_NONE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x1ffff000\nmmap(0x20000000, 16777216, PROT_READ|PROT_WRITE|PROT_EXEC, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x20000000\nmmap(0x21000000, 4096, PROT_NONE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x21000000\nsocket(AF_INET6, SOCK_STREAM, IPPROTO_IP) = 3\nsetsockopt(3, SOL_TCP, TCP_REPAIR, [1], 4) = 0\nconnect(3, {sa_family=AF_INET6, sin6_port=htons(0), sin6_flowinfo=htonl(0), inet_pton(AF_INET6, \"::1\", \u0026sin6_addr), sin6_scope_id=0}, 28) = 0\nsetsockopt(3, SOL_TCP, TCP_REPAIR_QUEUE, [1], 4) = 0\nsendmsg(3, {msg_name=NULL, msg_namelen=0, msg_iov=[{iov_base=\"0x0000000000000003\\0\\0\", iov_len=20}], msg_iovlen=1, msg_controllen=0, msg_flags=0}, 0) = 20\nsetsockopt(3, SOL_TCP, TCP_REPAIR, [0], 4) = 0\nsetsockopt(3, SOL_TCP, TCP_QUEUE_SEQ, [128], 4) = 0\nrecvfrom(3, NULL, 20, 0, NULL, NULL) = -1 ECONNRESET (Connection reset by peer)\n\nsyslog shows:\n[ 111.205099] TCP recvmsg seq # bug 2: copied 80, seq 0, rcvnxt 80, fl 0\n[ 111.207894] WARNING: CPU: 1 PID: 356 at net/ipv4/tcp.c:2343 tcp_recvmsg_locked+0x90e/0x29a0\n\nThis should not be allowed. TCP_QUEUE_SEQ should only be used\nwhen queues are empty.\n\nThis patch fixes this case, and the tx path as well.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: tcp: add sanity tests to TCP_QUEUE_SEQ",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue is fixed in RHEL-8.5 and above\n~~~\nin (rhel-8.5, rhel-8.6, rhel-8.7, rhel-8.8, rhel-8.9, rhel-8.10) tcp: add sanity tests to TCP_QUEUE_SEQ\n~~~",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-4442"
},
{
"category": "external",
"summary": "RHBZ#2308455",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2308455"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-4442",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4442"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-4442",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-4442"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024082945-CVE-2021-4442-0a5f@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024082945-CVE-2021-4442-0a5f@gregkh/T"
}
],
"release_date": "2024-08-29T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T18:06:54+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4356"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: tcp: add sanity tests to TCP_QUEUE_SEQ"
},
{
"acknowledgments": [
{
"names": [
"Loris Reiff"
]
}
],
"cve": "CVE-2021-20194",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2020-12-30T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1912683"
}
],
"notes": [
{
"category": "description",
"text": "A flaw buffer overflow in the Linux kernel BPF subsystem was found in the way user running BPF script calling getsockopt. A local user could use this flaw to crash the system or possibly escalate their privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: heap overflow in __cgroup_bpf_run_filter_getsockopt()",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw is rated as having Moderate impact because of the need to have elevated privileges or non-standard configuration for running BPF script.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-20194"
},
{
"category": "external",
"summary": "RHBZ#1912683",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1912683"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-20194",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20194"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-20194",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-20194"
}
],
"release_date": "2021-01-22T10:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T18:06:54+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4356"
},
{
"category": "workaround",
"details": "The default Red Hat Enterprise Linux kernel prevents unprivileged users from being able to use eBPF by the kernel.unprivileged_bpf_disabled sysctl. This would require a privileged user with CAP_SYS_ADMIN or root to be able to abuse this flaw reducing its attack space.\n\nFor the Red Hat Enterprise Linux 7 the eBPF for unprivileged users is always disabled.\n\nFor the Red Hat Enterprise Linux 8 to confirm the current state, inspect the sysctl with the command:\n\n# cat /proc/sys/kernel/unprivileged_bpf_disabled\n\nThe setting of 1 would mean that unprivileged users can not use eBPF.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: heap overflow in __cgroup_bpf_run_filter_getsockopt()"
},
{
"cve": "CVE-2021-20239",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2021-02-01T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1923636"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the BPF protocol. This flaw allows an attacker with a local account to leak information about kernel internal addresses. The highest threat from this vulnerability is to confidentiality.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: setsockopt System Call Untrusted Pointer Dereference Information Disclosure",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-20239"
},
{
"category": "external",
"summary": "RHBZ#1923636",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1923636"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-20239",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20239"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-20239",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-20239"
}
],
"release_date": "2021-02-01T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T18:06:54+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4356"
},
{
"category": "workaround",
"details": "Loading a filter is a privileged (CAP_SYS_ADMIN or root) operation. Once any filter is used, this attack is capable of being used by an unprivileged user. There is no known mitigation that product security finds suitable for this flaw.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 3.8,
"baseSeverity": "LOW",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: setsockopt System Call Untrusted Pointer Dereference Information Disclosure"
},
{
"acknowledgments": [
{
"names": [
"Or Cohen"
],
"organization": "Palo Alto Networks"
}
],
"cve": "CVE-2021-23133",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2021-04-09T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1948772"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free flaw was found in the Linux kernel\u0027s SCTP socket functionality that triggers a race condition. This flaw allows a local user to escalate their privileges on the system. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Race condition in sctp_destroy_sock list_del",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue is rated as having a Moderate impact because of the privileges required for running the known reproducer. The required privileges are CAP_BPF and CAP_NET_ADMIN capabilities that are disabled by default in Red Hat Enterprise Linux 7. For Red Hat Enterprise Linux 8, the SCTP protocol itself is disabled by default and cannot be used by a user without enablement by an administrator.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-23133"
},
{
"category": "external",
"summary": "RHBZ#1948772",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1948772"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-23133",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23133"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-23133",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-23133"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=b166a20b07382b8bc1dcee2a448715c9c2c81b5b",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=b166a20b07382b8bc1dcee2a448715c9c2c81b5b"
}
],
"release_date": "2021-04-18T09:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T18:06:54+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4356"
},
{
"category": "workaround",
"details": "To mitigate this issue, prevent the module sctp from being loaded (and this is so by default for Red Hat Enterprise Linux 8). Please see https://access.redhat.com/solutions/41278 for information on how to blacklist a kernel module to prevent it from loading automatically.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: Race condition in sctp_destroy_sock list_del"
},
{
"cve": "CVE-2021-28950",
"cwe": {
"id": "CWE-835",
"name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)"
},
"discovery_date": "2021-03-22T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1941762"
}
],
"notes": [
{
"category": "description",
"text": "A denial of service in the kernel side of the FUSE functionality can allow a local system to create a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: fuse: stall on CPU can occur because a retry loop continually finds the same bad inode",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-28950"
},
{
"category": "external",
"summary": "RHBZ#1941762",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1941762"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-28950",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-28950"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-28950",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-28950"
}
],
"release_date": "2021-03-04T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T18:06:54+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4356"
},
{
"category": "workaround",
"details": "As the FUSE module will be auto-loaded when required, its use can be disabled by preventing the module from loading with the following instructions:\n\n# echo \"install fuse /bin/true\" \u003e\u003e /etc/modprobe.d/disable-fuse.conf\n\nThe system will need to be restarted if the FUSE modules are loaded. In most circumstances, the CIFS kernel modules will be unable to be unloaded while the FUSE filesystems are in use.\n\nIf the system requires this module to work correctly, this mitigation may not be suitable.\n\nIf you need further assistance, see KCS article https://access.redhat.com/solutions/41278 or contact Red Hat Global Support Services.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: fuse: stall on CPU can occur because a retry loop continually finds the same bad inode"
},
{
"cve": "CVE-2021-28971",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"discovery_date": "2021-03-22T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1941784"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel. On some Haswell CPUs, userspace applications (such as perf-fuzzer) can cause a system crash because the PEBS status in a PEBS record is mishandled.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: System crash in intel_pmu_drain_pebs_nhm in arch/x86/events/intel/ds.c",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-28971"
},
{
"category": "external",
"summary": "RHBZ#1941784",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1941784"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-28971",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-28971"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-28971",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-28971"
}
],
"release_date": "2021-03-22T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T18:06:54+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4356"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options does not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: System crash in intel_pmu_drain_pebs_nhm in arch/x86/events/intel/ds.c"
},
{
"cve": "CVE-2021-29155",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"discovery_date": "2021-04-18T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1951595"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was discovered in retrieve_ptr_limit in kernel/bpf/verifier.c in the Linux kernel mechanism to mitigate speculatively out-of-bounds loads (Spectre mitigation). In this flaw a local, special user privileged (CAP_SYS_ADMIN) BPF program running on affected systems may bypass the protection, and execute speculatively out-of-bounds loads from the kernel memory. This can be abused to extract contents of kernel memory via side-channel.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: protection for sequences of pointer arithmetic operations against speculatively out-of-bounds loads can be bypassed to leak content of kernel memory",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-29155"
},
{
"category": "external",
"summary": "RHBZ#1951595",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1951595"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-29155",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29155"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-29155",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-29155"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2021/04/18/4",
"url": "https://www.openwall.com/lists/oss-security/2021/04/18/4"
}
],
"release_date": "2021-04-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T18:06:54+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4356"
},
{
"category": "workaround",
"details": "The default Red Hat Enterprise Linux kernel prevents unprivileged users from being able to use eBPF by the kernel.unprivileged_bpf_disabled sysctl. This would require a privileged user with CAP_SYS_ADMIN or root to be able to abuse this flaw reducing its attack space.\n\nFor the Red Hat Enterprise Linux 7 the eBPF for unprivileged users is always disabled.\nFor the Red Hat Enterprise Linux 8 to confirm the current state, inspect the sysctl with the command:\n\n# cat /proc/sys/kernel/unprivileged_bpf_disabled\n\nThe setting of 1 would mean that unprivileged users can not use eBPF, mitigating the flaw.\n\nA kernel update will be required to mitigate the flaw for the root or users with CAP_SYS_ADMIN capabilities.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: protection for sequences of pointer arithmetic operations against speculatively out-of-bounds loads can be bypassed to leak content of kernel memory"
},
{
"cve": "CVE-2021-29646",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2021-03-30T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1945345"
}
],
"notes": [
{
"category": "description",
"text": "A flaw buffer overflow in the Linux kernel TIPC protocol functionality was found in the way user uses protocol with encryption enabled. A local user could use this flaw to crash the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: improper input validation in tipc_nl_retrieve_key function in net/tipc/node.c",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-29646"
},
{
"category": "external",
"summary": "RHBZ#1945345",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1945345"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-29646",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29646"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-29646",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-29646"
}
],
"release_date": "2021-03-15T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T18:06:54+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4356"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: improper input validation in tipc_nl_retrieve_key function in net/tipc/node.c"
},
{
"cve": "CVE-2021-29650",
"cwe": {
"id": "CWE-662",
"name": "Improper Synchronization"
},
"discovery_date": "2021-03-30T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1945388"
}
],
"notes": [
{
"category": "description",
"text": "A denial-of-service (DoS) flaw was identified in the Linux kernel due to an incorrect memory barrier in xt_replace_table in net/netfilter/x_tables.c in the netfilter subsystem.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: lack a full memory barrier upon the assignment of a new table value in net/netfilter/x_tables.c and include/linux/netfilter/x_tables.h may lead to DoS",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-29650"
},
{
"category": "external",
"summary": "RHBZ#1945388",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1945388"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-29650",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29650"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-29650",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-29650"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=175e476b8cdf2a4de7432583b49c871345e4f8a1",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=175e476b8cdf2a4de7432583b49c871345e4f8a1"
}
],
"release_date": "2021-03-15T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T18:06:54+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4356"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: lack a full memory barrier upon the assignment of a new table value in net/netfilter/x_tables.c and include/linux/netfilter/x_tables.h may lead to DoS"
},
{
"acknowledgments": [
{
"names": [
"Manfred Paul"
],
"organization": "RedRocket CTF team"
}
],
"cve": "CVE-2021-31440",
"cwe": {
"id": "CWE-682",
"name": "Incorrect Calculation"
},
"discovery_date": "2021-05-21T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1964028"
}
],
"notes": [
{
"category": "description",
"text": "An out-of-bounds access flaw was found in the Linux kernel\u2019s implementation of the eBPF code verifier, where an incorrect register bounds calculation while checking unsigned 32-bit instructions in an eBPF program occurs.. By default accessing the eBPF verifier is only accessible to privileged users with CAP_SYS_ADMIN. The issue results from the lack of proper validation of user-supplied eBPF programs prior to executing them. A local user could use this flaw to crash the system or possibly escalate their privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: local escalation of privileges in handling of eBPF programs",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-31440"
},
{
"category": "external",
"summary": "RHBZ#1964028",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1964028"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-31440",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-31440"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-31440",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-31440"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=10bf4e83167cc68595b85fd73bb91e8f2c086e36",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=10bf4e83167cc68595b85fd73bb91e8f2c086e36"
},
{
"category": "external",
"summary": "https://www.zerodayinitiative.com/blog/2021/5/26/cve-2021-31440-an-incorrect-bounds-calculation-in-the-linux-kernel-ebpf-verifier",
"url": "https://www.zerodayinitiative.com/blog/2021/5/26/cve-2021-31440-an-incorrect-bounds-calculation-in-the-linux-kernel-ebpf-verifier"
}
],
"release_date": "2021-05-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T18:06:54+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4356"
},
{
"category": "workaround",
"details": "The default Red Hat Enterprise Linux kernel prevents unprivileged users from being able to use eBPF by the kernel.unprivileged_bpf_disabled sysctl. This would require a privileged user with CAP_SYS_ADMIN or root to be able to abuse this flaw reducing its attack space.\n\nFor the Red Hat Enterprise Linux 7 the eBPF for unprivileged users is always disabled.\nFor the Red Hat Enterprise Linux 8 to confirm the current state, inspect the sysctl with the command:\n\n# cat /proc/sys/kernel/unprivileged_bpf_disabled\n\nThe setting of 1 would mean that unprivileged users can not use eBPF, mitigating the flaw.\n\nA kernel update will be required to mitigate the flaw for the root or users with CAP_SYS_ADMIN capabilities.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: local escalation of privileges in handling of eBPF programs"
},
{
"cve": "CVE-2021-31829",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2021-05-04T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1957788"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel\u0027s eBPF verification code. By default, accessing the eBPF verifier is only accessible to privileged users with CAP_SYS_ADMIN. This flaw allows a local user who can insert eBPF instructions, to use the eBPF verifier to abuse a spectre-like flaw and infer all system memory. The highest threat from this vulnerability is to confidentiality.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: protection of stack pointer against speculative pointer arithmetic can be bypassed to leak content of kernel memory",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-31829"
},
{
"category": "external",
"summary": "RHBZ#1957788",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1957788"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-31829",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-31829"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-31829",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-31829"
}
],
"release_date": "2021-04-30T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T18:06:54+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4356"
},
{
"category": "workaround",
"details": "The default Red Hat Enterprise Linux kernel prevents unprivileged users from being able to use eBPF by the kernel.unprivileged_bpf_disabled sysctl. This would require a privileged user with CAP_SYS_ADMIN or root to be able to abuse this flaw reducing its attack space.\n\nFor the Red Hat Enterprise Linux 7 and 8 kernel to confirm the current state, inspect the sysctl with the command:\n\n# cat /proc/sys/kernel/unprivileged_bpf_disabled\n\nThe setting of 1 would mean that unprivileged users can not use eBPF, mitigating the flaw.\n\nA kernel update will be required to mitigate the flaw for the root or users with CAP_SYS_ADMIN capabilities.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: protection of stack pointer against speculative pointer arithmetic can be bypassed to leak content of kernel memory"
},
{
"cve": "CVE-2021-31916",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2021-03-29T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1946965"
}
],
"notes": [
{
"category": "description",
"text": "An out-of-bounds (OOB) memory write flaw was found in list_devices in drivers/md/dm-ioctl.c in the Multi-device driver module in the Linux kernel. A bound check failure allows an attacker with special user (CAP_SYS_ADMIN) privilege to gain access to out-of-bounds memory leading to a system crash, a leak of internal kernel information, or a privilege escalation problem.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: out of bounds array access in drivers/md/dm-ioctl.c",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw is rated a Low impact because in the default configuration, the issue can only be triggered by a privileged local user.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-31916"
},
{
"category": "external",
"summary": "RHBZ#1946965",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1946965"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-31916",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-31916"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-31916",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-31916"
},
{
"category": "external",
"summary": "https://github.com/torvalds/linux/commit/4edbe1d7bcffcd6269f3b5eb63f710393ff2ec7a",
"url": "https://github.com/torvalds/linux/commit/4edbe1d7bcffcd6269f3b5eb63f710393ff2ec7a"
},
{
"category": "external",
"summary": "https://seclists.org/oss-sec/2021/q1/268",
"url": "https://seclists.org/oss-sec/2021/q1/268"
}
],
"release_date": "2021-03-29T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T18:06:54+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4356"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: out of bounds array access in drivers/md/dm-ioctl.c"
},
{
"cve": "CVE-2021-33033",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2021-05-14T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1961300"
}
],
"notes": [
{
"category": "description",
"text": "A flaw use-after-free in the Linux kernel CIPSO network packet labeling protocol functionality was found in the way user open local network connection with the usage of the security labeling that is IP option number 134. A local user could use this flaw to crash the system or possibly escalate their privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: use-after-free in cipso_v4_genopt in net/ipv4/cipso_ipv4.c",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Considered to be Moderate rate, because by default CIPSO non-enabled and both no known way to reproduce the attack remotely and both it looks complex if even possible to use the attack in any way apart from crashing the system. For the usage of the inbound CIPSO connections, the administrator have to enable it with netlabelctl utility first. The vulnerability is considered to be for local user, because it can happen only when a local user opens a socket for sending packets, but not during receiving packets.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-33033"
},
{
"category": "external",
"summary": "RHBZ#1961300",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1961300"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-33033",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33033"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-33033",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33033"
}
],
"release_date": "2021-03-04T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T18:06:54+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4356"
},
{
"category": "workaround",
"details": "The mitigation would be not allowing CIPSO labeling for the inbound network connections. For the most of the default configurations both for network routers and for the Linux servers itself it is disabled by default.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: use-after-free in cipso_v4_genopt in net/ipv4/cipso_ipv4.c"
},
{
"cve": "CVE-2021-33098",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2021-11-17T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2068236"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel. This flaw allows an attacker who can modify the MTU of a virtualized PCIe device (in a guest, for example) to crash the host system\u2019s kernel if they set the MTU of the VF device to an unsupported value.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Improper input validation in the Intel(R) Ethernet ixgbe driver may allow an authenticated user to potentially enable DoS via local access",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-33098"
},
{
"category": "external",
"summary": "RHBZ#2068236",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2068236"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-33098",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33098"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-33098",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33098"
}
],
"release_date": "2021-11-09T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T18:06:54+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4356"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options does not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: Improper input validation in the Intel(R) Ethernet ixgbe driver may allow an authenticated user to potentially enable DoS via local access"
},
{
"cve": "CVE-2021-33200",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2021-05-27T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1965458"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in kernel/bpf/verifier.c in BPF in the Linux kernel. An incorrect limit is enforced for pointer arithmetic operations which can be abused to perform out-of-bounds reads and writes in kernel memory, leading to local privilege escalation. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: out-of-bounds reads and writes due to enforcing incorrect limits for pointer arithmetic operations by BPF verifier",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-33200"
},
{
"category": "external",
"summary": "RHBZ#1965458",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965458"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-33200",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33200"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-33200",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33200"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf.git/patch/?id=3d0220f6861d713213b015b582e9f21e5b28d2e0",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf.git/patch/?id=3d0220f6861d713213b015b582e9f21e5b28d2e0"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf.git/patch/?id=a7036191277f9fa68d92f2071ddc38c09b1e5ee5",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf.git/patch/?id=a7036191277f9fa68d92f2071ddc38c09b1e5ee5"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf.git/patch/?id=bb01a1bba579b4b1c5566af24d95f1767859771e",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf.git/patch/?id=bb01a1bba579b4b1c5566af24d95f1767859771e"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2021/05/27/1",
"url": "https://www.openwall.com/lists/oss-security/2021/05/27/1"
}
],
"release_date": "2021-05-26T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T18:06:54+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4356"
},
{
"category": "workaround",
"details": "The default Red Hat Enterprise Linux kernel prevents unprivileged users from being able to use eBPF by the kernel.unprivileged_bpf_disabled sysctl. This would require a privileged user with CAP_SYS_ADMIN or root to be able to abuse this flaw reducing its attack space.\n\nFor the Red Hat Enterprise Linux 7 the eBPF for unprivileged users is always disabled.\nFor the Red Hat Enterprise Linux 8 to confirm the current state, inspect the sysctl with the command:\n\n# cat /proc/sys/kernel/unprivileged_bpf_disabled\n\nThe setting of 1 would mean that unprivileged users can not use eBPF, mitigating the flaw.\n\nA kernel update will be required to mitigate the flaw for the root or users with CAP_SYS_ADMIN capabilities.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: out-of-bounds reads and writes due to enforcing incorrect limits for pointer arithmetic operations by BPF verifier"
},
{
"cve": "CVE-2021-46905",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"discovery_date": "2024-02-27T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2266253"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in the Linux kernel. This flaw occurs due to an unconditional NULL-pointer dereference on every disconnect in the Linux kernel.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: NULL-deref on disconnect regression",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-46905"
},
{
"category": "external",
"summary": "RHBZ#2266253",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2266253"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-46905",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46905"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-46905",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-46905"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024022557-CVE-2021-46905-6507@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024022557-CVE-2021-46905-6507@gregkh/T"
}
],
"release_date": "2024-02-26T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T18:06:54+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4356"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: NULL-deref on disconnect regression"
},
{
"cve": "CVE-2021-46983",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"discovery_date": "2024-02-28T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2266906"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in an error-handling function in the Linux kernel\u0027s NVMe driver. This flaw allows an attacker with control over NVMe links to cause a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: nvmet-rdma: Fix NULL deref when SEND is completed with error",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-46983"
},
{
"category": "external",
"summary": "RHBZ#2266906",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2266906"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-46983",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46983"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-46983",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-46983"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024022824-CVE-2021-46983-f808@gregkh/T/#u",
"url": "https://lore.kernel.org/linux-cve-announce/2024022824-CVE-2021-46983-f808@gregkh/T/#u"
}
],
"release_date": "2024-02-28T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T18:06:54+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4356"
},
{
"category": "workaround",
"details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: nvmet-rdma: Fix NULL deref when SEND is completed with error"
},
{
"cve": "CVE-2021-47080",
"cwe": {
"id": "CWE-369",
"name": "Divide By Zero"
},
"discovery_date": "2024-03-01T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2267533"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nRDMA/core: Prevent divide-by-zero error triggered by the user\n\nThe user_entry_size is supplied by the user and later used as a\ndenominator to calculate number of entries. The zero supplied by the user\nwill trigger the following divide-by-zero error:\n\n divide error: 0000 [#1] SMP KASAN PTI\n CPU: 4 PID: 497 Comm: c_repro Not tainted 5.13.0-rc1+ #281\n Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.13.0-0-gf21b5a4aeb02-prebuilt.qemu.org 04/01/2014\n RIP: 0010:ib_uverbs_handler_UVERBS_METHOD_QUERY_GID_TABLE+0x1b1/0x510\n Code: 87 59 03 00 00 e8 9f ab 1e ff 48 8d bd a8 00 00 00 e8 d3 70 41 ff 44 0f b7 b5 a8 00 00 00 e8 86 ab 1e ff 31 d2 4c 89 f0 31 ff \u003c49\u003e f7 f5 48 89 d6 48 89 54 24 10 48 89 04 24 e8 1b ad 1e ff 48 8b\n RSP: 0018:ffff88810416f828 EFLAGS: 00010246\n RAX: 0000000000000008 RBX: 1ffff1102082df09 RCX: ffffffff82183f3d\n RDX: 0000000000000000 RSI: ffff888105f2da00 RDI: 0000000000000000\n RBP: ffff88810416fa98 R08: 0000000000000001 R09: ffffed102082df5f\n R10: ffff88810416faf7 R11: ffffed102082df5e R12: 0000000000000000\n R13: 0000000000000000 R14: 0000000000000008 R15: ffff88810416faf0\n FS: 00007f5715efa740(0000) GS:ffff88811a700000(0000) knlGS:0000000000000000\n CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n CR2: 0000000020000840 CR3: 000000010c2e0001 CR4: 0000000000370ea0\n DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\n DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\n Call Trace:\n ? ib_uverbs_handler_UVERBS_METHOD_INFO_HANDLES+0x4b0/0x4b0\n ib_uverbs_cmd_verbs+0x1546/0x1940\n ib_uverbs_ioctl+0x186/0x240\n __x64_sys_ioctl+0x38a/0x1220\n do_syscall_64+0x3f/0x80\n entry_SYSCALL_64_after_hwframe+0x44/0xae",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: RDMA/core: Prevent divide-by-zero error triggered by the user",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-47080"
},
{
"category": "external",
"summary": "RHBZ#2267533",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2267533"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-47080",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47080"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-47080",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-47080"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024030142-CVE-2021-47080-eb20@gregkh/T/#u",
"url": "https://lore.kernel.org/linux-cve-announce/2024030142-CVE-2021-47080-eb20@gregkh/T/#u"
}
],
"release_date": "2024-03-01T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T18:06:54+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4356"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: RDMA/core: Prevent divide-by-zero error triggered by the user"
},
{
"cve": "CVE-2022-20166",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2022-08-29T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2122089"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel\u2019s sysfs layer. This flaw allows a local user who can read files under the /sysfs mount point to corrupt memory or possibly crash the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: possible buffer overflow in sysfs reading",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-20166"
},
{
"category": "external",
"summary": "RHBZ#2122089",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2122089"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-20166",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-20166"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-20166",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-20166"
}
],
"release_date": "2022-08-15T14:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T18:06:54+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4356"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options does not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: possible buffer overflow in sysfs reading"
}
]
}
CERTFR-2021-AVI-864
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans le noyau Linux de Red Hat. Certaines d'entre elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur, un déni de service et un contournement de la politique de sécurité.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Power, little endian 8 ppc64le | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for IBM z Systems 8 s390x | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for x86_64 8 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Real Time 8 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for ARM 64 8 aarch64 | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat CodeReady Linux Builder for ARM 64 8 aarch64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Real Time for NFV 8 x86_64 | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat CodeReady Linux Builder for x86_64 8 x86_64 | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat CodeReady Linux Builder for Power, little endian 8 ppc64le | ||
| Red Hat | N/A | Red Hat Virtualization Host 4 for RHEL 8 x86_64 |
| Title | Publication Time | Tags | ||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Red Hat Enterprise Linux for Power, little endian 8 ppc64le",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for IBM z Systems 8 s390x",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for x86_64 8 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for Real Time 8 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for ARM 64 8 aarch64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat CodeReady Linux Builder for ARM 64 8 aarch64",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for Real Time for NFV 8 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat CodeReady Linux Builder for x86_64 8 x86_64",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat CodeReady Linux Builder for Power, little endian 8 ppc64le",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Virtualization Host 4 for RHEL 8 x86_64",
"product": {
"name": "N/A",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2020-29368",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-29368"
},
{
"name": "CVE-2020-26139",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26139"
},
{
"name": "CVE-2021-20239",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20239"
},
{
"name": "CVE-2020-24587",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24587"
},
{
"name": "CVE-2021-3600",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3600"
},
{
"name": "CVE-2020-27777",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27777"
},
{
"name": "CVE-2021-3679",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3679"
},
{
"name": "CVE-2021-31440",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-31440"
},
{
"name": "CVE-2020-29660",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-29660"
},
{
"name": "CVE-2020-26146",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26146"
},
{
"name": "CVE-2020-26143",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26143"
},
{
"name": "CVE-2021-31916",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-31916"
},
{
"name": "CVE-2021-3635",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3635"
},
{
"name": "CVE-2021-3573",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3573"
},
{
"name": "CVE-2020-24504",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24504"
},
{
"name": "CVE-2020-24588",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24588"
},
{
"name": "CVE-2021-28971",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-28971"
},
{
"name": "CVE-2021-23133",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23133"
},
{
"name": "CVE-2020-26140",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26140"
},
{
"name": "CVE-2021-3659",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3659"
},
{
"name": "CVE-2020-24586",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24586"
},
{
"name": "CVE-2020-24502",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24502"
},
{
"name": "CVE-2021-0129",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0129"
},
{
"name": "CVE-2020-36158",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36158"
},
{
"name": "CVE-2020-36386",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36386"
},
{
"name": "CVE-2020-26144",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26144"
},
{
"name": "CVE-2021-28950",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-28950"
},
{
"name": "CVE-2021-29650",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29650"
},
{
"name": "CVE-2021-3564",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3564"
},
{
"name": "CVE-2021-3489",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3489"
},
{
"name": "CVE-2020-24503",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24503"
},
{
"name": "CVE-2021-3348",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3348"
},
{
"name": "CVE-2021-20194",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20194"
},
{
"name": "CVE-2020-26147",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26147"
},
{
"name": "CVE-2021-3732",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3732"
},
{
"name": "CVE-2021-29155",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29155"
},
{
"name": "CVE-2020-26141",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26141"
},
{
"name": "CVE-2021-33200",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33200"
},
{
"name": "CVE-2021-31829",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-31829"
},
{
"name": "CVE-2020-0427",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0427"
},
{
"name": "CVE-2021-29646",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29646"
},
{
"name": "CVE-2020-26145",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26145"
}
],
"initial_release_date": "2021-11-12T00:00:00",
"last_revision_date": "2021-11-12T00:00:00",
"links": [],
"reference": "CERTFR-2021-AVI-864",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2021-11-12T00:00:00.000000"
}
],
"risks": [
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux de\nRed Hat. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer\nun probl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur, un d\u00e9ni de service\net un contournement de la politique de s\u00e9curit\u00e9.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de Red Hat",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Red Hat RHSA-2021:4356 du 10 novembre 2021",
"url": "https://access.redhat.com/errata/RHSA-2021:4356"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Red Hat RHSA-2021:4140 du 09 novembre 2021",
"url": "https://access.redhat.com/errata/RHSA-2021:4140"
}
]
}
CERTFR-2021-AVI-535
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans le noyau Linux de SUSE. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire, un contournement de la politique de sécurité et une atteinte à l'intégrité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| SUSE | N/A | SUSE Linux Enterprise Module for Basesystem 15-SP2 | ||
| SUSE | N/A | SUSE Linux Enterprise High Availability 15-SP3 | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Live Patching 15-SP3 | ||
| SUSE | N/A | SUSE Linux Enterprise Debuginfo 11-SP4 | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Basesystem 15-SP3 | ||
| SUSE | N/A | SUSE Linux Enterprise High Availability 12-SP5 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 11-SP4-LTSS | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Development Tools 15-SP3 | ||
| SUSE | SUSE Linux Enterprise Live Patching | SUSE Linux Enterprise Live Patching 12-SP5 | ||
| SUSE | SUSE Linux Enterprise Real Time | SUSE Linux Enterprise Real Time Extension 12-SP5 | ||
| SUSE | N/A | SUSE Linux Enterprise Software Development Kit 12-SP5 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 12-SP5 | ||
| SUSE | N/A | SUSE MicroOS 5.0 | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Live Patching 15-SP1 | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Legacy Software 15-SP2 | ||
| SUSE | N/A | SUSE Linux Enterprise Workstation Extension 15-SP3 | ||
| SUSE | N/A | SUSE Linux Enterprise High Availability 15-SP2 | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Development Tools 15-SP2 | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Live Patching 15 | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Legacy Software 15-SP3 | ||
| SUSE | N/A | SUSE Linux Enterprise Workstation Extension 15-SP2 | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Public Cloud 15-SP2 | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Live Patching 15-SP2 | ||
| SUSE | SUSE Linux Enterprise Live Patching | SUSE Linux Enterprise Live Patching 12-SP4 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 11-EXTRA | ||
| SUSE | N/A | SUSE Linux Enterprise Workstation Extension 12-SP5 |
| Title | Publication Time | Tags | ||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "SUSE Linux Enterprise Module for Basesystem 15-SP2",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Availability 15-SP3",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module for Live Patching 15-SP3",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Debuginfo 11-SP4",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module for Basesystem 15-SP3",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Availability 12-SP5",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 11-SP4-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module for Development Tools 15-SP3",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Live Patching 12-SP5",
"product": {
"name": "SUSE Linux Enterprise Live Patching",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Real Time Extension 12-SP5",
"product": {
"name": "SUSE Linux Enterprise Real Time",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Software Development Kit 12-SP5",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 12-SP5",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE MicroOS 5.0",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module for Live Patching 15-SP1",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module for Legacy Software 15-SP2",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Workstation Extension 15-SP3",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Availability 15-SP2",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module for Development Tools 15-SP2",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module for Live Patching 15",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module for Legacy Software 15-SP3",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Workstation Extension 15-SP2",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module for Public Cloud 15-SP2",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module for Live Patching 15-SP2",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Live Patching 12-SP4",
"product": {
"name": "SUSE Linux Enterprise Live Patching",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 11-EXTRA",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Workstation Extension 12-SP5",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2020-26139",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26139"
},
{
"name": "CVE-2020-24587",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24587"
},
{
"name": "CVE-2021-34693",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-34693"
},
{
"name": "CVE-2021-29154",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29154"
},
{
"name": "CVE-2020-36385",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36385"
},
{
"name": "CVE-2021-0605",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0605"
},
{
"name": "CVE-2021-3573",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3573"
},
{
"name": "CVE-2020-24588",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24588"
},
{
"name": "CVE-2021-23133",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23133"
},
{
"name": "CVE-2019-25045",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-25045"
},
{
"name": "CVE-2020-24586",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24586"
},
{
"name": "CVE-2021-0129",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0129"
},
{
"name": "CVE-2020-36386",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36386"
},
{
"name": "CVE-2021-0512",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0512"
},
{
"name": "CVE-2020-26558",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26558"
},
{
"name": "CVE-2021-33624",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33624"
},
{
"name": "CVE-2021-32399",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32399"
}
],
"initial_release_date": "2021-07-16T00:00:00",
"last_revision_date": "2021-07-16T00:00:00",
"links": [],
"reference": "CERTFR-2021-AVI-535",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2021-07-16T00:00:00.000000"
}
],
"risks": [
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Ex\u00e9cution de code arbitraire"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux de\nSUSE. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une\nex\u00e9cution de code arbitraire, un contournement de la politique de\ns\u00e9curit\u00e9 et une atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de SUSE",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20212324-1 du 14 juillet 2021",
"url": "https://www.suse.com/support/update/announcement/2021/suse-su-20212324-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20212349-1 du 14 juillet 2021",
"url": "https://www.suse.com/support/update/announcement/2021/suse-su-20212349-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20212361-1 du 15 juillet 2021",
"url": "https://www.suse.com/support/update/announcement/2021/suse-su-20212361-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20212344-1 du 14 juillet 2021",
"url": "https://www.suse.com/support/update/announcement/2021/suse-su-20212344-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20212367-1 du 15 juillet 2021",
"url": "https://www.suse.com/support/update/announcement/2021/suse-su-20212367-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20212352-1 du 15 juillet 2021",
"url": "https://www.suse.com/support/update/announcement/2021/suse-su-20212352-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20212372-1 du 15 juillet 2021",
"url": "https://www.suse.com/support/update/announcement/2021/suse-su-20212372-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20212325-1 du 14 juillet 2021",
"url": "https://www.suse.com/support/update/announcement/2021/suse-su-20212325-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20212366-1 du 15 juillet 2021",
"url": "https://www.suse.com/support/update/announcement/2021/suse-su-20212366-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20212368-1 du 15 juillet 2021",
"url": "https://www.suse.com/support/update/announcement/2021/suse-su-20212368-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20212332-1 du 14 juillet 2021",
"url": "https://www.suse.com/support/update/announcement/2021/suse-su-20212332-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20212303-1 du 13 juillet 2021",
"url": "https://www.suse.com/support/update/announcement/2021/suse-su-20212303-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-202114764-1 du 13 juillet 2021",
"url": "https://www.suse.com/support/update/announcement/2021/suse-su-202114764-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20212321-1 du 14 juillet 2021",
"url": "https://www.suse.com/support/update/announcement/2021/suse-su-20212321-1/"
}
]
}
CERTFR-2021-AVI-570
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans le noyau Linux de SUSE. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire, un déni de service, une atteinte à l'intégrité des données et une atteinte à la confidentialité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 12-SP3-BCL | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 12-SP3-LTSS | ||
| SUSE | SUSE Linux Enterprise Live Patching | SUSE Linux Enterprise Live Patching 12-SP5 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server for SAP 12-SP3 | ||
| SUSE | N/A | HPE Helion Openstack 8 | ||
| SUSE | N/A | SUSE OpenStack Cloud 8 | ||
| SUSE | N/A | SUSE OpenStack Cloud Crowbar 8 | ||
| SUSE | N/A | SUSE Linux Enterprise High Availability 12-SP3 |
| Title | Publication Time | Tags | ||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "SUSE Linux Enterprise Server 12-SP3-BCL",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 12-SP3-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Live Patching 12-SP5",
"product": {
"name": "SUSE Linux Enterprise Live Patching",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP 12-SP3",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "HPE Helion Openstack 8",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE OpenStack Cloud 8",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE OpenStack Cloud Crowbar 8",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Availability 12-SP3",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2020-26139",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26139"
},
{
"name": "CVE-2020-24587",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24587"
},
{
"name": "CVE-2021-33034",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33034"
},
{
"name": "CVE-2021-34693",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-34693"
},
{
"name": "CVE-2020-36385",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36385"
},
{
"name": "CVE-2021-0605",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0605"
},
{
"name": "CVE-2020-24588",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24588"
},
{
"name": "CVE-2021-23133",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23133"
},
{
"name": "CVE-2020-24586",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24586"
},
{
"name": "CVE-2021-0129",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0129"
},
{
"name": "CVE-2020-36386",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36386"
},
{
"name": "CVE-2021-3609",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3609"
},
{
"name": "CVE-2021-0512",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0512"
},
{
"name": "CVE-2021-33909",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33909"
},
{
"name": "CVE-2020-26558",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26558"
},
{
"name": "CVE-2021-22555",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22555"
},
{
"name": "CVE-2020-26147",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26147"
},
{
"name": "CVE-2020-26141",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26141"
},
{
"name": "CVE-2021-23134",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23134"
},
{
"name": "CVE-2021-32399",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32399"
},
{
"name": "CVE-2020-26145",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26145"
}
],
"initial_release_date": "2021-07-23T00:00:00",
"last_revision_date": "2021-07-23T00:00:00",
"links": [],
"reference": "CERTFR-2021-AVI-570",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2021-07-23T00:00:00.000000"
}
],
"risks": [
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Ex\u00e9cution de code arbitraire"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux de\nSUSE. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une\nex\u00e9cution de code arbitraire, un d\u00e9ni de service, une atteinte \u00e0\nl\u0027int\u00e9grit\u00e9 des donn\u00e9es et une atteinte \u00e0 la confidentialit\u00e9 des\ndonn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de SUSE",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20212453-1 du 22 juillet 2021",
"url": "https://www.suse.com/support/update/announcement/2021/suse-su-20212453-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20212451-1 du 22 juillet 2021",
"url": "https://www.suse.com/support/update/announcement/2021/suse-su-20212451-1/"
}
]
}
CERTFR-2021-AVI-552
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans le noyau Linux d'Ubuntu. Elles permettent à un attaquant de provoquer une exécution de code arbitraire, un déni de service et une atteinte à la confidentialité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | |||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Ubuntu 16.04 ESM",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 18.04 LTS",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 21.04",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 20.04 LTS",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 14.04 ESM",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2020-26139",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26139"
},
{
"name": "CVE-2020-24587",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24587"
},
{
"name": "CVE-2021-33034",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33034"
},
{
"name": "CVE-2021-3587",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3587"
},
{
"name": "CVE-2021-3573",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3573"
},
{
"name": "CVE-2021-3506",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3506"
},
{
"name": "CVE-2020-24586",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24586"
},
{
"name": "CVE-2021-0129",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0129"
},
{
"name": "CVE-2021-33909",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33909"
},
{
"name": "CVE-2021-3564",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3564"
},
{
"name": "CVE-2020-26558",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26558"
},
{
"name": "CVE-2020-26147",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26147"
},
{
"name": "CVE-2021-23134",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23134"
},
{
"name": "CVE-2021-32399",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32399"
},
{
"name": "CVE-2021-33200",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33200"
},
{
"name": "CVE-2021-31829",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-31829"
},
{
"name": "CVE-2021-28691",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-28691"
}
],
"initial_release_date": "2021-07-21T00:00:00",
"last_revision_date": "2021-07-21T00:00:00",
"links": [],
"reference": "CERTFR-2021-AVI-552",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2021-07-21T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux\nd\u0027Ubuntu. Elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de\ncode arbitraire, un d\u00e9ni de service et une atteinte \u00e0 la confidentialit\u00e9\ndes donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux d\u0027Ubuntu",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-5014-1 du 20 juillet 2021",
"url": "https://ubuntu.com/security/notices/USN-5014-1"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-5016-1 du 20 juillet 2021",
"url": "https://ubuntu.com/security/notices/USN-5016-1"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-5017-1 du 20 juillet 2021",
"url": "https://ubuntu.com/security/notices/USN-5017-1"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-5018-1 du 20 juillet 2021",
"url": "https://ubuntu.com/security/notices/USN-5018-1"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-5015-1 du 20 juillet 2021",
"url": "https://ubuntu.com/security/notices/USN-5015-1"
}
]
}
CERTFR-2024-AVI-0717
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans le noyau Linux de SUSE. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une élévation de privilèges et un déni de service à distance.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| SUSE | N/A | SUSE Linux Enterprise Micro for Rancher 5.3 | ||
| SUSE | N/A | SUSE Linux Enterprise High Performance Computing 15 SP5 | ||
| SUSE | N/A | SUSE Manager Proxy 4.2 | ||
| SUSE | N/A | SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 | ||
| SUSE | N/A | SUSE Linux Enterprise Server for SAP Applications 15 SP2 | ||
| SUSE | N/A | SUSE Linux Enterprise Micro 5.3 | ||
| SUSE | N/A | SUSE Manager Proxy 4.3 | ||
| SUSE | N/A | SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 | ||
| SUSE | N/A | SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 | ||
| SUSE | N/A | SUSE Linux Enterprise Micro for Rancher 5.2 | ||
| SUSE | N/A | SUSE Real Time Module 15-SP6 | ||
| SUSE | N/A | SUSE Linux Enterprise High Performance Computing 12 SP5 | ||
| SUSE | N/A | Public Cloud Module 15-SP5 | ||
| SUSE | N/A | SUSE Linux Enterprise Server 12 SP5 | ||
| SUSE | N/A | SUSE Linux Enterprise Micro for Rancher 5.4 | ||
| SUSE | N/A | SUSE Manager Retail Branch Server 4.3 | ||
| SUSE | N/A | SUSE Linux Enterprise Live Patching 15-SP3 | ||
| SUSE | N/A | openSUSE Leap 15.4 | ||
| SUSE | N/A | SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 | ||
| SUSE | N/A | SUSE Linux Enterprise Server for SAP Applications 15 SP4 | ||
| SUSE | N/A | SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 | ||
| SUSE | N/A | openSUSE Leap 15.5 | ||
| SUSE | N/A | SUSE Manager Server 4.3 | ||
| SUSE | N/A | SUSE Linux Enterprise High Availability Extension 12 SP5 | ||
| SUSE | N/A | SUSE Linux Enterprise High Performance Computing 15 SP4 | ||
| SUSE | N/A | SUSE Linux Enterprise High Performance Computing 15 SP2 | ||
| SUSE | N/A | SUSE Linux Enterprise High Availability Extension 15 SP3 | ||
| SUSE | N/A | SUSE Linux Enterprise Live Patching 15-SP6 | ||
| SUSE | N/A | SUSE Linux Enterprise Server 15 SP5 | ||
| SUSE | N/A | SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 | ||
| SUSE | N/A | SUSE Linux Enterprise Server for SAP Applications 15 SP5 | ||
| SUSE | N/A | SUSE Linux Enterprise Live Patching 12-SP5 | ||
| SUSE | N/A | SUSE Linux Enterprise Workstation Extension 12 12-SP5 | ||
| SUSE | N/A | SUSE Manager Retail Branch Server 4.2 | ||
| SUSE | N/A | SUSE Linux Enterprise Server 15 SP3 | ||
| SUSE | N/A | SUSE Linux Enterprise Micro 5.2 | ||
| SUSE | N/A | SUSE Linux Enterprise Real Time 15 SP6 | ||
| SUSE | N/A | openSUSE Leap 15.6 | ||
| SUSE | N/A | SUSE Enterprise Storage 7.1 | ||
| SUSE | N/A | SUSE Linux Enterprise Server 15 SP4 | ||
| SUSE | N/A | SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 | ||
| SUSE | N/A | SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 | ||
| SUSE | N/A | SUSE Linux Enterprise Server 15 SP3 Business Critical Linux 15-SP3 | ||
| SUSE | N/A | SUSE Linux Enterprise Software Development Kit 12 SP5 | ||
| SUSE | N/A | SUSE Manager Server 4.2 | ||
| SUSE | N/A | SUSE Linux Enterprise High Performance Computing 15 SP3 | ||
| SUSE | N/A | SUSE Linux Enterprise Server for SAP Applications 15 SP3 | ||
| SUSE | N/A | SUSE Linux Enterprise Server for SAP Applications 12 SP5 | ||
| SUSE | N/A | SUSE Linux Enterprise Micro 5.1 | ||
| SUSE | N/A | SUSE Linux Enterprise Micro 5.4 | ||
| SUSE | N/A | openSUSE Leap 15.3 | ||
| SUSE | N/A | SUSE Linux Enterprise Server 15 SP2 | ||
| SUSE | N/A | SUSE Linux Enterprise Server for SAP Applications 15 SP6 | ||
| SUSE | N/A | SUSE Linux Enterprise Server 15 SP6 |
| Title | Publication Time | Tags | |||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "SUSE Linux Enterprise Micro for Rancher 5.3",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Performance Computing 15 SP5",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Manager Proxy 4.2",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP Applications 15 SP2",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Micro 5.3",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Manager Proxy 4.3",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Performance Computing LTSS 15 SP3",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Micro for Rancher 5.2",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Real Time Module 15-SP6",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Performance Computing 12 SP5",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "Public Cloud Module 15-SP5",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 12 SP5",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Micro for Rancher 5.4",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Manager Retail Branch Server 4.3",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Live Patching 15-SP3",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "openSUSE Leap 15.4",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "openSUSE Leap 15.5",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Manager Server 4.3",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Availability Extension 12 SP5",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Performance Computing 15 SP4",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Performance Computing 15 SP2",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Availability Extension 15 SP3",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Live Patching 15-SP6",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 15 SP5",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Live Patching 12-SP5",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Workstation Extension 12 12-SP5",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Manager Retail Branch Server 4.2",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 15 SP3",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Micro 5.2",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Real Time 15 SP6",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "openSUSE Leap 15.6",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Enterprise Storage 7.1",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 15 SP4",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Performance Computing LTSS 15 SP4",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 15 SP3 Business Critical Linux 15-SP3",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Software Development Kit 12 SP5",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Manager Server 4.2",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Performance Computing 15 SP3",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Micro 5.1",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Micro 5.4",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "openSUSE Leap 15.3",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 15 SP2",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 15 SP6",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2020-26558",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26558"
},
{
"name": "CVE-2021-0129",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0129"
},
{
"name": "CVE-2022-20368",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-20368"
},
{
"name": "CVE-2022-2964",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2964"
},
{
"name": "CVE-2022-28748",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28748"
},
{
"name": "CVE-2023-1582",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1582"
},
{
"name": "CVE-2023-37453",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-37453"
},
{
"name": "CVE-2023-0160",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0160"
},
{
"name": "CVE-2023-51780",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-51780"
},
{
"name": "CVE-2023-52458",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52458"
},
{
"name": "CVE-2024-26625",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26625"
},
{
"name": "CVE-2023-52594",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52594"
},
{
"name": "CVE-2024-26601",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26601"
},
{
"name": "CVE-2024-26585",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26585"
},
{
"name": "CVE-2024-26633",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26633"
},
{
"name": "CVE-2023-52435",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52435"
},
{
"name": "CVE-2023-52612",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52612"
},
{
"name": "CVE-2023-52591",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52591"
},
{
"name": "CVE-2024-26642",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26642"
},
{
"name": "CVE-2024-26654",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26654"
},
{
"name": "CVE-2023-52615",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52615"
},
{
"name": "CVE-2024-26659",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26659"
},
{
"name": "CVE-2024-26614",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26614"
},
{
"name": "CVE-2024-25739",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25739"
},
{
"name": "CVE-2024-22099",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22099"
},
{
"name": "CVE-2023-52623",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52623"
},
{
"name": "CVE-2023-52619",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52619"
},
{
"name": "CVE-2023-7042",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-7042"
},
{
"name": "CVE-2024-26584",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26584"
},
{
"name": "CVE-2024-26800",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26800"
},
{
"name": "CVE-2024-26769",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26769"
},
{
"name": "CVE-2024-26775",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26775"
},
{
"name": "CVE-2024-26704",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26704"
},
{
"name": "CVE-2023-52622",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52622"
},
{
"name": "CVE-2024-26671",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26671"
},
{
"name": "CVE-2024-26814",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26814"
},
{
"name": "CVE-2024-26685",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26685"
},
{
"name": "CVE-2024-26583",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26583"
},
{
"name": "CVE-2024-26737",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26737"
},
{
"name": "CVE-2024-26663",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26663"
},
{
"name": "CVE-2024-26805",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26805"
},
{
"name": "CVE-2024-26773",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26773"
},
{
"name": "CVE-2023-52618",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52618"
},
{
"name": "CVE-2023-52631",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52631"
},
{
"name": "CVE-2024-26793",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26793"
},
{
"name": "CVE-2023-52616",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52616"
},
{
"name": "CVE-2024-26750",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26750"
},
{
"name": "CVE-2024-26813",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26813"
},
{
"name": "CVE-2024-26764",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26764"
},
{
"name": "CVE-2024-27437",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27437"
},
{
"name": "CVE-2024-26735",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26735"
},
{
"name": "CVE-2024-26684",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26684"
},
{
"name": "CVE-2024-26679",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26679"
},
{
"name": "CVE-2024-26816",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26816"
},
{
"name": "CVE-2024-26726",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26726"
},
{
"name": "CVE-2023-52640",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52640"
},
{
"name": "CVE-2024-26676",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26676"
},
{
"name": "CVE-2024-26802",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26802"
},
{
"name": "CVE-2024-26760",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26760"
},
{
"name": "CVE-2024-26733",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26733"
},
{
"name": "CVE-2024-26815",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26815"
},
{
"name": "CVE-2023-52641",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52641"
},
{
"name": "CVE-2024-26772",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26772"
},
{
"name": "CVE-2024-26791",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26791"
},
{
"name": "CVE-2023-52635",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52635"
},
{
"name": "CVE-2024-26774",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26774"
},
{
"name": "CVE-2024-26643",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26643"
},
{
"name": "CVE-2024-26665",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26665"
},
{
"name": "CVE-2024-26714",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26714"
},
{
"name": "CVE-2024-26761",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26761"
},
{
"name": "CVE-2024-26673",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26673"
},
{
"name": "CVE-2024-26780",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26780"
},
{
"name": "CVE-2024-26731",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26731"
},
{
"name": "CVE-2024-26742",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26742"
},
{
"name": "CVE-2024-26641",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26641"
},
{
"name": "CVE-2024-0639",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0639"
},
{
"name": "CVE-2024-26807",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26807"
},
{
"name": "CVE-2023-52503",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52503"
},
{
"name": "CVE-2023-52580",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52580"
},
{
"name": "CVE-2024-27393",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27393"
},
{
"name": "CVE-2024-26870",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26870"
},
{
"name": "CVE-2024-26863",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26863"
},
{
"name": "CVE-2024-27025",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27025"
},
{
"name": "CVE-2024-26845",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26845"
},
{
"name": "CVE-2024-27028",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27028"
},
{
"name": "CVE-2024-26861",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26861"
},
{
"name": "CVE-2024-26961",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26961"
},
{
"name": "CVE-2024-26978",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26978"
},
{
"name": "CVE-2024-27013",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27013"
},
{
"name": "CVE-2024-26989",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26989"
},
{
"name": "CVE-2024-26615",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26615"
},
{
"name": "CVE-2024-26846",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26846"
},
{
"name": "CVE-2024-26958",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26958"
},
{
"name": "CVE-2024-27008",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27008"
},
{
"name": "CVE-2024-26906",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26906"
},
{
"name": "CVE-2024-26925",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26925"
},
{
"name": "CVE-2024-26934",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26934"
},
{
"name": "CVE-2024-26957",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26957"
},
{
"name": "CVE-2024-26981",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26981"
},
{
"name": "CVE-2024-26889",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26889"
},
{
"name": "CVE-2024-27000",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27000"
},
{
"name": "CVE-2024-27388",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27388"
},
{
"name": "CVE-2024-27003",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27003"
},
{
"name": "CVE-2024-26883",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26883"
},
{
"name": "CVE-2024-26935",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26935"
},
{
"name": "CVE-2024-26882",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26882"
},
{
"name": "CVE-2024-27015",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27015"
},
{
"name": "CVE-2024-26984",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26984"
},
{
"name": "CVE-2024-27020",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27020"
},
{
"name": "CVE-2024-26973",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26973"
},
{
"name": "CVE-2024-26960",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26960"
},
{
"name": "CVE-2024-26996",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26996"
},
{
"name": "CVE-2024-26635",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26635"
},
{
"name": "CVE-2024-26950",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26950"
},
{
"name": "CVE-2024-26999",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26999"
},
{
"name": "CVE-2024-26924",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26924"
},
{
"name": "CVE-2024-24861",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24861"
},
{
"name": "CVE-2024-27004",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27004"
},
{
"name": "CVE-2024-27002",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27002"
},
{
"name": "CVE-2024-26920",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26920"
},
{
"name": "CVE-2024-27016",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27016"
},
{
"name": "CVE-2024-26857",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26857"
},
{
"name": "CVE-2024-27001",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27001"
},
{
"name": "CVE-2024-26885",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26885"
},
{
"name": "CVE-2024-26878",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26878"
},
{
"name": "CVE-2024-26976",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26976"
},
{
"name": "CVE-2024-26983",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26983"
},
{
"name": "CVE-2024-26994",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26994"
},
{
"name": "CVE-2024-26636",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26636"
},
{
"name": "CVE-2024-26937",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26937"
},
{
"name": "CVE-2024-27030",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27030"
},
{
"name": "CVE-2024-27065",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27065"
},
{
"name": "CVE-2024-26997",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26997"
},
{
"name": "CVE-2024-26922",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26922"
},
{
"name": "CVE-2024-26884",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26884"
},
{
"name": "CVE-2024-27014",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27014"
},
{
"name": "CVE-2024-26862",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26862"
},
{
"name": "CVE-2024-26901",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26901"
},
{
"name": "CVE-2024-26992",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26992"
},
{
"name": "CVE-2024-27046",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27046"
},
{
"name": "CVE-2024-26903",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26903"
},
{
"name": "CVE-2024-26993",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26993"
},
{
"name": "CVE-2024-26951",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26951"
},
{
"name": "CVE-2024-26855",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26855"
},
{
"name": "CVE-2024-27019",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27019"
},
{
"name": "CVE-2024-26923",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26923"
},
{
"name": "CVE-2024-27022",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27022"
},
{
"name": "CVE-2024-26988",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26988"
},
{
"name": "CVE-2024-26650",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26650"
},
{
"name": "CVE-2024-26638",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26638"
},
{
"name": "CVE-2024-26826",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26826"
},
{
"name": "CVE-2024-26623",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26623"
},
{
"name": "CVE-2024-26632",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26632"
},
{
"name": "CVE-2023-52472",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52472"
},
{
"name": "CVE-2023-38417",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38417"
},
{
"name": "CVE-2023-47210",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47210"
},
{
"name": "CVE-2024-21823",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21823"
},
{
"name": "CVE-2024-27062",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27062"
},
{
"name": "CVE-2021-47219",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47219"
},
{
"name": "CVE-2024-26866",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26866"
},
{
"name": "CVE-2021-47197",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47197"
},
{
"name": "CVE-2024-26856",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26856"
},
{
"name": "CVE-2024-26881",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26881"
},
{
"name": "CVE-2023-52652",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52652"
},
{
"name": "CVE-2024-27389",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27389"
},
{
"name": "CVE-2024-26982",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26982"
},
{
"name": "CVE-2024-26972",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26972"
},
{
"name": "CVE-2024-26830",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26830"
},
{
"name": "CVE-2024-27056",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27056"
},
{
"name": "CVE-2023-52645",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52645"
},
{
"name": "CVE-2024-26836",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26836"
},
{
"name": "CVE-2024-26933",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26933"
},
{
"name": "CVE-2023-52653",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52653"
},
{
"name": "CVE-2024-26739",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26739"
},
{
"name": "CVE-2024-23848",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-23848"
},
{
"name": "CVE-2024-26783",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26783"
},
{
"name": "CVE-2024-26948",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26948"
},
{
"name": "CVE-2024-26853",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26853"
},
{
"name": "CVE-2021-47194",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47194"
},
{
"name": "CVE-2021-47191",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47191"
},
{
"name": "CVE-2024-26656",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26656"
},
{
"name": "CVE-2024-26964",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26964"
},
{
"name": "CVE-2023-52882",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52882"
},
{
"name": "CVE-2024-26900",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26900"
},
{
"name": "CVE-2024-27399",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27399"
},
{
"name": "CVE-2024-27401",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27401"
},
{
"name": "CVE-2024-35848",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35848"
},
{
"name": "CVE-2024-35947",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35947"
},
{
"name": "CVE-2024-36017",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36017"
},
{
"name": "CVE-2024-36889",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36889"
},
{
"name": "CVE-2024-36902",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36902"
},
{
"name": "CVE-2024-36904",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36904"
},
{
"name": "CVE-2024-36916",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36916"
},
{
"name": "CVE-2024-36919",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36919"
},
{
"name": "CVE-2024-36934",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36934"
},
{
"name": "CVE-2024-36939",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36939"
},
{
"name": "CVE-2024-36940",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36940"
},
{
"name": "CVE-2024-36941",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36941"
},
{
"name": "CVE-2024-36946",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36946"
},
{
"name": "CVE-2024-36950",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36950"
},
{
"name": "CVE-2024-36957",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36957"
},
{
"name": "CVE-2024-36959",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36959"
},
{
"name": "CVE-2021-47388",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47388"
},
{
"name": "CVE-2021-47395",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47395"
},
{
"name": "CVE-2021-47399",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47399"
},
{
"name": "CVE-2021-47402",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47402"
},
{
"name": "CVE-2021-47403",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47403"
},
{
"name": "CVE-2021-47405",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47405"
},
{
"name": "CVE-2021-47438",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47438"
},
{
"name": "CVE-2021-47441",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47441"
},
{
"name": "CVE-2021-47468",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47468"
},
{
"name": "CVE-2021-47501",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47501"
},
{
"name": "CVE-2021-47506",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47506"
},
{
"name": "CVE-2021-47516",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47516"
},
{
"name": "CVE-2021-47520",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47520"
},
{
"name": "CVE-2021-47542",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47542"
},
{
"name": "CVE-2021-47559",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47559"
},
{
"name": "CVE-2023-52656",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52656"
},
{
"name": "CVE-2023-52657",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52657"
},
{
"name": "CVE-2023-52659",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52659"
},
{
"name": "CVE-2023-52660",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52660"
},
{
"name": "CVE-2023-52661",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52661"
},
{
"name": "CVE-2023-52662",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52662"
},
{
"name": "CVE-2023-52664",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52664"
},
{
"name": "CVE-2023-52669",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52669"
},
{
"name": "CVE-2023-52671",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52671"
},
{
"name": "CVE-2023-52674",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52674"
},
{
"name": "CVE-2023-52676",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52676"
},
{
"name": "CVE-2023-52678",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52678"
},
{
"name": "CVE-2023-52679",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52679"
},
{
"name": "CVE-2023-52680",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52680"
},
{
"name": "CVE-2023-52683",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52683"
},
{
"name": "CVE-2023-52685",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52685"
},
{
"name": "CVE-2023-52686",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52686"
},
{
"name": "CVE-2023-52690",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52690"
},
{
"name": "CVE-2023-52691",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52691"
},
{
"name": "CVE-2023-52692",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52692"
},
{
"name": "CVE-2023-52693",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52693"
},
{
"name": "CVE-2023-52694",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52694"
},
{
"name": "CVE-2023-52696",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52696"
},
{
"name": "CVE-2023-52698",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52698"
},
{
"name": "CVE-2023-52699",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52699"
},
{
"name": "CVE-2023-52743",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52743"
},
{
"name": "CVE-2023-52753",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52753"
},
{
"name": "CVE-2023-52754",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52754"
},
{
"name": "CVE-2023-52757",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52757"
},
{
"name": "CVE-2023-52759",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52759"
},
{
"name": "CVE-2023-52763",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52763"
},
{
"name": "CVE-2023-52764",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52764"
},
{
"name": "CVE-2023-52766",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52766"
},
{
"name": "CVE-2023-52773",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52773"
},
{
"name": "CVE-2023-52774",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52774"
},
{
"name": "CVE-2023-52777",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52777"
},
{
"name": "CVE-2023-52781",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52781"
},
{
"name": "CVE-2023-52788",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52788"
},
{
"name": "CVE-2023-52789",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52789"
},
{
"name": "CVE-2023-52791",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52791"
},
{
"name": "CVE-2023-52795",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52795"
},
{
"name": "CVE-2023-52796",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52796"
},
{
"name": "CVE-2023-52798",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52798"
},
{
"name": "CVE-2023-52799",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52799"
},
{
"name": "CVE-2023-52800",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52800"
},
{
"name": "CVE-2023-52803",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52803"
},
{
"name": "CVE-2023-52804",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52804"
},
{
"name": "CVE-2023-52805",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52805"
},
{
"name": "CVE-2023-52806",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52806"
},
{
"name": "CVE-2023-52807",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52807"
},
{
"name": "CVE-2023-52808",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52808"
},
{
"name": "CVE-2023-52809",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52809"
},
{
"name": "CVE-2023-52810",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52810"
},
{
"name": "CVE-2023-52811",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52811"
},
{
"name": "CVE-2023-52814",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52814"
},
{
"name": "CVE-2023-52815",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52815"
},
{
"name": "CVE-2023-52816",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52816"
},
{
"name": "CVE-2023-52817",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52817"
},
{
"name": "CVE-2023-52818",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52818"
},
{
"name": "CVE-2023-52819",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52819"
},
{
"name": "CVE-2023-52821",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52821"
},
{
"name": "CVE-2023-52825",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52825"
},
{
"name": "CVE-2023-52826",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52826"
},
{
"name": "CVE-2023-52832",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52832"
},
{
"name": "CVE-2023-52833",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52833"
},
{
"name": "CVE-2023-52834",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52834"
},
{
"name": "CVE-2023-52838",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52838"
},
{
"name": "CVE-2023-52840",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52840"
},
{
"name": "CVE-2023-52841",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52841"
},
{
"name": "CVE-2023-52844",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52844"
},
{
"name": "CVE-2023-52847",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52847"
},
{
"name": "CVE-2023-52851",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52851"
},
{
"name": "CVE-2023-52853",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52853"
},
{
"name": "CVE-2023-52854",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52854"
},
{
"name": "CVE-2023-52855",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52855"
},
{
"name": "CVE-2023-52856",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52856"
},
{
"name": "CVE-2023-52858",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52858"
},
{
"name": "CVE-2023-52860",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52860"
},
{
"name": "CVE-2023-52861",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52861"
},
{
"name": "CVE-2023-52864",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52864"
},
{
"name": "CVE-2023-52865",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52865"
},
{
"name": "CVE-2023-52867",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52867"
},
{
"name": "CVE-2023-52868",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52868"
},
{
"name": "CVE-2023-52870",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52870"
},
{
"name": "CVE-2023-52871",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52871"
},
{
"name": "CVE-2023-52872",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52872"
},
{
"name": "CVE-2023-52873",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52873"
},
{
"name": "CVE-2023-52875",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52875"
},
{
"name": "CVE-2023-52876",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52876"
},
{
"name": "CVE-2023-52877",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52877"
},
{
"name": "CVE-2023-52878",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52878"
},
{
"name": "CVE-2023-52880",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52880"
},
{
"name": "CVE-2024-26758",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26758"
},
{
"name": "CVE-2024-26822",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26822"
},
{
"name": "CVE-2024-26921",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26921"
},
{
"name": "CVE-2024-26928",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26928"
},
{
"name": "CVE-2024-269355",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-269355"
},
{
"name": "CVE-2024-26938",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26938"
},
{
"name": "CVE-2024-26940",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26940"
},
{
"name": "CVE-2024-26943",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26943"
},
{
"name": "CVE-2024-27395",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27395"
},
{
"name": "CVE-2024-27396",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27396"
},
{
"name": "CVE-2024-27400",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27400"
},
{
"name": "CVE-2024-27405",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27405"
},
{
"name": "CVE-2024-27410",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27410"
},
{
"name": "CVE-2024-27412",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27412"
},
{
"name": "CVE-2024-27413",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27413"
},
{
"name": "CVE-2024-27416",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27416"
},
{
"name": "CVE-2024-27417",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27417"
},
{
"name": "CVE-2024-27419",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27419"
},
{
"name": "CVE-2024-27431",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27431"
},
{
"name": "CVE-2024-27435",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27435"
},
{
"name": "CVE-2024-27436",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27436"
},
{
"name": "CVE-2024-35789",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35789"
},
{
"name": "CVE-2024-35791",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35791"
},
{
"name": "CVE-2024-35796",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35796"
},
{
"name": "CVE-2024-35799",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35799"
},
{
"name": "CVE-2024-35801",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35801"
},
{
"name": "CVE-2024-35804",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35804"
},
{
"name": "CVE-2024-35806",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35806"
},
{
"name": "CVE-2024-35809",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35809"
},
{
"name": "CVE-2024-35811",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35811"
},
{
"name": "CVE-2024-35812",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35812"
},
{
"name": "CVE-2024-35813",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35813"
},
{
"name": "CVE-2024-35815",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35815"
},
{
"name": "CVE-2024-35817",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35817"
},
{
"name": "CVE-2024-35821",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35821"
},
{
"name": "CVE-2024-35822",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35822"
},
{
"name": "CVE-2024-35823",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35823"
},
{
"name": "CVE-2024-35825",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35825"
},
{
"name": "CVE-2024-35828",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35828"
},
{
"name": "CVE-2024-35829",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35829"
},
{
"name": "CVE-2024-35830",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35830"
},
{
"name": "CVE-2024-35833",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35833"
},
{
"name": "CVE-2024-35845",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35845"
},
{
"name": "CVE-2024-35847",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35847"
},
{
"name": "CVE-2024-35849",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35849"
},
{
"name": "CVE-2024-35851",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35851"
},
{
"name": "CVE-2024-35852",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35852"
},
{
"name": "CVE-2024-35854",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35854"
},
{
"name": "CVE-2024-35860",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35860"
},
{
"name": "CVE-2024-35861",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35861"
},
{
"name": "CVE-2024-35862",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35862"
},
{
"name": "CVE-2024-35863",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35863"
},
{
"name": "CVE-2024-35864",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35864"
},
{
"name": "CVE-2024-35865",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35865"
},
{
"name": "CVE-2024-35866",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35866"
},
{
"name": "CVE-2024-35867",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35867"
},
{
"name": "CVE-2024-35868",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35868"
},
{
"name": "CVE-2024-35872",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35872"
},
{
"name": "CVE-2024-35875",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35875"
},
{
"name": "CVE-2024-35877",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35877"
},
{
"name": "CVE-2024-35878",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35878"
},
{
"name": "CVE-2024-35879",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35879"
},
{
"name": "CVE-2024-35885",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35885"
},
{
"name": "CVE-2024-35887",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35887"
},
{
"name": "CVE-2024-35895",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35895"
},
{
"name": "CVE-2024-35901",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35901"
},
{
"name": "CVE-2024-35904",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35904"
},
{
"name": "CVE-2024-35905",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35905"
},
{
"name": "CVE-2024-35907",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35907"
},
{
"name": "CVE-2024-35912",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35912"
},
{
"name": "CVE-2024-35914",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35914"
},
{
"name": "CVE-2024-35915",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35915"
},
{
"name": "CVE-2024-35922",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35922"
},
{
"name": "CVE-2024-35924",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35924"
},
{
"name": "CVE-2024-35930",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35930"
},
{
"name": "CVE-2024-35932",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35932"
},
{
"name": "CVE-2024-35933",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35933"
},
{
"name": "CVE-2024-35935",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35935"
},
{
"name": "CVE-2024-35936",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35936"
},
{
"name": "CVE-2024-35938",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35938"
},
{
"name": "CVE-2024-35940",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35940"
},
{
"name": "CVE-2024-35943",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35943"
},
{
"name": "CVE-2024-35944",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35944"
},
{
"name": "CVE-2024-35950",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35950"
},
{
"name": "CVE-2024-35951",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35951"
},
{
"name": "CVE-2024-35952",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35952"
},
{
"name": "CVE-2024-35955",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35955"
},
{
"name": "CVE-2024-35959",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35959"
},
{
"name": "CVE-2024-35963",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35963"
},
{
"name": "CVE-2024-35964",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35964"
},
{
"name": "CVE-2024-35965",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35965"
},
{
"name": "CVE-2024-35966",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35966"
},
{
"name": "CVE-2024-35967",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35967"
},
{
"name": "CVE-2024-35969",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35969"
},
{
"name": "CVE-2024-35973",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35973"
},
{
"name": "CVE-2024-35976",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35976"
},
{
"name": "CVE-2024-35978",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35978"
},
{
"name": "CVE-2024-35982",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35982"
},
{
"name": "CVE-2024-35984",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35984"
},
{
"name": "CVE-2024-35989",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35989"
},
{
"name": "CVE-2024-35990",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35990"
},
{
"name": "CVE-2024-35998",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35998"
},
{
"name": "CVE-2024-35999",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35999"
},
{
"name": "CVE-2024-36006",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36006"
},
{
"name": "CVE-2024-36007",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36007"
},
{
"name": "CVE-2024-36012",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36012"
},
{
"name": "CVE-2024-36014",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36014"
},
{
"name": "CVE-2024-36015",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36015"
},
{
"name": "CVE-2024-36016",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36016"
},
{
"name": "CVE-2024-36026",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36026"
},
{
"name": "CVE-2024-36029",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36029"
},
{
"name": "CVE-2024-36032",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36032"
},
{
"name": "CVE-2024-36880",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36880"
},
{
"name": "CVE-2024-36893",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36893"
},
{
"name": "CVE-2024-36896",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36896"
},
{
"name": "CVE-2024-36897",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36897"
},
{
"name": "CVE-2024-36906",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36906"
},
{
"name": "CVE-2024-36918",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36918"
},
{
"name": "CVE-2024-36924",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36924"
},
{
"name": "CVE-2024-36926",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36926"
},
{
"name": "CVE-2024-36928",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36928"
},
{
"name": "CVE-2024-36931",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36931"
},
{
"name": "CVE-2024-36938",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36938"
},
{
"name": "CVE-2024-36942",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36942"
},
{
"name": "CVE-2024-36944",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36944"
},
{
"name": "CVE-2024-36947",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36947"
},
{
"name": "CVE-2024-36952",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36952"
},
{
"name": "CVE-2024-36955",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36955"
},
{
"name": "CVE-2023-52667",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52667"
},
{
"name": "CVE-2023-52658",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52658"
},
{
"name": "CVE-2023-52663",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52663"
},
{
"name": "CVE-2023-52670",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52670"
},
{
"name": "CVE-2023-52673",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52673"
},
{
"name": "CVE-2023-52675",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52675"
},
{
"name": "CVE-2023-52681",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52681"
},
{
"name": "CVE-2023-52687",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52687"
},
{
"name": "CVE-2023-52695",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52695"
},
{
"name": "CVE-2023-52697",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52697"
},
{
"name": "CVE-2023-52771",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52771"
},
{
"name": "CVE-2023-52772",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52772"
},
{
"name": "CVE-2023-6238",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6238"
},
{
"name": "CVE-2024-26611",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26611"
},
{
"name": "CVE-2024-26652",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26652"
},
{
"name": "CVE-2024-26657",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26657"
},
{
"name": "CVE-2024-26674",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26674"
},
{
"name": "CVE-2024-26740",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26740"
},
{
"name": "CVE-2024-26756",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26756"
},
{
"name": "CVE-2024-26786",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26786"
},
{
"name": "CVE-2024-26794",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26794"
},
{
"name": "CVE-2024-26832",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26832"
},
{
"name": "CVE-2024-26844",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26844"
},
{
"name": "CVE-2024-26854",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26854"
},
{
"name": "CVE-2024-26858",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26858"
},
{
"name": "CVE-2024-26860",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26860"
},
{
"name": "CVE-2024-26868",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26868"
},
{
"name": "CVE-2024-26899",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26899"
},
{
"name": "CVE-2024-26909",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26909"
},
{
"name": "CVE-2024-26932",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26932"
},
{
"name": "CVE-2024-26945",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26945"
},
{
"name": "CVE-2024-26946",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26946"
},
{
"name": "CVE-2024-26949",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26949"
},
{
"name": "CVE-2024-26962",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26962"
},
{
"name": "CVE-2024-26963",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26963"
},
{
"name": "CVE-2024-26986",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26986"
},
{
"name": "CVE-2024-26990",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26990"
},
{
"name": "CVE-2024-26991",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26991"
},
{
"name": "CVE-2024-26995",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26995"
},
{
"name": "CVE-2024-27027",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27027"
},
{
"name": "CVE-2024-27031",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27031"
},
{
"name": "CVE-2024-27057",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27057"
},
{
"name": "CVE-2024-27067",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27067"
},
{
"name": "CVE-2024-27080",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27080"
},
{
"name": "CVE-2024-27408",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27408"
},
{
"name": "CVE-2024-27411",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27411"
},
{
"name": "CVE-2024-27418",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27418"
},
{
"name": "CVE-2024-27432",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27432"
},
{
"name": "CVE-2024-27434",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27434"
},
{
"name": "CVE-2024-35784",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35784"
},
{
"name": "CVE-2024-35786",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35786"
},
{
"name": "CVE-2024-35788",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35788"
},
{
"name": "CVE-2024-35790",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35790"
},
{
"name": "CVE-2024-35794",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35794"
},
{
"name": "CVE-2024-35795",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35795"
},
{
"name": "CVE-2024-35800",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35800"
},
{
"name": "CVE-2024-35803",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35803"
},
{
"name": "CVE-2024-35808",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35808"
},
{
"name": "CVE-2024-35810",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35810"
},
{
"name": "CVE-2024-35814",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35814"
},
{
"name": "CVE-2024-35819",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35819"
},
{
"name": "CVE-2024-35824",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35824"
},
{
"name": "CVE-2024-35834",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35834"
},
{
"name": "CVE-2024-35835",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35835"
},
{
"name": "CVE-2024-35836",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35836"
},
{
"name": "CVE-2024-35837",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35837"
},
{
"name": "CVE-2024-35838",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35838"
},
{
"name": "CVE-2024-35841",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35841"
},
{
"name": "CVE-2024-35842",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35842"
},
{
"name": "CVE-2024-35850",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35850"
},
{
"name": "CVE-2024-35883",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35883"
},
{
"name": "CVE-2024-35889",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35889"
},
{
"name": "CVE-2024-35891",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35891"
},
{
"name": "CVE-2024-35903",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35903"
},
{
"name": "CVE-2024-35909",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35909"
},
{
"name": "CVE-2024-35911",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35911"
},
{
"name": "CVE-2024-35916",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35916"
},
{
"name": "CVE-2024-35917",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35917"
},
{
"name": "CVE-2024-35921",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35921"
},
{
"name": "CVE-2024-35927",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35927"
},
{
"name": "CVE-2024-35928",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35928"
},
{
"name": "CVE-2024-35931",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35931"
},
{
"name": "CVE-2024-35937",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35937"
},
{
"name": "CVE-2024-35945",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35945"
},
{
"name": "CVE-2024-35946",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35946"
},
{
"name": "CVE-2024-35953",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35953"
},
{
"name": "CVE-2024-35954",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35954"
},
{
"name": "CVE-2024-35956",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35956"
},
{
"name": "CVE-2024-35958",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35958"
},
{
"name": "CVE-2024-35960",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35960"
},
{
"name": "CVE-2024-35961",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35961"
},
{
"name": "CVE-2024-35971",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35971"
},
{
"name": "CVE-2024-35972",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35972"
},
{
"name": "CVE-2024-35974",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35974"
},
{
"name": "CVE-2024-35975",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35975"
},
{
"name": "CVE-2024-35977",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35977"
},
{
"name": "CVE-2024-35981",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35981"
},
{
"name": "CVE-2024-35986",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35986"
},
{
"name": "CVE-2024-35991",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35991"
},
{
"name": "CVE-2024-35992",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35992"
},
{
"name": "CVE-2024-35995",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35995"
},
{
"name": "CVE-2024-35997",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35997"
},
{
"name": "CVE-2024-36002",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36002"
},
{
"name": "CVE-2024-36009",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36009"
},
{
"name": "CVE-2024-36011",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36011"
},
{
"name": "CVE-2024-36013",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36013"
},
{
"name": "CVE-2024-36018",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36018"
},
{
"name": "CVE-2024-36019",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36019"
},
{
"name": "CVE-2024-36020",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36020"
},
{
"name": "CVE-2024-36021",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36021"
},
{
"name": "CVE-2024-36025",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36025"
},
{
"name": "CVE-2024-36030",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36030"
},
{
"name": "CVE-2024-36885",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36885"
},
{
"name": "CVE-2024-36890",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36890"
},
{
"name": "CVE-2024-36891",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36891"
},
{
"name": "CVE-2024-36894",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36894"
},
{
"name": "CVE-2024-36895",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36895"
},
{
"name": "CVE-2024-36898",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36898"
},
{
"name": "CVE-2024-36921",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36921"
},
{
"name": "CVE-2024-36922",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36922"
},
{
"name": "CVE-2024-36930",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36930"
},
{
"name": "CVE-2024-36936",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36936"
},
{
"name": "CVE-2024-36949",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36949"
},
{
"name": "CVE-2024-36951",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36951"
},
{
"name": "CVE-2023-52672",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52672"
},
{
"name": "CVE-2024-27414",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27414"
},
{
"name": "CVE-2024-35805",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35805"
},
{
"name": "CVE-2024-35807",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35807"
},
{
"name": "CVE-2024-35853",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35853"
},
{
"name": "CVE-2024-35855",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35855"
},
{
"name": "CVE-2024-35884",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35884"
},
{
"name": "CVE-2024-35886",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35886"
},
{
"name": "CVE-2024-35893",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35893"
},
{
"name": "CVE-2024-35896",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35896"
},
{
"name": "CVE-2024-35898",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35898"
},
{
"name": "CVE-2024-35899",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35899"
},
{
"name": "CVE-2024-35900",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35900"
},
{
"name": "CVE-2024-35925",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35925"
},
{
"name": "CVE-2024-35934",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35934"
},
{
"name": "CVE-2024-35962",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35962"
},
{
"name": "CVE-2024-36004",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36004"
},
{
"name": "CVE-2024-36005",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36005"
},
{
"name": "CVE-2024-36008",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36008"
},
{
"name": "CVE-2024-36288",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36288"
},
{
"name": "CVE-2024-36960",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36960"
},
{
"name": "CVE-2024-36964",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36964"
},
{
"name": "CVE-2024-36971",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36971"
},
{
"name": "CVE-2024-37353",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37353"
},
{
"name": "CVE-2024-38381",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38381"
},
{
"name": "CVE-2024-38549",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38549"
},
{
"name": "CVE-2024-38552",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38552"
},
{
"name": "CVE-2024-38558",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38558"
},
{
"name": "CVE-2024-38559",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38559"
},
{
"name": "CVE-2024-38560",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38560"
},
{
"name": "CVE-2024-38565",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38565"
},
{
"name": "CVE-2024-38567",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38567"
},
{
"name": "CVE-2024-38578",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38578"
},
{
"name": "CVE-2024-38579",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38579"
},
{
"name": "CVE-2024-38582",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38582"
},
{
"name": "CVE-2024-38583",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38583"
},
{
"name": "CVE-2024-38587",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38587"
},
{
"name": "CVE-2024-38598",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38598"
},
{
"name": "CVE-2024-38599",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38599"
},
{
"name": "CVE-2024-38601",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38601"
},
{
"name": "CVE-2024-38618",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38618"
},
{
"name": "CVE-2024-38621",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38621"
},
{
"name": "CVE-2024-38627",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38627"
},
{
"name": "CVE-2024-38633",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38633"
},
{
"name": "CVE-2024-38634",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38634"
},
{
"name": "CVE-2024-38659",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38659"
},
{
"name": "CVE-2024-38780",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38780"
},
{
"name": "CVE-2024-26944",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26944"
},
{
"name": "CVE-2024-27064",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27064"
},
{
"name": "CVE-2024-35827",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35827"
},
{
"name": "CVE-2024-35831",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35831"
},
{
"name": "CVE-2024-35843",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35843"
},
{
"name": "CVE-2023-52813",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52813"
},
{
"name": "CVE-2023-52835",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52835"
},
{
"name": "CVE-2023-52881",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52881"
},
{
"name": "CVE-2024-35890",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35890"
},
{
"name": "CVE-2021-47103",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47103"
},
{
"name": "CVE-2021-47432",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47432"
},
{
"name": "CVE-2021-47580",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47580"
},
{
"name": "CVE-2021-47582",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47582"
},
{
"name": "CVE-2021-47597",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47597"
},
{
"name": "CVE-2021-47600",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47600"
},
{
"name": "CVE-2021-47619",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47619"
},
{
"name": "CVE-2022-48713",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48713"
},
{
"name": "CVE-2022-48730",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48730"
},
{
"name": "CVE-2022-48732",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48732"
},
{
"name": "CVE-2022-48749",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48749"
},
{
"name": "CVE-2022-48756",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48756"
},
{
"name": "CVE-2022-48772",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48772"
},
{
"name": "CVE-2023-52735",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52735"
},
{
"name": "CVE-2023-52762",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52762"
},
{
"name": "CVE-2023-52784",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52784"
},
{
"name": "CVE-2023-52787",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52787"
},
{
"name": "CVE-2023-52837",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52837"
},
{
"name": "CVE-2023-52843",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52843"
},
{
"name": "CVE-2023-52845",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52845"
},
{
"name": "CVE-2023-52869",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52869"
},
{
"name": "CVE-2023-52884",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52884"
},
{
"name": "CVE-2024-26842",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26842"
},
{
"name": "CVE-2024-33619",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33619"
},
{
"name": "CVE-2024-35247",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35247"
},
{
"name": "CVE-2024-35857",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35857"
},
{
"name": "CVE-2024-35979",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35979"
},
{
"name": "CVE-2024-36477",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36477"
},
{
"name": "CVE-2024-36478",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36478"
},
{
"name": "CVE-2024-36479",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36479"
},
{
"name": "CVE-2024-36592",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36592"
},
{
"name": "CVE-2024-36899",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36899"
},
{
"name": "CVE-2024-36900",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36900"
},
{
"name": "CVE-2024-36915",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36915"
},
{
"name": "CVE-2024-36917",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36917"
},
{
"name": "CVE-2024-36923",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36923"
},
{
"name": "CVE-2024-36937",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36937"
},
{
"name": "CVE-2024-36945",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36945"
},
{
"name": "CVE-2024-36965",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36965"
},
{
"name": "CVE-2024-36967",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36967"
},
{
"name": "CVE-2024-36969",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36969"
},
{
"name": "CVE-2024-36975",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36975"
},
{
"name": "CVE-2024-36978",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36978"
},
{
"name": "CVE-2024-37021",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37021"
},
{
"name": "CVE-2024-37078",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37078"
},
{
"name": "CVE-2024-37354",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37354"
},
{
"name": "CVE-2024-38388",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38388"
},
{
"name": "CVE-2024-38390",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38390"
},
{
"name": "CVE-2024-38540",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38540"
},
{
"name": "CVE-2024-38541",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38541"
},
{
"name": "CVE-2024-38544",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38544"
},
{
"name": "CVE-2024-38546",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38546"
},
{
"name": "CVE-2024-38547",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38547"
},
{
"name": "CVE-2024-38548",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38548"
},
{
"name": "CVE-2024-38550",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38550"
},
{
"name": "CVE-2024-38553",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38553"
},
{
"name": "CVE-2024-38555",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38555"
},
{
"name": "CVE-2024-38556",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38556"
},
{
"name": "CVE-2024-38557",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38557"
},
{
"name": "CVE-2024-38564",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38564"
},
{
"name": "CVE-2024-38568",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38568"
},
{
"name": "CVE-2024-38571",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38571"
},
{
"name": "CVE-2024-38573",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38573"
},
{
"name": "CVE-2024-38580",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38580"
},
{
"name": "CVE-2024-38581",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38581"
},
{
"name": "CVE-2024-38590",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38590"
},
{
"name": "CVE-2024-38591",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38591"
},
{
"name": "CVE-2024-38594",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38594"
},
{
"name": "CVE-2024-38597",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38597"
},
{
"name": "CVE-2024-38600",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38600"
},
{
"name": "CVE-2024-38603",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38603"
},
{
"name": "CVE-2024-38605",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38605"
},
{
"name": "CVE-2024-38608",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38608"
},
{
"name": "CVE-2024-38616",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38616"
},
{
"name": "CVE-2024-38619",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38619"
},
{
"name": "CVE-2024-38630",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38630"
},
{
"name": "CVE-2024-38635",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38635"
},
{
"name": "CVE-2024-38661",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38661"
},
{
"name": "CVE-2024-39301",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39301"
},
{
"name": "CVE-2024-39468",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39468"
},
{
"name": "CVE-2024-39469",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39469"
},
{
"name": "CVE-2024-39471",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39471"
},
{
"name": "CVE-2021-47547",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47547"
},
{
"name": "CVE-2024-38610",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38610"
},
{
"name": "CVE-2024-39475",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39475"
},
{
"name": "CVE-2024-26661",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26661"
},
{
"name": "CVE-2024-26691",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26691"
},
{
"name": "CVE-2024-26734",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26734"
},
{
"name": "CVE-2024-27012",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27012"
},
{
"name": "CVE-2024-35880",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35880"
},
{
"name": "CVE-2024-35892",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35892"
},
{
"name": "CVE-2024-35908",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35908"
},
{
"name": "CVE-2024-35926",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35926"
},
{
"name": "CVE-2024-35942",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35942"
},
{
"name": "CVE-2024-35957",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35957"
},
{
"name": "CVE-2024-35970",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35970"
},
{
"name": "CVE-2024-36024",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36024"
},
{
"name": "CVE-2024-38543",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38543"
},
{
"name": "CVE-2024-38586",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38586"
},
{
"name": "CVE-2024-38663",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38663"
},
{
"name": "CVE-2024-25741",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25741"
},
{
"name": "CVE-2024-36973",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36973"
},
{
"name": "CVE-2024-36974",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36974"
},
{
"name": "CVE-2024-38615",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38615"
},
{
"name": "CVE-2024-39276",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39276"
},
{
"name": "CVE-2024-39371",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39371"
},
{
"name": "CVE-2024-39474",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39474"
},
{
"name": "CVE-2024-39482",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39482"
},
{
"name": "CVE-2024-39487",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39487"
},
{
"name": "CVE-2024-39488",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39488"
},
{
"name": "CVE-2024-39493",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39493"
},
{
"name": "CVE-2024-39494",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39494"
},
{
"name": "CVE-2024-39496",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39496"
},
{
"name": "CVE-2024-39499",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39499"
},
{
"name": "CVE-2024-39500",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39500"
},
{
"name": "CVE-2024-39501",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39501"
},
{
"name": "CVE-2024-39502",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39502"
},
{
"name": "CVE-2024-39505",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39505"
},
{
"name": "CVE-2024-39506",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39506"
},
{
"name": "CVE-2024-39507",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39507"
},
{
"name": "CVE-2024-39509",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39509"
},
{
"name": "CVE-2024-40900",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40900"
},
{
"name": "CVE-2024-40901",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40901"
},
{
"name": "CVE-2024-40902",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40902"
},
{
"name": "CVE-2024-40903",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40903"
},
{
"name": "CVE-2024-40904",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40904"
},
{
"name": "CVE-2024-40906",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40906"
},
{
"name": "CVE-2024-40908",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40908"
},
{
"name": "CVE-2024-40911",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40911"
},
{
"name": "CVE-2024-40912",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40912"
},
{
"name": "CVE-2024-40916",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40916"
},
{
"name": "CVE-2024-40919",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40919"
},
{
"name": "CVE-2024-40924",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40924"
},
{
"name": "CVE-2024-40927",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40927"
},
{
"name": "CVE-2024-40929",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40929"
},
{
"name": "CVE-2024-40931",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40931"
},
{
"name": "CVE-2024-40932",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40932"
},
{
"name": "CVE-2024-40934",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40934"
},
{
"name": "CVE-2024-40935",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40935"
},
{
"name": "CVE-2024-40937",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40937"
},
{
"name": "CVE-2024-40940",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40940"
},
{
"name": "CVE-2024-40941",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40941"
},
{
"name": "CVE-2024-40942",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40942"
},
{
"name": "CVE-2024-40943",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40943"
},
{
"name": "CVE-2024-40945",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40945"
},
{
"name": "CVE-2024-40947",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40947"
},
{
"name": "CVE-2024-40948",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40948"
},
{
"name": "CVE-2024-40953",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40953"
},
{
"name": "CVE-2024-40954",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40954"
},
{
"name": "CVE-2024-40956",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40956"
},
{
"name": "CVE-2024-40958",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40958"
},
{
"name": "CVE-2024-40959",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40959"
},
{
"name": "CVE-2024-40960",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40960"
},
{
"name": "CVE-2024-40961",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40961"
},
{
"name": "CVE-2024-40966",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40966"
},
{
"name": "CVE-2024-40967",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40967"
},
{
"name": "CVE-2024-40970",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40970"
},
{
"name": "CVE-2024-40976",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40976"
},
{
"name": "CVE-2024-40977",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40977"
},
{
"name": "CVE-2024-40978",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40978"
},
{
"name": "CVE-2024-40981",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40981"
},
{
"name": "CVE-2024-40984",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40984"
},
{
"name": "CVE-2024-40987",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40987"
},
{
"name": "CVE-2024-40988",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40988"
},
{
"name": "CVE-2024-40989",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40989"
},
{
"name": "CVE-2024-40990",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40990"
},
{
"name": "CVE-2024-40994",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40994"
},
{
"name": "CVE-2024-40995",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40995"
},
{
"name": "CVE-2024-41002",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41002"
},
{
"name": "CVE-2024-41004",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41004"
},
{
"name": "CVE-2024-41006",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41006"
},
{
"name": "CVE-2023-52749",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52749"
},
{
"name": "CVE-2023-52750",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52750"
},
{
"name": "CVE-2023-52765",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52765"
},
{
"name": "CVE-2023-52767",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52767"
},
{
"name": "CVE-2023-52768",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52768"
},
{
"name": "CVE-2023-52769",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52769"
},
{
"name": "CVE-2023-52776",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52776"
},
{
"name": "CVE-2023-52780",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52780"
},
{
"name": "CVE-2023-52782",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52782"
},
{
"name": "CVE-2023-52783",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52783"
},
{
"name": "CVE-2023-52786",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52786"
},
{
"name": "CVE-2023-52792",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52792"
},
{
"name": "CVE-2023-52794",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52794"
},
{
"name": "CVE-2023-52801",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52801"
},
{
"name": "CVE-2023-52812",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52812"
},
{
"name": "CVE-2023-52827",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52827"
},
{
"name": "CVE-2023-52829",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52829"
},
{
"name": "CVE-2023-52836",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52836"
},
{
"name": "CVE-2023-52842",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52842"
},
{
"name": "CVE-2023-52849",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52849"
},
{
"name": "CVE-2023-52850",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52850"
},
{
"name": "CVE-2023-52857",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52857"
},
{
"name": "CVE-2023-52862",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52862"
},
{
"name": "CVE-2023-52863",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52863"
},
{
"name": "CVE-2023-52866",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52866"
},
{
"name": "CVE-2023-52874",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52874"
},
{
"name": "CVE-2023-52879",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52879"
},
{
"name": "CVE-2023-52883",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52883"
},
{
"name": "CVE-2024-26767",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26767"
},
{
"name": "CVE-2024-34777",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34777"
},
{
"name": "CVE-2024-36010",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36010"
},
{
"name": "CVE-2024-36281",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36281"
},
{
"name": "CVE-2024-36882",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36882"
},
{
"name": "CVE-2024-36887",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36887"
},
{
"name": "CVE-2024-36903",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36903"
},
{
"name": "CVE-2024-36935",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36935"
},
{
"name": "CVE-2024-36962",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36962"
},
{
"name": "CVE-2024-36972",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36972"
},
{
"name": "CVE-2024-36977",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36977"
},
{
"name": "CVE-2024-38384",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38384"
},
{
"name": "CVE-2024-38385",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38385"
},
{
"name": "CVE-2024-38391",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38391"
},
{
"name": "CVE-2024-38539",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38539"
},
{
"name": "CVE-2024-38551",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38551"
},
{
"name": "CVE-2024-38554",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38554"
},
{
"name": "CVE-2024-38562",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38562"
},
{
"name": "CVE-2024-38566",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38566"
},
{
"name": "CVE-2024-38569",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38569"
},
{
"name": "CVE-2024-38570",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38570"
},
{
"name": "CVE-2024-38572",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38572"
},
{
"name": "CVE-2024-38575",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38575"
},
{
"name": "CVE-2024-38588",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38588"
},
{
"name": "CVE-2024-38592",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38592"
},
{
"name": "CVE-2024-38595",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38595"
},
{
"name": "CVE-2024-38602",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38602"
},
{
"name": "CVE-2024-38611",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38611"
},
{
"name": "CVE-2024-38617",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38617"
},
{
"name": "CVE-2024-38622",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38622"
},
{
"name": "CVE-2024-38628",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38628"
},
{
"name": "CVE-2024-38629",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38629"
},
{
"name": "CVE-2024-38636",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38636"
},
{
"name": "CVE-2024-38664",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38664"
},
{
"name": "CVE-2024-39277",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39277"
},
{
"name": "CVE-2024-39291",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39291"
},
{
"name": "CVE-2024-39296",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39296"
},
{
"name": "CVE-2024-39362",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39362"
},
{
"name": "CVE-2024-39463",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39463"
},
{
"name": "CVE-2024-39466",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39466"
},
{
"name": "CVE-2024-35949",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35949"
},
{
"name": "CVE-2024-36000",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36000"
},
{
"name": "CVE-2024-36003",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36003"
},
{
"name": "CVE-2024-36901",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36901"
},
{
"name": "CVE-2024-36909",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36909"
},
{
"name": "CVE-2024-36910",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36910"
},
{
"name": "CVE-2024-36911",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36911"
},
{
"name": "CVE-2024-36912",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36912"
},
{
"name": "CVE-2024-36913",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36913"
},
{
"name": "CVE-2024-36914",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36914"
},
{
"name": "CVE-2024-38604",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38604"
},
{
"name": "CVE-2024-41011",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41011"
},
{
"name": "CVE-2021-47624",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47624"
},
{
"name": "CVE-2023-52775",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52775"
},
{
"name": "CVE-2023-52885",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52885"
},
{
"name": "CVE-2024-39472",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39472"
},
{
"name": "CVE-2023-52751",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52751"
},
{
"name": "CVE-2024-26785",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26785"
},
{
"name": "CVE-2024-27402",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27402"
},
{
"name": "CVE-2024-27404",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27404"
},
{
"name": "CVE-2024-39473",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39473"
},
{
"name": "CVE-2024-39479",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39479"
},
{
"name": "CVE-2024-39481",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39481"
},
{
"name": "CVE-2024-39490",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39490"
},
{
"name": "CVE-2024-39498",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39498"
},
{
"name": "CVE-2024-39504",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39504"
},
{
"name": "CVE-2024-40923",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40923"
},
{
"name": "CVE-2024-40925",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40925"
},
{
"name": "CVE-2024-40928",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40928"
},
{
"name": "CVE-2024-40972",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40972"
},
{
"name": "CVE-2024-40975",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40975"
},
{
"name": "CVE-2024-40979",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40979"
},
{
"name": "CVE-2024-40998",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40998"
},
{
"name": "CVE-2024-40999",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40999"
},
{
"name": "CVE-2024-41013",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41013"
},
{
"name": "CVE-2024-41014",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41014"
},
{
"name": "CVE-2024-41017",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41017"
},
{
"name": "CVE-2024-41090",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41090"
},
{
"name": "CVE-2024-41091",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41091"
},
{
"name": "CVE-2021-47086",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47086"
},
{
"name": "CVE-2021-47126",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47126"
},
{
"name": "CVE-2021-47186",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47186"
},
{
"name": "CVE-2021-47291",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47291"
},
{
"name": "CVE-2021-47295",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47295"
},
{
"name": "CVE-2021-47546",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47546"
},
{
"name": "CVE-2021-47588",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47588"
},
{
"name": "CVE-2021-47590",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47590"
},
{
"name": "CVE-2021-47591",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47591"
},
{
"name": "CVE-2021-47593",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47593"
},
{
"name": "CVE-2021-47598",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47598"
},
{
"name": "CVE-2021-47599",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47599"
},
{
"name": "CVE-2021-47606",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47606"
},
{
"name": "CVE-2021-47622",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47622"
},
{
"name": "CVE-2021-47623",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47623"
},
{
"name": "CVE-2022-48773",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48773"
},
{
"name": "CVE-2022-48774",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48774"
},
{
"name": "CVE-2022-48775",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48775"
},
{
"name": "CVE-2022-48776",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48776"
},
{
"name": "CVE-2022-48777",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48777"
},
{
"name": "CVE-2022-48778",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48778"
},
{
"name": "CVE-2022-48780",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48780"
},
{
"name": "CVE-2022-48783",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48783"
},
{
"name": "CVE-2022-48784",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48784"
},
{
"name": "CVE-2022-48785",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48785"
},
{
"name": "CVE-2022-48786",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48786"
},
{
"name": "CVE-2022-48787",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48787"
},
{
"name": "CVE-2022-48788",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48788"
},
{
"name": "CVE-2022-48789",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48789"
},
{
"name": "CVE-2022-48790",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48790"
},
{
"name": "CVE-2022-48791",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48791"
},
{
"name": "CVE-2022-48792",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48792"
},
{
"name": "CVE-2022-48793",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48793"
},
{
"name": "CVE-2022-48794",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48794"
},
{
"name": "CVE-2022-48796",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48796"
},
{
"name": "CVE-2022-48797",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48797"
},
{
"name": "CVE-2022-48798",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48798"
},
{
"name": "CVE-2022-48799",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48799"
},
{
"name": "CVE-2022-48800",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48800"
},
{
"name": "CVE-2022-48801",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48801"
},
{
"name": "CVE-2022-48802",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48802"
},
{
"name": "CVE-2022-48803",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48803"
},
{
"name": "CVE-2022-48804",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48804"
},
{
"name": "CVE-2022-48805",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48805"
},
{
"name": "CVE-2022-48806",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48806"
},
{
"name": "CVE-2022-48807",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48807"
},
{
"name": "CVE-2022-48809",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48809"
},
{
"name": "CVE-2022-48810",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48810"
},
{
"name": "CVE-2022-48811",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48811"
},
{
"name": "CVE-2022-48812",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48812"
},
{
"name": "CVE-2022-48813",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48813"
},
{
"name": "CVE-2022-48814",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48814"
},
{
"name": "CVE-2022-48815",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48815"
},
{
"name": "CVE-2022-48816",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48816"
},
{
"name": "CVE-2022-48817",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48817"
},
{
"name": "CVE-2022-48818",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48818"
},
{
"name": "CVE-2022-48820",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48820"
},
{
"name": "CVE-2022-48821",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48821"
},
{
"name": "CVE-2022-48822",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48822"
},
{
"name": "CVE-2022-48823",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48823"
},
{
"name": "CVE-2022-48824",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48824"
},
{
"name": "CVE-2022-48825",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48825"
},
{
"name": "CVE-2022-48826",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48826"
},
{
"name": "CVE-2022-48827",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48827"
},
{
"name": "CVE-2022-48828",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48828"
},
{
"name": "CVE-2022-48829",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48829"
},
{
"name": "CVE-2022-48830",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48830"
},
{
"name": "CVE-2022-48831",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48831"
},
{
"name": "CVE-2022-48834",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48834"
},
{
"name": "CVE-2022-48835",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48835"
},
{
"name": "CVE-2022-48836",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48836"
},
{
"name": "CVE-2022-48837",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48837"
},
{
"name": "CVE-2022-48838",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48838"
},
{
"name": "CVE-2022-48839",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48839"
},
{
"name": "CVE-2022-48840",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48840"
},
{
"name": "CVE-2022-48841",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48841"
},
{
"name": "CVE-2022-48842",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48842"
},
{
"name": "CVE-2022-48843",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48843"
},
{
"name": "CVE-2022-48844",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48844"
},
{
"name": "CVE-2022-48846",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48846"
},
{
"name": "CVE-2022-48847",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48847"
},
{
"name": "CVE-2022-48849",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48849"
},
{
"name": "CVE-2022-48850",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48850"
},
{
"name": "CVE-2022-48851",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48851"
},
{
"name": "CVE-2022-48852",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48852"
},
{
"name": "CVE-2022-48853",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48853"
},
{
"name": "CVE-2022-48855",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48855"
},
{
"name": "CVE-2022-48856",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48856"
},
{
"name": "CVE-2022-48857",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48857"
},
{
"name": "CVE-2022-48858",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48858"
},
{
"name": "CVE-2022-48859",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48859"
},
{
"name": "CVE-2022-48860",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48860"
},
{
"name": "CVE-2022-48861",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48861"
},
{
"name": "CVE-2022-48862",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48862"
},
{
"name": "CVE-2022-48863",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48863"
},
{
"name": "CVE-2022-48864",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48864"
},
{
"name": "CVE-2022-48866",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48866"
},
{
"name": "CVE-2023-31315",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31315"
},
{
"name": "CVE-2023-52573",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52573"
},
{
"name": "CVE-2023-52886",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52886"
},
{
"name": "CVE-2024-39497",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39497"
},
{
"name": "CVE-2024-39508",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39508"
},
{
"name": "CVE-2024-40909",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40909"
},
{
"name": "CVE-2024-40982",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40982"
},
{
"name": "CVE-2024-41009",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41009"
},
{
"name": "CVE-2024-41012",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41012"
},
{
"name": "CVE-2024-41015",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41015"
},
{
"name": "CVE-2024-41016",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41016"
},
{
"name": "CVE-2024-41040",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41040"
},
{
"name": "CVE-2024-41041",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41041"
},
{
"name": "CVE-2024-41044",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41044"
},
{
"name": "CVE-2024-41048",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41048"
},
{
"name": "CVE-2024-41057",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41057"
},
{
"name": "CVE-2024-41058",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41058"
},
{
"name": "CVE-2024-41059",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41059"
},
{
"name": "CVE-2024-41060",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41060"
},
{
"name": "CVE-2024-41063",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41063"
},
{
"name": "CVE-2024-41064",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41064"
},
{
"name": "CVE-2024-41066",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41066"
},
{
"name": "CVE-2024-41069",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41069"
},
{
"name": "CVE-2024-41070",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41070"
},
{
"name": "CVE-2024-41071",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41071"
},
{
"name": "CVE-2024-41072",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41072"
},
{
"name": "CVE-2024-41076",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41076"
},
{
"name": "CVE-2024-41078",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41078"
},
{
"name": "CVE-2024-41081",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41081"
},
{
"name": "CVE-2024-41087",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41087"
},
{
"name": "CVE-2024-41089",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41089"
},
{
"name": "CVE-2024-41095",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41095"
},
{
"name": "CVE-2024-42070",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42070"
},
{
"name": "CVE-2024-42079",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42079"
},
{
"name": "CVE-2024-42093",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42093"
},
{
"name": "CVE-2024-42096",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42096"
},
{
"name": "CVE-2024-42105",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42105"
},
{
"name": "CVE-2024-42119",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42119"
},
{
"name": "CVE-2024-42120",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42120"
},
{
"name": "CVE-2024-42122",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42122"
},
{
"name": "CVE-2024-42124",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42124"
},
{
"name": "CVE-2024-42145",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42145"
},
{
"name": "CVE-2024-42161",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42161"
},
{
"name": "CVE-2024-42223",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42223"
},
{
"name": "CVE-2024-42224",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42224"
},
{
"name": "CVE-2024-42230",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42230"
}
],
"initial_release_date": "2024-08-23T00:00:00",
"last_revision_date": "2024-08-23T00:00:00",
"links": [],
"reference": "CERTFR-2024-AVI-0717",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2024-08-23T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux de SUSE. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, une \u00e9l\u00e9vation de privil\u00e8ges et un d\u00e9ni de service \u00e0 distance.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de SUSE",
"vendor_advisories": [
{
"published_at": "2024-08-20",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2024:2980-1",
"url": "https://www.suse.com/support/update/announcement/2024/suse-su-20242980-1"
},
{
"published_at": "2024-08-16",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2024:2940-1",
"url": "https://www.suse.com/support/update/announcement/2024/suse-su-20242940-1"
},
{
"published_at": "2024-08-16",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2024:2944-1",
"url": "https://www.suse.com/support/update/announcement/2024/suse-su-20242944-1"
},
{
"published_at": "2024-08-16",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2024:2943-1",
"url": "https://www.suse.com/support/update/announcement/2024/suse-su-20242943-1"
},
{
"published_at": "2024-08-16",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2024:2948-1",
"url": "https://www.suse.com/support/update/announcement/2024/suse-su-20242948-1"
},
{
"published_at": "2024-08-20",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2024:2973-1",
"url": "https://www.suse.com/support/update/announcement/2024/suse-su-20242973-1"
},
{
"published_at": "2024-08-16",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2024:2947-1",
"url": "https://www.suse.com/support/update/announcement/2024/suse-su-20242947-1"
}
]
}
CERTFR-2021-AVI-500
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans le noyau Linux de SUSE. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire, un déni de service et une atteinte à l'intégrité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | |||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "SUSE Linux Enterprise Module for Live Patching 15-SP3",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module for Realtime 15-SP3",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE MicroOS 5.0",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module for Public Cloud 15-SP3",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2020-26139",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26139"
},
{
"name": "CVE-2020-24587",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24587"
},
{
"name": "CVE-2021-33034",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33034"
},
{
"name": "CVE-2021-29154",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29154"
},
{
"name": "CVE-2020-36385",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36385"
},
{
"name": "CVE-2021-3490",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3490"
},
{
"name": "CVE-2020-24588",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24588"
},
{
"name": "CVE-2020-24586",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24586"
},
{
"name": "CVE-2021-0129",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0129"
},
{
"name": "CVE-2020-36386",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36386"
},
{
"name": "CVE-2020-36322",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36322"
},
{
"name": "CVE-2020-26558",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26558"
},
{
"name": "CVE-2021-3489",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3489"
},
{
"name": "CVE-2020-26147",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26147"
},
{
"name": "CVE-2020-26141",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26141"
},
{
"name": "CVE-2021-23134",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23134"
},
{
"name": "CVE-2021-32399",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32399"
},
{
"name": "CVE-2021-28660",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-28660"
},
{
"name": "CVE-2021-3491",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3491"
},
{
"name": "CVE-2021-33200",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33200"
},
{
"name": "CVE-2020-26145",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26145"
}
],
"initial_release_date": "2021-07-01T00:00:00",
"last_revision_date": "2021-07-01T00:00:00",
"links": [],
"reference": "CERTFR-2021-AVI-500",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2021-07-01T00:00:00.000000"
}
],
"risks": [
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Ex\u00e9cution de code arbitraire"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux de\nSUSE. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une\nex\u00e9cution de code arbitraire, un d\u00e9ni de service et une atteinte \u00e0\nl\u0027int\u00e9grit\u00e9 des donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de SUSE",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20212208-1 du 1 juillet 2021",
"url": "https://www.suse.com/support/update/announcement/2021/suse-su-20212208-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20212202-1 du 1 juillet 2021",
"url": "https://www.suse.com/support/update/announcement/2021/suse-su-20212202-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20212198-1 du 1 juillet 2021",
"url": "https://www.suse.com/support/update/announcement/2021/suse-su-20212198-1/"
}
]
}
CERTFR-2021-AVI-653
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans le noyau Linux d'Ubuntu. Elles permettent à un attaquant de provoquer une exécution de code arbitraire, un déni de service et une atteinte à la confidentialité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Ubuntu 20.04 LTS",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2021-38208",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-38208"
},
{
"name": "CVE-2021-3573",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3573"
},
{
"name": "CVE-2021-0129",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0129"
},
{
"name": "CVE-2021-3564",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3564"
},
{
"name": "CVE-2020-26558",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26558"
},
{
"name": "CVE-2021-28691",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-28691"
}
],
"initial_release_date": "2021-08-25T00:00:00",
"last_revision_date": "2021-08-25T00:00:00",
"links": [],
"reference": "CERTFR-2021-AVI-653",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2021-08-25T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux\nd\u0027Ubuntu. Elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de\ncode arbitraire, un d\u00e9ni de service et une atteinte \u00e0 la confidentialit\u00e9\ndes donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux d\u0027Ubuntu",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 le noyau Linux d\u0027Ubuntu USN-5050-1 du 24 ao\u00fbt 2021",
"url": "https://ubuntu.com/security/notices/USN-5050-1"
}
]
}
CERTFR-2021-AVI-563
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans le noyau Linux de SUSE. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire, un déni de service et une atteinte à l'intégrité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| SUSE | N/A | SUSE Linux Enterprise Module for Basesystem 15-SP2 | ||
| SUSE | SUSE Linux Enterprise High Performance Computing | SUSE Linux Enterprise High Performance Computing 15-SP1-LTSS | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server for SAP 12-SP4 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 12-SP4-LTSS | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 12-SP3-LTSS | ||
| SUSE | N/A | SUSE CaaS Platform 4.0 | ||
| SUSE | N/A | SUSE OpenStack Cloud Crowbar 9 | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Realtime 15-SP2 | ||
| SUSE | SUSE Linux Enterprise High Performance Computing | SUSE Linux Enterprise High Performance Computing 15-ESPOS | ||
| SUSE | SUSE Linux Enterprise High Performance Computing | SUSE Linux Enterprise High Performance Computing 15-SP1-ESPOS | ||
| SUSE | N/A | SUSE MicroOS 5.0 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server for SAP 12-SP3 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server for SAP 15-SP1 | ||
| SUSE | SUSE Manager Server | SUSE Manager Server 4.0 | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Live Patching 15-SP1 | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Legacy Software 15-SP2 | ||
| SUSE | SUSE Manager Proxy | SUSE Manager Proxy 4.0 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 15-SP1-BCL | ||
| SUSE | N/A | SUSE Linux Enterprise High Availability 15-SP2 | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Development Tools 15-SP2 | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Live Patching 15 | ||
| SUSE | SUSE Linux Enterprise High Performance Computing | SUSE Linux Enterprise High Performance Computing 15-LTSS | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 15-LTSS | ||
| SUSE | N/A | SUSE Linux Enterprise High Availability 15 | ||
| SUSE | N/A | SUSE Linux Enterprise Workstation Extension 15-SP2 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 15-SP1-LTSS | ||
| SUSE | N/A | SUSE OpenStack Cloud 9 | ||
| SUSE | N/A | SUSE Enterprise Storage 6 | ||
| SUSE | N/A | SUSE Linux Enterprise High Availability 15-SP1 | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Live Patching 15-SP2 | ||
| SUSE | N/A | SUSE Linux Enterprise High Availability 12-SP4 | ||
| SUSE | SUSE Linux Enterprise Live Patching | SUSE Linux Enterprise Live Patching 12-SP4 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server for SAP 15 | ||
| SUSE | SUSE Manager Retail Branch Server | SUSE Manager Retail Branch Server 4.0 |
| Title | Publication Time | Tags | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "SUSE Linux Enterprise Module for Basesystem 15-SP2",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Performance Computing 15-SP1-LTSS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP 12-SP4",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 12-SP4-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 12-SP3-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE CaaS Platform 4.0",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE OpenStack Cloud Crowbar 9",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module for Realtime 15-SP2",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Performance Computing 15-ESPOS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Performance Computing 15-SP1-ESPOS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE MicroOS 5.0",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP 12-SP3",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP 15-SP1",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Manager Server 4.0",
"product": {
"name": "SUSE Manager Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module for Live Patching 15-SP1",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module for Legacy Software 15-SP2",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Manager Proxy 4.0",
"product": {
"name": "SUSE Manager Proxy",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 15-SP1-BCL",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Availability 15-SP2",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module for Development Tools 15-SP2",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module for Live Patching 15",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Performance Computing 15-LTSS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 15-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Availability 15",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Workstation Extension 15-SP2",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 15-SP1-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE OpenStack Cloud 9",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Enterprise Storage 6",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Availability 15-SP1",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module for Live Patching 15-SP2",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Availability 12-SP4",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Live Patching 12-SP4",
"product": {
"name": "SUSE Linux Enterprise Live Patching",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP 15",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Manager Retail Branch Server 4.0",
"product": {
"name": "SUSE Manager Retail Branch Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2020-26139",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26139"
},
{
"name": "CVE-2020-24587",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24587"
},
{
"name": "CVE-2021-33034",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33034"
},
{
"name": "CVE-2021-34693",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-34693"
},
{
"name": "CVE-2020-36385",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36385"
},
{
"name": "CVE-2021-0605",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0605"
},
{
"name": "CVE-2021-35039",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35039"
},
{
"name": "CVE-2021-3573",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3573"
},
{
"name": "CVE-2020-24588",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24588"
},
{
"name": "CVE-2021-23133",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23133"
},
{
"name": "CVE-2020-24586",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24586"
},
{
"name": "CVE-2021-0129",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0129"
},
{
"name": "CVE-2020-36386",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36386"
},
{
"name": "CVE-2021-3609",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3609"
},
{
"name": "CVE-2021-0512",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0512"
},
{
"name": "CVE-2021-33909",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33909"
},
{
"name": "CVE-2020-26558",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26558"
},
{
"name": "CVE-2021-22555",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22555"
},
{
"name": "CVE-2021-33624",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33624"
},
{
"name": "CVE-2020-26147",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26147"
},
{
"name": "CVE-2021-3612",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3612"
},
{
"name": "CVE-2020-26141",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26141"
},
{
"name": "CVE-2021-23134",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23134"
},
{
"name": "CVE-2021-32399",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32399"
},
{
"name": "CVE-2021-3491",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3491"
},
{
"name": "CVE-2021-33200",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33200"
},
{
"name": "CVE-2020-26145",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26145"
}
],
"initial_release_date": "2021-07-22T00:00:00",
"last_revision_date": "2021-07-22T00:00:00",
"links": [
{
"title": "R\u00e9f\u00e9rence CVE CVE-2020-24586",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24586"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2021-33034",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33034"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2021-33624",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33624"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2021-22555",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22555"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2021-33200",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33200"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2021-3612",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3612"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2021-34693",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-34693"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20212427-1 du 21 juillet 2021",
"url": "https://www.suse.com/support/update/announcement/2021/suse-su-20212427-1/"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20212422-1 du 21 juillet 2021",
"url": "https://www.suse.com/support/update/announcement/2021/suse-su-20212422-1/"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2020-26558",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26558"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20212421-1 du 21 juillet 2021",
"url": "https://www.suse.com/support/update/announcement/2021/suse-su-20212421-1/"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2020-24587",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24587"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2020-26141",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26141"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2021-3573",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3573"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2020-26147",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26147"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2020-26139",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26139"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2021-3491",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3491"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2021-3609",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3609"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2021-0605",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0605"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2021-35039",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35039"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2021-23134",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23134"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20212426-1 du 21 juillet 2021",
"url": "https://www.suse.com/support/update/announcement/2021/suse-su-20212426-1/"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2021-33909",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33909"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2021-0512",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0512"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2020-24588",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24588"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20212433-1 du 21 juillet 2021",
"url": "https://www.suse.com/support/update/announcement/2021/suse-su-20212433-1"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2020-26145",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26145"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2021-32399",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32399"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2021-0129",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0129"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2021-23133",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23133"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2020-36385",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36385"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2020-36386",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36386"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20212438-1 du 21 juillet 2021",
"url": "https://www.suse.com/support/update/announcement/2021/suse-su-20212438-1/"
}
],
"reference": "CERTFR-2021-AVI-563",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2021-07-22T00:00:00.000000"
}
],
"risks": [
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Ex\u00e9cution de code arbitraire"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux de\nSUSE. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une\nex\u00e9cution de code arbitraire, un d\u00e9ni de service et une atteinte \u00e0\nl\u0027int\u00e9grit\u00e9 des donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de SUSE",
"vendor_advisories": []
}
CERTFR-2021-AVI-493
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans le noyau Linux de SUSE. Elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur, une atteinte à l'intégrité des données et une atteinte à la confidentialité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| SUSE | N/A | SUSE Linux Enterprise High Availability 15-SP3 | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Live Patching 15-SP3 | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Basesystem 15-SP3 | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Development Tools 15-SP3 | ||
| SUSE | N/A | SUSE Linux Enterprise Workstation Extension 15-SP3 | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Legacy Software 15-SP3 |
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "SUSE Linux Enterprise High Availability 15-SP3",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module for Live Patching 15-SP3",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module for Basesystem 15-SP3",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module for Development Tools 15-SP3",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Workstation Extension 15-SP3",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module for Legacy Software 15-SP3",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2020-36385",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36385"
},
{
"name": "CVE-2021-0129",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0129"
},
{
"name": "CVE-2020-36386",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36386"
},
{
"name": "CVE-2020-26558",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26558"
}
],
"initial_release_date": "2021-06-29T00:00:00",
"last_revision_date": "2021-06-29T00:00:00",
"links": [],
"reference": "CERTFR-2021-AVI-493",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2021-06-29T00:00:00.000000"
}
],
"risks": [
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux de\nSUSE. Elles permettent \u00e0 un attaquant de provoquer un probl\u00e8me de\ns\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur, une atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des\ndonn\u00e9es et une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de SUSE",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20212184-1 du 28 juin 2021",
"url": "https://www.suse.com/support/update/announcement/2021/suse-su-20212184-1/"
}
]
}
CERTFR-2022-AVI-176
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans le noyau Linux d'Ubuntu. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire, un déni de service à distance et une atteinte à l'intégrité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | ||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Ubuntu 16.04 ESM",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 18.04 LTS",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 21.10",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 20.04 LTS",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 14.04 ESM",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2021-45485",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-45485"
},
{
"name": "CVE-2021-44879",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44879"
},
{
"name": "CVE-2021-33034",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33034"
},
{
"name": "CVE-2021-34693",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-34693"
},
{
"name": "CVE-2021-4202",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4202"
},
{
"name": "CVE-2021-3679",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3679"
},
{
"name": "CVE-2021-3483",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3483"
},
{
"name": "CVE-2021-38204",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-38204"
},
{
"name": "CVE-2021-28711",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-28711"
},
{
"name": "CVE-2021-43975",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-43975"
},
{
"name": "CVE-2021-28713",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-28713"
},
{
"name": "CVE-2021-4083",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4083"
},
{
"name": "CVE-2022-0330",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0330"
},
{
"name": "CVE-2021-28712",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-28712"
},
{
"name": "CVE-2021-0129",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0129"
},
{
"name": "CVE-2022-22942",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22942"
},
{
"name": "CVE-2021-4155",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4155"
},
{
"name": "CVE-2021-3564",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3564"
},
{
"name": "CVE-2021-43976",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-43976"
},
{
"name": "CVE-2020-26558",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26558"
},
{
"name": "CVE-2021-22600",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22600"
},
{
"name": "CVE-2022-24448",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24448"
},
{
"name": "CVE-2022-0492",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0492"
},
{
"name": "CVE-2021-39685",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39685"
},
{
"name": "CVE-2020-26147",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26147"
},
{
"name": "CVE-2022-0435",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0435"
},
{
"name": "CVE-2021-3612",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3612"
},
{
"name": "CVE-2021-28714",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-28714"
},
{
"name": "CVE-2021-42008",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42008"
},
{
"name": "CVE-2021-28972",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-28972"
},
{
"name": "CVE-2021-28715",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-28715"
},
{
"name": "CVE-2022-24959",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24959"
}
],
"initial_release_date": "2022-02-23T00:00:00",
"last_revision_date": "2022-02-23T00:00:00",
"links": [],
"reference": "CERTFR-2022-AVI-176",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2022-02-23T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Ex\u00e9cution de code arbitraire"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux\nd\u0027Ubuntu. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer\nune ex\u00e9cution de code arbitraire, un d\u00e9ni de service \u00e0 distance et une\natteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux d\u0027Ubuntu",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-5302-1 du 22 f\u00e9vrier 2022",
"url": "https://ubuntu.com/security/notices/USN-5302-1"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-5295-2 du 22 f\u00e9vrier 2022",
"url": "https://ubuntu.com/security/notices/USN-5295-2"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-5298-1 du 22 f\u00e9vrier 2022",
"url": "https://ubuntu.com/security/notices/USN-5298-1"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-5297-1 du 22 f\u00e9vrier 2022",
"url": "https://ubuntu.com/security/notices/USN-5297-1"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-5294-2 du 22 f\u00e9vrier 2022",
"url": "https://ubuntu.com/security/notices/USN-5294-2"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-5299-1 du 22 f\u00e9vrier 2022",
"url": "https://ubuntu.com/security/notices/USN-5299-1"
}
]
}
CERTFR-2021-AVI-446
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans les produits Intel. Elles permettent à un attaquant de provoquer un déni de service à distance, une atteinte à la confidentialité des données et une élévation de privilèges.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Intel | N/A | Intel RealSense ID F450 et F455 sans le dernier correctif de sécurité | ||
| Intel | N/A | Intel Optane DC Persistent Memory for Windows versions antérieures à 2.00.00.3842 et 1.00.00.3515 | ||
| Intel | N/A | Intel VTune Profiler versions antérieures à 2021.1.1 | ||
| Intel | N/A | Intel SGX (se référer au bulletin de sécurité intel-sa-00477 de l'éditeur, cf. section Documentation) | ||
| Intel | N/A | les produits Intel Wireless Bluetooth et Killer Bluetooth (se référer au bulletin de sécurité intel-sa-00520 de l'éditeur, cf. section Documentation) | ||
| Intel | N/A | Intel SSD Data Center Tool versions téléchargées avant le 31 décembre 2020, Intel recommande de remplacer cet outil par Intel Memory and Storage Tool (MAS) for SSD | ||
| Intel | N/A | Intel NUC M15 Laptop Kit Driver Pack versions antérieures à 1.1 | ||
| Intel | N/A | Intel Rapid Storage Technology versions antérieures à 17.9.1.1009.5, 18.0.3.1148.4 et 18.1.0.1028.2 | ||
| Intel | N/A | les processeurs Intel (se référer aux bulletins de sécurité intel-sa-00442, intel-sa-00463, intel-sa-00521, intel-sa-00459, intel-sa-00464, intel-sa-00465, intel-sa-00500 et intel-sa-00516 de l'éditeur, cf. section Documentation) | ||
| Intel | N/A | les versions du noyau Linux antérieures à 5.13 qui supportent BlueZ | ||
| Intel | N/A | Intel Processor Diagnostic Tool versions antérieures à 4.1.5.37 | ||
| Intel | N/A | les pilotes WiFi Intel ProSet/Wireless versions antérieures à 22.0 | ||
| Intel | N/A | Intel Computing Improvement Program versions antérieures à 2.4.6522 | ||
| Intel | N/A | Intel DSA versions antérieures à 20.11.50.9 | ||
| Intel | N/A | les pilotes Intel NUC 9 Extreme Laptop Kit LAN versions antérieures à 10.45 | ||
| Intel | N/A | Intel Server Board M10JNP2SB sans la mise à jour comprenant EFI BIOS 7215 et BMC 8100.01.08 | ||
| Intel | N/A | Intel Unite Client pour Windows versions antérieures à 4.2.25031 | ||
| Intel | N/A | Intel Thunderbolt (se référer au bulletin de sécurité intel-sa-00401 de l'éditeur, cf. section Documentation) | ||
| Intel | N/A | Intel Brand Verification Tool versions antérieures à 11.0.0.1225 | ||
| Intel | N/A | Intel Server System gammes R1000WF et R2000WF, Server Board gamme S2600WF, Server Board gamme S2600ST, Compute Module gamme HNS2600BP et Server Board gamme S2600BP versions antérieures à 2.48.ce3e3bd2 | ||
| Intel | N/A | Intel NUC (se référer au bulletin de sécurité intel-sa-00511 de l'éditeur, cf. section Documentation) | ||
| Intel | N/A | les pilotes FPGA OPAE pour Linux (se référer au bulletin de sécurité intel-sa-00440 de l'éditeur, cf. section Documentation) | ||
| Intel | N/A | Intel IPP versions antérieures à 2020 update 1 |
| Title | Publication Time | Tags | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Intel RealSense ID F450 et F455 sans le dernier correctif de s\u00e9curit\u00e9",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel Optane DC Persistent Memory for Windows versions ant\u00e9rieures \u00e0 2.00.00.3842 et 1.00.00.3515",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel VTune Profiler versions ant\u00e9rieures \u00e0 2021.1.1",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel SGX (se r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 intel-sa-00477 de l\u0027\u00e9diteur, cf. section Documentation)",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "les produits Intel Wireless Bluetooth et Killer Bluetooth (se r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 intel-sa-00520 de l\u0027\u00e9diteur, cf. section Documentation)",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel SSD Data Center Tool versions t\u00e9l\u00e9charg\u00e9es avant le 31 d\u00e9cembre 2020, Intel recommande de remplacer cet outil par Intel Memory and Storage Tool (MAS) for SSD",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel NUC M15 Laptop Kit Driver Pack versions ant\u00e9rieures \u00e0 1.1",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel Rapid Storage Technology versions ant\u00e9rieures \u00e0 17.9.1.1009.5, 18.0.3.1148.4 et 18.1.0.1028.2",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "les processeurs Intel (se r\u00e9f\u00e9rer aux bulletins de s\u00e9curit\u00e9 intel-sa-00442, intel-sa-00463, intel-sa-00521, intel-sa-00459, intel-sa-00464, intel-sa-00465, intel-sa-00500 et intel-sa-00516 de l\u0027\u00e9diteur, cf. section Documentation)",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "les versions du noyau Linux ant\u00e9rieures \u00e0 5.13 qui supportent BlueZ",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel Processor Diagnostic Tool versions ant\u00e9rieures \u00e0 4.1.5.37",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "les pilotes WiFi Intel ProSet/Wireless versions ant\u00e9rieures \u00e0 22.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel Computing Improvement Program versions ant\u00e9rieures \u00e0 2.4.6522",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel DSA versions ant\u00e9rieures \u00e0 20.11.50.9",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "les pilotes Intel NUC 9 Extreme Laptop Kit LAN versions ant\u00e9rieures \u00e0 10.45",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel Server Board M10JNP2SB sans la mise \u00e0 jour comprenant EFI BIOS 7215 et BMC 8100.01.08",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel Unite Client pour Windows versions ant\u00e9rieures \u00e0 4.2.25031",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel Thunderbolt (se r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 intel-sa-00401 de l\u0027\u00e9diteur, cf. section Documentation)",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel Brand Verification Tool versions ant\u00e9rieures \u00e0 11.0.0.1225",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel Server System gammes R1000WF et R2000WF, Server Board gamme S2600WF, Server Board gamme S2600ST, Compute Module gamme HNS2600BP et Server Board gamme S2600BP versions ant\u00e9rieures \u00e0 2.48.ce3e3bd2",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel NUC (se r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 intel-sa-00511 de l\u0027\u00e9diteur, cf. section Documentation)",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "les pilotes FPGA OPAE pour Linux (se r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 intel-sa-00440 de l\u0027\u00e9diteur, cf. section Documentation)",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel IPP versions ant\u00e9rieures \u00e0 2020 update 1",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2021-0090",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0090"
},
{
"name": "CVE-2020-24516",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24516"
},
{
"name": "CVE-2020-12288",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12288"
},
{
"name": "CVE-2020-8700",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8700"
},
{
"name": "CVE-2020-24474",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24474"
},
{
"name": "CVE-2021-0134",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0134"
},
{
"name": "CVE-2021-0094",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0094"
},
{
"name": "CVE-2021-0086",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0086"
},
{
"name": "CVE-2020-12289",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12289"
},
{
"name": "CVE-2020-12293",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12293"
},
{
"name": "CVE-2021-0089",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0089"
},
{
"name": "CVE-2021-0051",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0051"
},
{
"name": "CVE-2020-12292",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12292"
},
{
"name": "CVE-2021-0098",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0098"
},
{
"name": "CVE-2021-0095",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0095"
},
{
"name": "CVE-2021-0052",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0052"
},
{
"name": "CVE-2020-12291",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12291"
},
{
"name": "CVE-2020-12360",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12360"
},
{
"name": "CVE-2021-0073",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0073"
},
{
"name": "CVE-2021-0056",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0056"
},
{
"name": "CVE-2021-0132",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0132"
},
{
"name": "CVE-2021-0001",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0001"
},
{
"name": "CVE-2020-8703",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8703"
},
{
"name": "CVE-2021-0100",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0100"
},
{
"name": "CVE-2020-12357",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12357"
},
{
"name": "CVE-2021-0129",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0129"
},
{
"name": "CVE-2020-24475",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24475"
},
{
"name": "CVE-2020-8702",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8702"
},
{
"name": "CVE-2021-0058",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0058"
},
{
"name": "CVE-2021-0097",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0097"
},
{
"name": "CVE-2020-24513",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24513"
},
{
"name": "CVE-2020-24514",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24514"
},
{
"name": "CVE-2021-0104",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0104"
},
{
"name": "CVE-2021-0108",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0108"
},
{
"name": "CVE-2020-24473",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24473"
},
{
"name": "CVE-2020-24507",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24507"
},
{
"name": "CVE-2021-0070",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0070"
},
{
"name": "CVE-2020-12358",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12358"
},
{
"name": "CVE-2020-24509",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24509"
},
{
"name": "CVE-2020-26558",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26558"
},
{
"name": "CVE-2021-0106",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0106"
},
{
"name": "CVE-2020-12290",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12290"
},
{
"name": "CVE-2021-0057",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0057"
},
{
"name": "CVE-2020-24485",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24485"
},
{
"name": "CVE-2021-0113",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0113"
},
{
"name": "CVE-2020-8670",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8670"
},
{
"name": "CVE-2020-24515",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24515"
},
{
"name": "CVE-2020-8704",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8704"
},
{
"name": "CVE-2020-12296",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12296"
},
{
"name": "CVE-2021-0102",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0102"
},
{
"name": "CVE-2020-12294",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12294"
},
{
"name": "CVE-2020-12295",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12295"
},
{
"name": "CVE-2021-0101",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0101"
},
{
"name": "CVE-2020-12359",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12359"
},
{
"name": "CVE-2021-0077",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0077"
},
{
"name": "CVE-2021-0105",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0105"
},
{
"name": "CVE-2020-24486",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24486"
},
{
"name": "CVE-2021-0131",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0131"
},
{
"name": "CVE-2021-0067",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0067"
},
{
"name": "CVE-2020-24506",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24506"
},
{
"name": "CVE-2020-24512",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24512"
},
{
"name": "CVE-2021-0074",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0074"
},
{
"name": "CVE-2020-26555",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26555"
},
{
"name": "CVE-2021-24489",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-24489"
},
{
"name": "CVE-2020-24511",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24511"
},
{
"name": "CVE-2021-0055",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0055"
},
{
"name": "CVE-2021-0133",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0133"
},
{
"name": "CVE-2021-0112",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0112"
},
{
"name": "CVE-2021-0054",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0054"
}
],
"initial_release_date": "2021-06-09T00:00:00",
"last_revision_date": "2021-06-09T00:00:00",
"links": [],
"reference": "CERTFR-2021-AVI-446",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2021-06-09T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Intel.\nElles permettent \u00e0 un attaquant de provoquer un d\u00e9ni de service \u00e0\ndistance, une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es et une \u00e9l\u00e9vation\nde privil\u00e8ges.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Intel",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00516 du 08 juin 2021",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00516.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00463 du 08 juin 2021",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00463.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00510 du 08 juin 2021",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00510.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00506 du 08 juin 2021",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00506.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00505 du 08 juin 2021",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00505.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00545 du 08 juin 2021",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00545.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00520 du 08 juin 2021",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00520.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00442 du 08 juin 2021",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00442.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00477 du 08 juin 2021",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00477.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00476 du 08 juin 2021",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00476.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00472 du 08 juin 2021",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00472.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00530 du 08 juin 2021",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00530.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00458 du 08 juin 2021",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00458.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00521 du 08 juin 2021",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00521.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00401 du 08 juin 2021",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00401.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00440 du 08 juin 2021",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00440.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00507 du 08 juin 2021",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00507.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00459 du 08 juin 2021",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00459.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00541 du 08 juin 2021",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00541.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00474 du 08 juin 2021",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00474.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00500 du 08 juin 2021",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00500.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00518 du 08 juin 2021",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00518.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00546 du 08 juin 2021",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00546.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00517 du 08 juin 2021",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00517.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00511 du 08 juin 2021",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00511.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00537 du 08 juin 2021",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00537.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00465 du 08 juin 2021",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00465.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00460 du 08 juin 2021",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00460.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00464 du 08 juin 2021",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00464.html"
}
]
}
CERTFR-2024-AVI-0693
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans le noyau Linux de SUSE. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire, une élévation de privilèges et une atteinte à la confidentialité des données.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| SUSE | N/A | SUSE Linux Enterprise Micro for Rancher 5.3 | ||
| SUSE | N/A | Legacy Module 15-SP5 | ||
| SUSE | N/A | openSUSE Leap Micro 5.5 | ||
| SUSE | N/A | SUSE Linux Enterprise High Performance Computing 15 SP5 | ||
| SUSE | N/A | SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 | ||
| SUSE | N/A | SUSE Linux Enterprise Server for SAP Applications 15 SP2 | ||
| SUSE | N/A | SUSE Linux Enterprise Micro 5.3 | ||
| SUSE | N/A | SUSE Manager Proxy 4.3 | ||
| SUSE | N/A | SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 | ||
| SUSE | N/A | SUSE Linux Enterprise Micro for Rancher 5.2 | ||
| SUSE | N/A | SUSE Linux Enterprise High Performance Computing 12 SP5 | ||
| SUSE | N/A | SUSE Linux Enterprise Desktop 15 SP5 | ||
| SUSE | N/A | SUSE Linux Enterprise Server 12 SP5 | ||
| SUSE | N/A | SUSE Linux Enterprise High Availability Extension 15 SP4 | ||
| SUSE | N/A | Public Cloud Module 15-SP6 | ||
| SUSE | N/A | SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE 11-SP4 | ||
| SUSE | N/A | SUSE Linux Enterprise Micro for Rancher 5.4 | ||
| SUSE | N/A | SUSE Linux Enterprise Live Patching 15-SP4 | ||
| SUSE | N/A | SUSE Manager Retail Branch Server 4.3 | ||
| SUSE | N/A | SUSE Linux Enterprise High Availability Extension 15 SP5 | ||
| SUSE | N/A | openSUSE Leap 15.4 | ||
| SUSE | N/A | SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 | ||
| SUSE | N/A | SUSE Linux Enterprise Server 11 SP4 | ||
| SUSE | N/A | SUSE Linux Enterprise Real Time 12 SP5 | ||
| SUSE | N/A | SUSE Linux Enterprise Live Patching 15-SP2 | ||
| SUSE | N/A | SUSE Linux Enterprise Server for SAP Applications 15 SP4 | ||
| SUSE | N/A | SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 | ||
| SUSE | N/A | openSUSE Leap 15.5 | ||
| SUSE | N/A | SUSE Manager Server 4.3 | ||
| SUSE | N/A | SUSE Manager Retail Branch Server 4.1 | ||
| SUSE | N/A | SUSE Linux Enterprise High Performance Computing 15 SP4 | ||
| SUSE | N/A | SUSE Linux Enterprise High Performance Computing 15 SP2 | ||
| SUSE | N/A | SUSE Linux Enterprise Live Patching 15-SP6 | ||
| SUSE | N/A | SUSE Linux Enterprise Server 15 SP5 | ||
| SUSE | N/A | SUSE Linux Enterprise Server for SAP Applications 15 SP5 | ||
| SUSE | N/A | SUSE Linux Enterprise Real Time 15 SP5 | ||
| SUSE | N/A | SUSE Linux Enterprise Live Patching 15-SP5 | ||
| SUSE | N/A | SUSE Manager Server 4.1 | ||
| SUSE | N/A | SUSE Linux Enterprise Micro 5.2 | ||
| SUSE | N/A | SUSE Linux Enterprise Real Time 15 SP6 | ||
| SUSE | N/A | openSUSE Leap 15.6 | ||
| SUSE | N/A | SUSE Real Time Module 15-SP5 | ||
| SUSE | N/A | SUSE Linux Enterprise High Availability Extension 15 SP2 | ||
| SUSE | N/A | SUSE Linux Enterprise Server 15 SP4 | ||
| SUSE | N/A | SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 | ||
| SUSE | N/A | SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 | ||
| SUSE | N/A | SUSE Linux Enterprise Server 15 SP2 Business Critical Linux 15-SP2 | ||
| SUSE | N/A | SUSE Linux Enterprise Real Time 15 SP4 | ||
| SUSE | N/A | SUSE Manager Proxy 4.1 | ||
| SUSE | N/A | Basesystem Module 15-SP5 | ||
| SUSE | N/A | SUSE Linux Enterprise Workstation Extension 15 SP5 | ||
| SUSE | N/A | SUSE Linux Enterprise Server for SAP Applications 12 SP5 | ||
| SUSE | N/A | Development Tools Module 15-SP5 | ||
| SUSE | N/A | SUSE Linux Enterprise Micro 5.1 | ||
| SUSE | N/A | SUSE Linux Enterprise Micro 5.4 | ||
| SUSE | N/A | SUSE Linux Enterprise Server 15 SP2 | ||
| SUSE | N/A | SUSE Linux Enterprise Server for SAP Applications 15 SP6 | ||
| SUSE | N/A | SUSE Linux Enterprise Server 15 SP6 | ||
| SUSE | N/A | SUSE Linux Enterprise Micro 5.5 |
| Title | Publication Time | Tags | ||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "SUSE Linux Enterprise Micro for Rancher 5.3",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "Legacy Module 15-SP5",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "openSUSE Leap Micro 5.5",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Performance Computing 15 SP5",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP Applications 15 SP2",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Micro 5.3",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Manager Proxy 4.3",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Micro for Rancher 5.2",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Performance Computing 12 SP5",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Desktop 15 SP5",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 12 SP5",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Availability Extension 15 SP4",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "Public Cloud Module 15-SP6",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE 11-SP4",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Micro for Rancher 5.4",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Live Patching 15-SP4",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Manager Retail Branch Server 4.3",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Availability Extension 15 SP5",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "openSUSE Leap 15.4",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 11 SP4",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Real Time 12 SP5",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Live Patching 15-SP2",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "openSUSE Leap 15.5",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Manager Server 4.3",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Manager Retail Branch Server 4.1",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Performance Computing 15 SP4",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Performance Computing 15 SP2",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Live Patching 15-SP6",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 15 SP5",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Real Time 15 SP5",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Live Patching 15-SP5",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Manager Server 4.1",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Micro 5.2",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Real Time 15 SP6",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "openSUSE Leap 15.6",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Real Time Module 15-SP5",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Availability Extension 15 SP2",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 15 SP4",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Performance Computing LTSS 15 SP4",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 15 SP2 Business Critical Linux 15-SP2",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Real Time 15 SP4",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Manager Proxy 4.1",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "Basesystem Module 15-SP5",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Workstation Extension 15 SP5",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "Development Tools Module 15-SP5",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Micro 5.1",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Micro 5.4",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 15 SP2",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 15 SP6",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Micro 5.5",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2020-26558",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26558"
},
{
"name": "CVE-2021-0129",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0129"
},
{
"name": "CVE-2021-43389",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-43389"
},
{
"name": "CVE-2022-20368",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-20368"
},
{
"name": "CVE-2022-0854",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0854"
},
{
"name": "CVE-2022-2964",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2964"
},
{
"name": "CVE-2022-28748",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28748"
},
{
"name": "CVE-2023-1582",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1582"
},
{
"name": "CVE-2023-37453",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-37453"
},
{
"name": "CVE-2023-4244",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4244"
},
{
"name": "CVE-2023-24023",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24023"
},
{
"name": "CVE-2023-51780",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-51780"
},
{
"name": "CVE-2024-26625",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26625"
},
{
"name": "CVE-2023-52594",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52594"
},
{
"name": "CVE-2024-26585",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26585"
},
{
"name": "CVE-2024-26633",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26633"
},
{
"name": "CVE-2023-52435",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52435"
},
{
"name": "CVE-2023-52612",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52612"
},
{
"name": "CVE-2023-52591",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52591"
},
{
"name": "CVE-2023-52615",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52615"
},
{
"name": "CVE-2024-26659",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26659"
},
{
"name": "CVE-2023-52507",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52507"
},
{
"name": "CVE-2023-52623",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52623"
},
{
"name": "CVE-2023-52619",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52619"
},
{
"name": "CVE-2024-26584",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26584"
},
{
"name": "CVE-2024-26800",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26800"
},
{
"name": "CVE-2024-26720",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26720"
},
{
"name": "CVE-2023-52622",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52622"
},
{
"name": "CVE-2024-26814",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26814"
},
{
"name": "CVE-2024-26583",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26583"
},
{
"name": "CVE-2024-26663",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26663"
},
{
"name": "CVE-2024-26750",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26750"
},
{
"name": "CVE-2024-26813",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26813"
},
{
"name": "CVE-2024-27437",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27437"
},
{
"name": "CVE-2024-26735",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26735"
},
{
"name": "CVE-2024-26676",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26676"
},
{
"name": "CVE-2024-26802",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26802"
},
{
"name": "CVE-2024-26665",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26665"
},
{
"name": "CVE-2024-26780",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26780"
},
{
"name": "CVE-2024-26641",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26641"
},
{
"name": "CVE-2023-52580",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52580"
},
{
"name": "CVE-2024-26863",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26863"
},
{
"name": "CVE-2024-27025",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27025"
},
{
"name": "CVE-2024-26845",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26845"
},
{
"name": "CVE-2024-26961",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26961"
},
{
"name": "CVE-2024-26615",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26615"
},
{
"name": "CVE-2024-26889",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26889"
},
{
"name": "CVE-2024-26880",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26880"
},
{
"name": "CVE-2024-26644",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26644"
},
{
"name": "CVE-2024-26935",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26935"
},
{
"name": "CVE-2024-27015",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27015"
},
{
"name": "CVE-2024-27020",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27020"
},
{
"name": "CVE-2024-26973",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26973"
},
{
"name": "CVE-2024-26635",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26635"
},
{
"name": "CVE-2024-26924",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26924"
},
{
"name": "CVE-2024-26920",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26920"
},
{
"name": "CVE-2024-27016",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27016"
},
{
"name": "CVE-2024-26976",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26976"
},
{
"name": "CVE-2024-26636",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26636"
},
{
"name": "CVE-2024-27065",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27065"
},
{
"name": "CVE-2024-27019",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27019"
},
{
"name": "CVE-2024-26923",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26923"
},
{
"name": "CVE-2024-26826",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26826"
},
{
"name": "CVE-2024-26623",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26623"
},
{
"name": "CVE-2023-52472",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52472"
},
{
"name": "CVE-2023-38417",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38417"
},
{
"name": "CVE-2023-47210",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47210"
},
{
"name": "CVE-2021-47219",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47219"
},
{
"name": "CVE-2021-47197",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47197"
},
{
"name": "CVE-2024-26830",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26830"
},
{
"name": "CVE-2021-47201",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47201"
},
{
"name": "CVE-2021-47194",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47194"
},
{
"name": "CVE-2021-47191",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47191"
},
{
"name": "CVE-2023-52882",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52882"
},
{
"name": "CVE-2024-27398",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27398"
},
{
"name": "CVE-2024-35848",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35848"
},
{
"name": "CVE-2024-35947",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35947"
},
{
"name": "CVE-2024-36017",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36017"
},
{
"name": "CVE-2024-36889",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36889"
},
{
"name": "CVE-2024-36902",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36902"
},
{
"name": "CVE-2024-36904",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36904"
},
{
"name": "CVE-2024-36916",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36916"
},
{
"name": "CVE-2024-36919",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36919"
},
{
"name": "CVE-2024-36934",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36934"
},
{
"name": "CVE-2024-36939",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36939"
},
{
"name": "CVE-2024-36940",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36940"
},
{
"name": "CVE-2024-36941",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36941"
},
{
"name": "CVE-2024-36946",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36946"
},
{
"name": "CVE-2024-36950",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36950"
},
{
"name": "CVE-2024-36957",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36957"
},
{
"name": "CVE-2024-36959",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36959"
},
{
"name": "CVE-2021-47275",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47275"
},
{
"name": "CVE-2021-47388",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47388"
},
{
"name": "CVE-2021-47395",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47395"
},
{
"name": "CVE-2021-47399",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47399"
},
{
"name": "CVE-2021-47402",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47402"
},
{
"name": "CVE-2021-47403",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47403"
},
{
"name": "CVE-2021-47405",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47405"
},
{
"name": "CVE-2021-47438",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47438"
},
{
"name": "CVE-2021-47441",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47441"
},
{
"name": "CVE-2021-47468",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47468"
},
{
"name": "CVE-2021-47498",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47498"
},
{
"name": "CVE-2021-47501",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47501"
},
{
"name": "CVE-2021-47506",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47506"
},
{
"name": "CVE-2021-47516",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47516"
},
{
"name": "CVE-2021-47520",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47520"
},
{
"name": "CVE-2021-47534",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47534"
},
{
"name": "CVE-2021-47538",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47538"
},
{
"name": "CVE-2021-47542",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47542"
},
{
"name": "CVE-2021-47555",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47555"
},
{
"name": "CVE-2021-47559",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47559"
},
{
"name": "CVE-2023-52656",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52656"
},
{
"name": "CVE-2023-52669",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52669"
},
{
"name": "CVE-2023-52683",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52683"
},
{
"name": "CVE-2023-52686",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52686"
},
{
"name": "CVE-2023-52693",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52693"
},
{
"name": "CVE-2023-52699",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52699"
},
{
"name": "CVE-2023-52743",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52743"
},
{
"name": "CVE-2023-52753",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52753"
},
{
"name": "CVE-2023-52754",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52754"
},
{
"name": "CVE-2023-52757",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52757"
},
{
"name": "CVE-2023-52759",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52759"
},
{
"name": "CVE-2023-52763",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52763"
},
{
"name": "CVE-2023-52764",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52764"
},
{
"name": "CVE-2023-52766",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52766"
},
{
"name": "CVE-2023-52773",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52773"
},
{
"name": "CVE-2023-52774",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52774"
},
{
"name": "CVE-2023-52777",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52777"
},
{
"name": "CVE-2023-52781",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52781"
},
{
"name": "CVE-2023-52788",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52788"
},
{
"name": "CVE-2023-52789",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52789"
},
{
"name": "CVE-2023-52791",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52791"
},
{
"name": "CVE-2023-52795",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52795"
},
{
"name": "CVE-2023-52796",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52796"
},
{
"name": "CVE-2023-52798",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52798"
},
{
"name": "CVE-2023-52799",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52799"
},
{
"name": "CVE-2023-52800",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52800"
},
{
"name": "CVE-2023-52803",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52803"
},
{
"name": "CVE-2023-52804",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52804"
},
{
"name": "CVE-2023-52805",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52805"
},
{
"name": "CVE-2023-52806",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52806"
},
{
"name": "CVE-2023-52807",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52807"
},
{
"name": "CVE-2023-52808",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52808"
},
{
"name": "CVE-2023-52809",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52809"
},
{
"name": "CVE-2023-52810",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52810"
},
{
"name": "CVE-2023-52811",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52811"
},
{
"name": "CVE-2023-52814",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52814"
},
{
"name": "CVE-2023-52815",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52815"
},
{
"name": "CVE-2023-52816",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52816"
},
{
"name": "CVE-2023-52817",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52817"
},
{
"name": "CVE-2023-52818",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52818"
},
{
"name": "CVE-2023-52819",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52819"
},
{
"name": "CVE-2023-52821",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52821"
},
{
"name": "CVE-2023-52825",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52825"
},
{
"name": "CVE-2023-52826",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52826"
},
{
"name": "CVE-2023-52832",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52832"
},
{
"name": "CVE-2023-52833",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52833"
},
{
"name": "CVE-2023-52834",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52834"
},
{
"name": "CVE-2023-52838",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52838"
},
{
"name": "CVE-2023-52840",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52840"
},
{
"name": "CVE-2023-52841",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52841"
},
{
"name": "CVE-2023-52844",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52844"
},
{
"name": "CVE-2023-52847",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52847"
},
{
"name": "CVE-2023-52851",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52851"
},
{
"name": "CVE-2023-52853",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52853"
},
{
"name": "CVE-2023-52854",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52854"
},
{
"name": "CVE-2023-52855",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52855"
},
{
"name": "CVE-2023-52856",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52856"
},
{
"name": "CVE-2023-52858",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52858"
},
{
"name": "CVE-2023-52861",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52861"
},
{
"name": "CVE-2023-52864",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52864"
},
{
"name": "CVE-2023-52865",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52865"
},
{
"name": "CVE-2023-52867",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52867"
},
{
"name": "CVE-2023-52868",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52868"
},
{
"name": "CVE-2023-52870",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52870"
},
{
"name": "CVE-2023-52871",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52871"
},
{
"name": "CVE-2023-52872",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52872"
},
{
"name": "CVE-2023-52873",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52873"
},
{
"name": "CVE-2023-52875",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52875"
},
{
"name": "CVE-2023-52876",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52876"
},
{
"name": "CVE-2023-52877",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52877"
},
{
"name": "CVE-2023-52878",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52878"
},
{
"name": "CVE-2023-52880",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52880"
},
{
"name": "CVE-2024-26758",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26758"
},
{
"name": "CVE-2024-269355",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-269355"
},
{
"name": "CVE-2024-27419",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27419"
},
{
"name": "CVE-2024-35789",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35789"
},
{
"name": "CVE-2024-35806",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35806"
},
{
"name": "CVE-2024-35828",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35828"
},
{
"name": "CVE-2024-35854",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35854"
},
{
"name": "CVE-2024-35861",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35861"
},
{
"name": "CVE-2024-35862",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35862"
},
{
"name": "CVE-2024-35864",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35864"
},
{
"name": "CVE-2024-35869",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35869"
},
{
"name": "CVE-2024-35878",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35878"
},
{
"name": "CVE-2024-35887",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35887"
},
{
"name": "CVE-2024-35901",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35901"
},
{
"name": "CVE-2024-35905",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35905"
},
{
"name": "CVE-2024-35950",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35950"
},
{
"name": "CVE-2024-35966",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35966"
},
{
"name": "CVE-2024-35967",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35967"
},
{
"name": "CVE-2024-35976",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35976"
},
{
"name": "CVE-2024-35978",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35978"
},
{
"name": "CVE-2024-35998",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35998"
},
{
"name": "CVE-2024-36014",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36014"
},
{
"name": "CVE-2024-36924",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36924"
},
{
"name": "CVE-2024-36926",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36926"
},
{
"name": "CVE-2024-36938",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36938"
},
{
"name": "CVE-2024-36942",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36942"
},
{
"name": "CVE-2024-36944",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36944"
},
{
"name": "CVE-2024-36947",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36947"
},
{
"name": "CVE-2024-36952",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36952"
},
{
"name": "CVE-2024-36955",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36955"
},
{
"name": "CVE-2023-52667",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52667"
},
{
"name": "CVE-2023-52658",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52658"
},
{
"name": "CVE-2023-52670",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52670"
},
{
"name": "CVE-2023-52675",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52675"
},
{
"name": "CVE-2024-27432",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27432"
},
{
"name": "CVE-2024-35790",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35790"
},
{
"name": "CVE-2024-35814",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35814"
},
{
"name": "CVE-2024-35819",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35819"
},
{
"name": "CVE-2024-35835",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35835"
},
{
"name": "CVE-2024-35837",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35837"
},
{
"name": "CVE-2024-35889",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35889"
},
{
"name": "CVE-2024-35956",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35956"
},
{
"name": "CVE-2024-35958",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35958"
},
{
"name": "CVE-2024-35960",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35960"
},
{
"name": "CVE-2024-35961",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35961"
},
{
"name": "CVE-2024-35995",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35995"
},
{
"name": "CVE-2024-35997",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35997"
},
{
"name": "CVE-2024-36020",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36020"
},
{
"name": "CVE-2024-36021",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36021"
},
{
"name": "CVE-2024-36025",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36025"
},
{
"name": "CVE-2024-36890",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36890"
},
{
"name": "CVE-2024-36894",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36894"
},
{
"name": "CVE-2024-36922",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36922"
},
{
"name": "CVE-2024-36930",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36930"
},
{
"name": "CVE-2024-36949",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36949"
},
{
"name": "CVE-2024-36951",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36951"
},
{
"name": "CVE-2023-52672",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52672"
},
{
"name": "CVE-2024-27414",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27414"
},
{
"name": "CVE-2024-35805",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35805"
},
{
"name": "CVE-2024-35807",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35807"
},
{
"name": "CVE-2024-35853",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35853"
},
{
"name": "CVE-2024-35855",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35855"
},
{
"name": "CVE-2024-35884",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35884"
},
{
"name": "CVE-2024-35886",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35886"
},
{
"name": "CVE-2024-35893",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35893"
},
{
"name": "CVE-2024-35896",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35896"
},
{
"name": "CVE-2024-35898",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35898"
},
{
"name": "CVE-2024-35899",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35899"
},
{
"name": "CVE-2024-35900",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35900"
},
{
"name": "CVE-2024-35925",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35925"
},
{
"name": "CVE-2024-35934",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35934"
},
{
"name": "CVE-2024-35962",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35962"
},
{
"name": "CVE-2024-36004",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36004"
},
{
"name": "CVE-2024-36005",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36005"
},
{
"name": "CVE-2024-36008",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36008"
},
{
"name": "CVE-2024-36288",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36288"
},
{
"name": "CVE-2024-36960",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36960"
},
{
"name": "CVE-2024-36964",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36964"
},
{
"name": "CVE-2024-36971",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36971"
},
{
"name": "CVE-2024-37353",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37353"
},
{
"name": "CVE-2024-38381",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38381"
},
{
"name": "CVE-2024-38549",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38549"
},
{
"name": "CVE-2024-38552",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38552"
},
{
"name": "CVE-2024-38558",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38558"
},
{
"name": "CVE-2024-38559",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38559"
},
{
"name": "CVE-2024-38560",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38560"
},
{
"name": "CVE-2024-38565",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38565"
},
{
"name": "CVE-2024-38567",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38567"
},
{
"name": "CVE-2024-38578",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38578"
},
{
"name": "CVE-2024-38579",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38579"
},
{
"name": "CVE-2024-38582",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38582"
},
{
"name": "CVE-2024-38583",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38583"
},
{
"name": "CVE-2024-38587",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38587"
},
{
"name": "CVE-2024-38598",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38598"
},
{
"name": "CVE-2024-38599",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38599"
},
{
"name": "CVE-2024-38601",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38601"
},
{
"name": "CVE-2024-38618",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38618"
},
{
"name": "CVE-2024-38621",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38621"
},
{
"name": "CVE-2024-38627",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38627"
},
{
"name": "CVE-2024-38633",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38633"
},
{
"name": "CVE-2024-38634",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38634"
},
{
"name": "CVE-2024-38659",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38659"
},
{
"name": "CVE-2024-38780",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38780"
},
{
"name": "CVE-2024-26944",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26944"
},
{
"name": "CVE-2024-27064",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27064"
},
{
"name": "CVE-2024-35827",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35827"
},
{
"name": "CVE-2024-35831",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35831"
},
{
"name": "CVE-2024-35843",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35843"
},
{
"name": "CVE-2023-52813",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52813"
},
{
"name": "CVE-2023-52835",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52835"
},
{
"name": "CVE-2023-52881",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52881"
},
{
"name": "CVE-2024-35890",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35890"
},
{
"name": "CVE-2021-4439",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4439"
},
{
"name": "CVE-2021-47089",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47089"
},
{
"name": "CVE-2021-47103",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47103"
},
{
"name": "CVE-2021-47432",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47432"
},
{
"name": "CVE-2021-47515",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47515"
},
{
"name": "CVE-2021-47539",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47539"
},
{
"name": "CVE-2021-47566",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47566"
},
{
"name": "CVE-2021-47571",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47571"
},
{
"name": "CVE-2021-47572",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47572"
},
{
"name": "CVE-2021-47576",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47576"
},
{
"name": "CVE-2021-47577",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47577"
},
{
"name": "CVE-2021-47578",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47578"
},
{
"name": "CVE-2021-47580",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47580"
},
{
"name": "CVE-2021-47582",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47582"
},
{
"name": "CVE-2021-47583",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47583"
},
{
"name": "CVE-2021-47584",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47584"
},
{
"name": "CVE-2021-47585",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47585"
},
{
"name": "CVE-2021-47586",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47586"
},
{
"name": "CVE-2021-47587",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47587"
},
{
"name": "CVE-2021-47589",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47589"
},
{
"name": "CVE-2021-47592",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47592"
},
{
"name": "CVE-2021-47595",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47595"
},
{
"name": "CVE-2021-47596",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47596"
},
{
"name": "CVE-2021-47597",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47597"
},
{
"name": "CVE-2021-47600",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47600"
},
{
"name": "CVE-2021-47601",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47601"
},
{
"name": "CVE-2021-47602",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47602"
},
{
"name": "CVE-2021-47603",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47603"
},
{
"name": "CVE-2021-47604",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47604"
},
{
"name": "CVE-2021-47605",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47605"
},
{
"name": "CVE-2021-47607",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47607"
},
{
"name": "CVE-2021-47608",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47608"
},
{
"name": "CVE-2021-47609",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47609"
},
{
"name": "CVE-2021-47610",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47610"
},
{
"name": "CVE-2021-47611",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47611"
},
{
"name": "CVE-2021-47612",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47612"
},
{
"name": "CVE-2021-47614",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47614"
},
{
"name": "CVE-2021-47615",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47615"
},
{
"name": "CVE-2021-47616",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47616"
},
{
"name": "CVE-2021-47617",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47617"
},
{
"name": "CVE-2021-47618",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47618"
},
{
"name": "CVE-2021-47619",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47619"
},
{
"name": "CVE-2021-47620",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47620"
},
{
"name": "CVE-2022-48711",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48711"
},
{
"name": "CVE-2022-48712",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48712"
},
{
"name": "CVE-2022-48713",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48713"
},
{
"name": "CVE-2022-48714",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48714"
},
{
"name": "CVE-2022-48715",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48715"
},
{
"name": "CVE-2022-48716",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48716"
},
{
"name": "CVE-2022-48717",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48717"
},
{
"name": "CVE-2022-48718",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48718"
},
{
"name": "CVE-2022-48720",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48720"
},
{
"name": "CVE-2022-48721",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48721"
},
{
"name": "CVE-2022-48722",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48722"
},
{
"name": "CVE-2022-48723",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48723"
},
{
"name": "CVE-2022-48724",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48724"
},
{
"name": "CVE-2022-48725",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48725"
},
{
"name": "CVE-2022-48726",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48726"
},
{
"name": "CVE-2022-48727",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48727"
},
{
"name": "CVE-2022-48728",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48728"
},
{
"name": "CVE-2022-48729",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48729"
},
{
"name": "CVE-2022-48730",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48730"
},
{
"name": "CVE-2022-48732",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48732"
},
{
"name": "CVE-2022-48733",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48733"
},
{
"name": "CVE-2022-48734",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48734"
},
{
"name": "CVE-2022-48735",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48735"
},
{
"name": "CVE-2022-48736",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48736"
},
{
"name": "CVE-2022-48737",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48737"
},
{
"name": "CVE-2022-48738",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48738"
},
{
"name": "CVE-2022-48739",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48739"
},
{
"name": "CVE-2022-48740",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48740"
},
{
"name": "CVE-2022-48743",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48743"
},
{
"name": "CVE-2022-48744",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48744"
},
{
"name": "CVE-2022-48745",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48745"
},
{
"name": "CVE-2022-48746",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48746"
},
{
"name": "CVE-2022-48747",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48747"
},
{
"name": "CVE-2022-48748",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48748"
},
{
"name": "CVE-2022-48749",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48749"
},
{
"name": "CVE-2022-48751",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48751"
},
{
"name": "CVE-2022-48752",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48752"
},
{
"name": "CVE-2022-48753",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48753"
},
{
"name": "CVE-2022-48754",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48754"
},
{
"name": "CVE-2022-48755",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48755"
},
{
"name": "CVE-2022-48756",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48756"
},
{
"name": "CVE-2022-48758",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48758"
},
{
"name": "CVE-2022-48759",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48759"
},
{
"name": "CVE-2022-48760",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48760"
},
{
"name": "CVE-2022-48761",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48761"
},
{
"name": "CVE-2022-48763",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48763"
},
{
"name": "CVE-2022-48765",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48765"
},
{
"name": "CVE-2022-48766",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48766"
},
{
"name": "CVE-2022-48767",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48767"
},
{
"name": "CVE-2022-48768",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48768"
},
{
"name": "CVE-2022-48769",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48769"
},
{
"name": "CVE-2022-48770",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48770"
},
{
"name": "CVE-2022-48771",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48771"
},
{
"name": "CVE-2022-48772",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48772"
},
{
"name": "CVE-2023-52735",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52735"
},
{
"name": "CVE-2023-52737",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52737"
},
{
"name": "CVE-2023-52752",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52752"
},
{
"name": "CVE-2023-52762",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52762"
},
{
"name": "CVE-2023-52784",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52784"
},
{
"name": "CVE-2023-52787",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52787"
},
{
"name": "CVE-2023-52837",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52837"
},
{
"name": "CVE-2023-52843",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52843"
},
{
"name": "CVE-2023-52845",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52845"
},
{
"name": "CVE-2023-52846",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52846"
},
{
"name": "CVE-2023-52869",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52869"
},
{
"name": "CVE-2023-52884",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52884"
},
{
"name": "CVE-2024-26842",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26842"
},
{
"name": "CVE-2024-33619",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33619"
},
{
"name": "CVE-2024-35247",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35247"
},
{
"name": "CVE-2024-35857",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35857"
},
{
"name": "CVE-2024-35979",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35979"
},
{
"name": "CVE-2024-36477",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36477"
},
{
"name": "CVE-2024-36478",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36478"
},
{
"name": "CVE-2024-36479",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36479"
},
{
"name": "CVE-2024-36592",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36592"
},
{
"name": "CVE-2024-36899",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36899"
},
{
"name": "CVE-2024-36900",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36900"
},
{
"name": "CVE-2024-36915",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36915"
},
{
"name": "CVE-2024-36917",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36917"
},
{
"name": "CVE-2024-36923",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36923"
},
{
"name": "CVE-2024-36937",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36937"
},
{
"name": "CVE-2024-36945",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36945"
},
{
"name": "CVE-2024-36965",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36965"
},
{
"name": "CVE-2024-36967",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36967"
},
{
"name": "CVE-2024-36969",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36969"
},
{
"name": "CVE-2024-36975",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36975"
},
{
"name": "CVE-2024-36978",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36978"
},
{
"name": "CVE-2024-37021",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37021"
},
{
"name": "CVE-2024-37078",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37078"
},
{
"name": "CVE-2024-37354",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37354"
},
{
"name": "CVE-2024-38388",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38388"
},
{
"name": "CVE-2024-38390",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38390"
},
{
"name": "CVE-2024-38540",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38540"
},
{
"name": "CVE-2024-38541",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38541"
},
{
"name": "CVE-2024-38544",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38544"
},
{
"name": "CVE-2024-38545",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38545"
},
{
"name": "CVE-2024-38546",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38546"
},
{
"name": "CVE-2024-38547",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38547"
},
{
"name": "CVE-2024-38548",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38548"
},
{
"name": "CVE-2024-38550",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38550"
},
{
"name": "CVE-2024-38553",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38553"
},
{
"name": "CVE-2024-38555",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38555"
},
{
"name": "CVE-2024-38556",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38556"
},
{
"name": "CVE-2024-38557",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38557"
},
{
"name": "CVE-2024-38564",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38564"
},
{
"name": "CVE-2024-38568",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38568"
},
{
"name": "CVE-2024-38571",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38571"
},
{
"name": "CVE-2024-38573",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38573"
},
{
"name": "CVE-2024-38580",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38580"
},
{
"name": "CVE-2024-38581",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38581"
},
{
"name": "CVE-2024-38590",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38590"
},
{
"name": "CVE-2024-38591",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38591"
},
{
"name": "CVE-2024-38594",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38594"
},
{
"name": "CVE-2024-38597",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38597"
},
{
"name": "CVE-2024-38600",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38600"
},
{
"name": "CVE-2024-38603",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38603"
},
{
"name": "CVE-2024-38605",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38605"
},
{
"name": "CVE-2024-38608",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38608"
},
{
"name": "CVE-2024-38616",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38616"
},
{
"name": "CVE-2024-38619",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38619"
},
{
"name": "CVE-2024-38630",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38630"
},
{
"name": "CVE-2024-38635",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38635"
},
{
"name": "CVE-2024-38661",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38661"
},
{
"name": "CVE-2024-39301",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39301"
},
{
"name": "CVE-2024-39468",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39468"
},
{
"name": "CVE-2024-39469",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39469"
},
{
"name": "CVE-2024-39471",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39471"
},
{
"name": "CVE-2021-47145",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47145"
},
{
"name": "CVE-2021-47547",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47547"
},
{
"name": "CVE-2024-38610",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38610"
},
{
"name": "CVE-2024-39475",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39475"
},
{
"name": "CVE-2024-26661",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26661"
},
{
"name": "CVE-2024-26691",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26691"
},
{
"name": "CVE-2024-26734",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26734"
},
{
"name": "CVE-2024-27012",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27012"
},
{
"name": "CVE-2024-35880",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35880"
},
{
"name": "CVE-2024-35892",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35892"
},
{
"name": "CVE-2024-35908",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35908"
},
{
"name": "CVE-2024-35926",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35926"
},
{
"name": "CVE-2024-35942",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35942"
},
{
"name": "CVE-2024-35957",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35957"
},
{
"name": "CVE-2024-35970",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35970"
},
{
"name": "CVE-2024-36024",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36024"
},
{
"name": "CVE-2024-38543",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38543"
},
{
"name": "CVE-2024-38586",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38586"
},
{
"name": "CVE-2024-38663",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38663"
},
{
"name": "CVE-2024-25741",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25741"
},
{
"name": "CVE-2024-36973",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36973"
},
{
"name": "CVE-2024-36974",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36974"
},
{
"name": "CVE-2024-38615",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38615"
},
{
"name": "CVE-2024-39276",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39276"
},
{
"name": "CVE-2024-39371",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39371"
},
{
"name": "CVE-2024-39474",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39474"
},
{
"name": "CVE-2024-39482",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39482"
},
{
"name": "CVE-2024-39487",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39487"
},
{
"name": "CVE-2024-39488",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39488"
},
{
"name": "CVE-2024-39493",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39493"
},
{
"name": "CVE-2024-39494",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39494"
},
{
"name": "CVE-2024-39496",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39496"
},
{
"name": "CVE-2024-39499",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39499"
},
{
"name": "CVE-2024-39500",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39500"
},
{
"name": "CVE-2024-39501",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39501"
},
{
"name": "CVE-2024-39502",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39502"
},
{
"name": "CVE-2024-39505",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39505"
},
{
"name": "CVE-2024-39506",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39506"
},
{
"name": "CVE-2024-39507",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39507"
},
{
"name": "CVE-2024-39509",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39509"
},
{
"name": "CVE-2024-40900",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40900"
},
{
"name": "CVE-2024-40901",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40901"
},
{
"name": "CVE-2024-40902",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40902"
},
{
"name": "CVE-2024-40903",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40903"
},
{
"name": "CVE-2024-40904",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40904"
},
{
"name": "CVE-2024-40906",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40906"
},
{
"name": "CVE-2024-40908",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40908"
},
{
"name": "CVE-2024-40911",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40911"
},
{
"name": "CVE-2024-40912",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40912"
},
{
"name": "CVE-2024-40916",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40916"
},
{
"name": "CVE-2024-40919",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40919"
},
{
"name": "CVE-2024-40924",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40924"
},
{
"name": "CVE-2024-40927",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40927"
},
{
"name": "CVE-2024-40929",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40929"
},
{
"name": "CVE-2024-40931",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40931"
},
{
"name": "CVE-2024-40932",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40932"
},
{
"name": "CVE-2024-40934",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40934"
},
{
"name": "CVE-2024-40935",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40935"
},
{
"name": "CVE-2024-40937",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40937"
},
{
"name": "CVE-2024-40940",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40940"
},
{
"name": "CVE-2024-40941",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40941"
},
{
"name": "CVE-2024-40942",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40942"
},
{
"name": "CVE-2024-40943",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40943"
},
{
"name": "CVE-2024-40945",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40945"
},
{
"name": "CVE-2024-40947",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40947"
},
{
"name": "CVE-2024-40948",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40948"
},
{
"name": "CVE-2024-40953",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40953"
},
{
"name": "CVE-2024-40954",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40954"
},
{
"name": "CVE-2024-40956",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40956"
},
{
"name": "CVE-2024-40958",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40958"
},
{
"name": "CVE-2024-40959",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40959"
},
{
"name": "CVE-2024-40960",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40960"
},
{
"name": "CVE-2024-40961",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40961"
},
{
"name": "CVE-2024-40966",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40966"
},
{
"name": "CVE-2024-40967",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40967"
},
{
"name": "CVE-2024-40970",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40970"
},
{
"name": "CVE-2024-40976",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40976"
},
{
"name": "CVE-2024-40977",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40977"
},
{
"name": "CVE-2024-40978",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40978"
},
{
"name": "CVE-2024-40981",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40981"
},
{
"name": "CVE-2024-40984",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40984"
},
{
"name": "CVE-2024-40987",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40987"
},
{
"name": "CVE-2024-40988",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40988"
},
{
"name": "CVE-2024-40989",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40989"
},
{
"name": "CVE-2024-40990",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40990"
},
{
"name": "CVE-2024-40994",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40994"
},
{
"name": "CVE-2024-40995",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40995"
},
{
"name": "CVE-2024-41002",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41002"
},
{
"name": "CVE-2024-41004",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41004"
},
{
"name": "CVE-2024-41006",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41006"
},
{
"name": "CVE-2023-52749",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52749"
},
{
"name": "CVE-2023-52750",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52750"
},
{
"name": "CVE-2023-52765",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52765"
},
{
"name": "CVE-2023-52767",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52767"
},
{
"name": "CVE-2023-52768",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52768"
},
{
"name": "CVE-2023-52769",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52769"
},
{
"name": "CVE-2023-52776",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52776"
},
{
"name": "CVE-2023-52780",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52780"
},
{
"name": "CVE-2023-52782",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52782"
},
{
"name": "CVE-2023-52783",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52783"
},
{
"name": "CVE-2023-52786",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52786"
},
{
"name": "CVE-2023-52792",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52792"
},
{
"name": "CVE-2023-52794",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52794"
},
{
"name": "CVE-2023-52801",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52801"
},
{
"name": "CVE-2023-52812",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52812"
},
{
"name": "CVE-2023-52827",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52827"
},
{
"name": "CVE-2023-52829",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52829"
},
{
"name": "CVE-2023-52836",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52836"
},
{
"name": "CVE-2023-52842",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52842"
},
{
"name": "CVE-2023-52849",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52849"
},
{
"name": "CVE-2023-52850",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52850"
},
{
"name": "CVE-2023-52857",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52857"
},
{
"name": "CVE-2023-52862",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52862"
},
{
"name": "CVE-2023-52863",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52863"
},
{
"name": "CVE-2023-52866",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52866"
},
{
"name": "CVE-2023-52874",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52874"
},
{
"name": "CVE-2023-52879",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52879"
},
{
"name": "CVE-2023-52883",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52883"
},
{
"name": "CVE-2024-26767",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26767"
},
{
"name": "CVE-2024-34777",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34777"
},
{
"name": "CVE-2024-36010",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36010"
},
{
"name": "CVE-2024-36281",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36281"
},
{
"name": "CVE-2024-36882",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36882"
},
{
"name": "CVE-2024-36887",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36887"
},
{
"name": "CVE-2024-36903",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36903"
},
{
"name": "CVE-2024-36935",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36935"
},
{
"name": "CVE-2024-36962",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36962"
},
{
"name": "CVE-2024-36972",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36972"
},
{
"name": "CVE-2024-36977",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36977"
},
{
"name": "CVE-2024-38384",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38384"
},
{
"name": "CVE-2024-38385",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38385"
},
{
"name": "CVE-2024-38391",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38391"
},
{
"name": "CVE-2024-38539",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38539"
},
{
"name": "CVE-2024-38551",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38551"
},
{
"name": "CVE-2024-38554",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38554"
},
{
"name": "CVE-2024-38562",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38562"
},
{
"name": "CVE-2024-38566",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38566"
},
{
"name": "CVE-2024-38569",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38569"
},
{
"name": "CVE-2024-38570",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38570"
},
{
"name": "CVE-2024-38572",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38572"
},
{
"name": "CVE-2024-38575",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38575"
},
{
"name": "CVE-2024-38588",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38588"
},
{
"name": "CVE-2024-38592",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38592"
},
{
"name": "CVE-2024-38595",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38595"
},
{
"name": "CVE-2024-38602",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38602"
},
{
"name": "CVE-2024-38611",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38611"
},
{
"name": "CVE-2024-38617",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38617"
},
{
"name": "CVE-2024-38622",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38622"
},
{
"name": "CVE-2024-38628",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38628"
},
{
"name": "CVE-2024-38629",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38629"
},
{
"name": "CVE-2024-38636",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38636"
},
{
"name": "CVE-2024-38664",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38664"
},
{
"name": "CVE-2024-39277",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39277"
},
{
"name": "CVE-2024-39291",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39291"
},
{
"name": "CVE-2024-39296",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39296"
},
{
"name": "CVE-2024-39362",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39362"
},
{
"name": "CVE-2024-39463",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39463"
},
{
"name": "CVE-2024-39466",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39466"
},
{
"name": "CVE-2024-35949",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35949"
},
{
"name": "CVE-2024-36000",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36000"
},
{
"name": "CVE-2024-36003",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36003"
},
{
"name": "CVE-2024-36901",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36901"
},
{
"name": "CVE-2024-36909",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36909"
},
{
"name": "CVE-2024-36910",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36910"
},
{
"name": "CVE-2024-36911",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36911"
},
{
"name": "CVE-2024-36912",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36912"
},
{
"name": "CVE-2024-36913",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36913"
},
{
"name": "CVE-2024-36914",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36914"
},
{
"name": "CVE-2024-38604",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38604"
},
{
"name": "CVE-2024-41011",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41011"
},
{
"name": "CVE-2021-47624",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47624"
},
{
"name": "CVE-2023-52775",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52775"
},
{
"name": "CVE-2023-52885",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52885"
},
{
"name": "CVE-2024-39472",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39472"
},
{
"name": "CVE-2023-52751",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52751"
},
{
"name": "CVE-2024-26785",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26785"
},
{
"name": "CVE-2024-27402",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27402"
},
{
"name": "CVE-2024-27404",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27404"
},
{
"name": "CVE-2024-39473",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39473"
},
{
"name": "CVE-2024-39479",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39479"
},
{
"name": "CVE-2024-39481",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39481"
},
{
"name": "CVE-2024-39490",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39490"
},
{
"name": "CVE-2024-39498",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39498"
},
{
"name": "CVE-2024-39504",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39504"
},
{
"name": "CVE-2024-40923",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40923"
},
{
"name": "CVE-2024-40925",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40925"
},
{
"name": "CVE-2024-40928",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40928"
},
{
"name": "CVE-2024-40972",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40972"
},
{
"name": "CVE-2024-40975",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40975"
},
{
"name": "CVE-2024-40979",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40979"
},
{
"name": "CVE-2024-40998",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40998"
},
{
"name": "CVE-2024-40999",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40999"
},
{
"name": "CVE-2024-41013",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41013"
},
{
"name": "CVE-2024-41014",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41014"
},
{
"name": "CVE-2024-41017",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41017"
},
{
"name": "CVE-2024-41090",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41090"
},
{
"name": "CVE-2024-41091",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41091"
},
{
"name": "CVE-2016-20022",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-20022"
},
{
"name": "CVE-2021-47086",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47086"
},
{
"name": "CVE-2021-47126",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47126"
},
{
"name": "CVE-2021-47186",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47186"
},
{
"name": "CVE-2021-47291",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47291"
},
{
"name": "CVE-2021-47295",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47295"
},
{
"name": "CVE-2021-47546",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47546"
},
{
"name": "CVE-2021-47588",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47588"
},
{
"name": "CVE-2021-47590",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47590"
},
{
"name": "CVE-2021-47591",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47591"
},
{
"name": "CVE-2021-47593",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47593"
},
{
"name": "CVE-2021-47598",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47598"
},
{
"name": "CVE-2021-47599",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47599"
},
{
"name": "CVE-2021-47606",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47606"
},
{
"name": "CVE-2021-47622",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47622"
},
{
"name": "CVE-2021-47623",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47623"
},
{
"name": "CVE-2022-48773",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48773"
},
{
"name": "CVE-2022-48774",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48774"
},
{
"name": "CVE-2022-48775",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48775"
},
{
"name": "CVE-2022-48776",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48776"
},
{
"name": "CVE-2022-48777",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48777"
},
{
"name": "CVE-2022-48778",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48778"
},
{
"name": "CVE-2022-48780",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48780"
},
{
"name": "CVE-2022-48783",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48783"
},
{
"name": "CVE-2022-48784",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48784"
},
{
"name": "CVE-2022-48785",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48785"
},
{
"name": "CVE-2022-48786",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48786"
},
{
"name": "CVE-2022-48787",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48787"
},
{
"name": "CVE-2022-48788",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48788"
},
{
"name": "CVE-2022-48789",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48789"
},
{
"name": "CVE-2022-48790",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48790"
},
{
"name": "CVE-2022-48791",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48791"
},
{
"name": "CVE-2022-48792",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48792"
},
{
"name": "CVE-2022-48793",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48793"
},
{
"name": "CVE-2022-48794",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48794"
},
{
"name": "CVE-2022-48796",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48796"
},
{
"name": "CVE-2022-48797",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48797"
},
{
"name": "CVE-2022-48798",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48798"
},
{
"name": "CVE-2022-48799",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48799"
},
{
"name": "CVE-2022-48800",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48800"
},
{
"name": "CVE-2022-48801",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48801"
},
{
"name": "CVE-2022-48802",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48802"
},
{
"name": "CVE-2022-48803",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48803"
},
{
"name": "CVE-2022-48804",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48804"
},
{
"name": "CVE-2022-48805",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48805"
},
{
"name": "CVE-2022-48806",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48806"
},
{
"name": "CVE-2022-48807",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48807"
},
{
"name": "CVE-2022-48809",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48809"
},
{
"name": "CVE-2022-48810",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48810"
},
{
"name": "CVE-2022-48811",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48811"
},
{
"name": "CVE-2022-48812",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48812"
},
{
"name": "CVE-2022-48813",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48813"
},
{
"name": "CVE-2022-48814",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48814"
},
{
"name": "CVE-2022-48815",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48815"
},
{
"name": "CVE-2022-48816",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48816"
},
{
"name": "CVE-2022-48817",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48817"
},
{
"name": "CVE-2022-48818",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48818"
},
{
"name": "CVE-2022-48820",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48820"
},
{
"name": "CVE-2022-48821",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48821"
},
{
"name": "CVE-2022-48822",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48822"
},
{
"name": "CVE-2022-48823",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48823"
},
{
"name": "CVE-2022-48824",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48824"
},
{
"name": "CVE-2022-48825",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48825"
},
{
"name": "CVE-2022-48826",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48826"
},
{
"name": "CVE-2022-48827",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48827"
},
{
"name": "CVE-2022-48828",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48828"
},
{
"name": "CVE-2022-48829",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48829"
},
{
"name": "CVE-2022-48830",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48830"
},
{
"name": "CVE-2022-48831",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48831"
},
{
"name": "CVE-2022-48834",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48834"
},
{
"name": "CVE-2022-48835",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48835"
},
{
"name": "CVE-2022-48836",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48836"
},
{
"name": "CVE-2022-48837",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48837"
},
{
"name": "CVE-2022-48838",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48838"
},
{
"name": "CVE-2022-48839",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48839"
},
{
"name": "CVE-2022-48840",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48840"
},
{
"name": "CVE-2022-48841",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48841"
},
{
"name": "CVE-2022-48842",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48842"
},
{
"name": "CVE-2022-48843",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48843"
},
{
"name": "CVE-2022-48844",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48844"
},
{
"name": "CVE-2022-48846",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48846"
},
{
"name": "CVE-2022-48847",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48847"
},
{
"name": "CVE-2022-48849",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48849"
},
{
"name": "CVE-2022-48850",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48850"
},
{
"name": "CVE-2022-48851",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48851"
},
{
"name": "CVE-2022-48852",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48852"
},
{
"name": "CVE-2022-48853",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48853"
},
{
"name": "CVE-2022-48855",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48855"
},
{
"name": "CVE-2022-48856",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48856"
},
{
"name": "CVE-2022-48857",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48857"
},
{
"name": "CVE-2022-48858",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48858"
},
{
"name": "CVE-2022-48859",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48859"
},
{
"name": "CVE-2022-48860",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48860"
},
{
"name": "CVE-2022-48861",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48861"
},
{
"name": "CVE-2022-48862",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48862"
},
{
"name": "CVE-2022-48863",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48863"
},
{
"name": "CVE-2022-48864",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48864"
},
{
"name": "CVE-2022-48866",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48866"
},
{
"name": "CVE-2023-31315",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31315"
},
{
"name": "CVE-2023-52573",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52573"
},
{
"name": "CVE-2023-52886",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52886"
},
{
"name": "CVE-2024-39497",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39497"
},
{
"name": "CVE-2024-39508",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39508"
},
{
"name": "CVE-2024-40909",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40909"
},
{
"name": "CVE-2024-40982",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40982"
},
{
"name": "CVE-2024-41009",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41009"
},
{
"name": "CVE-2024-41012",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41012"
},
{
"name": "CVE-2024-41015",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41015"
},
{
"name": "CVE-2024-41016",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41016"
},
{
"name": "CVE-2024-41040",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41040"
},
{
"name": "CVE-2024-41041",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41041"
},
{
"name": "CVE-2024-41044",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41044"
},
{
"name": "CVE-2024-41048",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41048"
},
{
"name": "CVE-2024-41057",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41057"
},
{
"name": "CVE-2024-41058",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41058"
},
{
"name": "CVE-2024-41059",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41059"
},
{
"name": "CVE-2024-41060",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41060"
},
{
"name": "CVE-2024-41063",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41063"
},
{
"name": "CVE-2024-41064",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41064"
},
{
"name": "CVE-2024-41066",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41066"
},
{
"name": "CVE-2024-41069",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41069"
},
{
"name": "CVE-2024-41070",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41070"
},
{
"name": "CVE-2024-41071",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41071"
},
{
"name": "CVE-2024-41072",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41072"
},
{
"name": "CVE-2024-41076",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41076"
},
{
"name": "CVE-2024-41078",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41078"
},
{
"name": "CVE-2024-41081",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41081"
},
{
"name": "CVE-2024-41087",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41087"
},
{
"name": "CVE-2024-41089",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41089"
},
{
"name": "CVE-2024-41095",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41095"
},
{
"name": "CVE-2024-42070",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42070"
},
{
"name": "CVE-2024-42079",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42079"
},
{
"name": "CVE-2024-42093",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42093"
},
{
"name": "CVE-2024-42096",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42096"
},
{
"name": "CVE-2024-42105",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42105"
},
{
"name": "CVE-2024-42119",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42119"
},
{
"name": "CVE-2024-42120",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42120"
},
{
"name": "CVE-2024-42122",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42122"
},
{
"name": "CVE-2024-42124",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42124"
},
{
"name": "CVE-2024-42145",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42145"
},
{
"name": "CVE-2024-42161",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42161"
},
{
"name": "CVE-2024-42223",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42223"
},
{
"name": "CVE-2024-42224",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42224"
},
{
"name": "CVE-2024-42230",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42230"
}
],
"initial_release_date": "2024-08-16T00:00:00",
"last_revision_date": "2024-08-16T00:00:00",
"links": [],
"reference": "CERTFR-2024-AVI-0693",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2024-08-16T00:00:00.000000"
}
],
"risks": [
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Ex\u00e9cution de code arbitraire"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux de SUSE. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire, une \u00e9l\u00e9vation de privil\u00e8ges et une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de SUSE",
"vendor_advisories": [
{
"published_at": "2024-08-14",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2024:2911-1",
"url": "https://www.suse.com/support/update/announcement/2024/suse-su-20242911-1"
},
{
"published_at": "2024-08-13",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2024:2894-1",
"url": "https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1"
},
{
"published_at": "2024-08-13",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2024:2892-1",
"url": "https://www.suse.com/support/update/announcement/2024/suse-su-20242892-1"
},
{
"published_at": "2024-08-15",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2024:2923-1",
"url": "https://www.suse.com/support/update/announcement/2024/suse-su-20242923-1"
},
{
"published_at": "2024-08-16",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2024:2939-1",
"url": "https://www.suse.com/support/update/announcement/2024/suse-su-20242939-1"
},
{
"published_at": "2024-08-15",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2024:2929-1",
"url": "https://www.suse.com/support/update/announcement/2024/suse-su-20242929-1"
},
{
"published_at": "2024-08-14",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2024:2902-1",
"url": "https://www.suse.com/support/update/announcement/2024/suse-su-20242902-1"
},
{
"published_at": "2024-08-13",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2024:2895-1",
"url": "https://www.suse.com/support/update/announcement/2024/suse-su-20242895-1"
},
{
"published_at": "2024-08-12",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2024:2874-1",
"url": "https://www.suse.com/support/update/announcement/2024/suse-su-20242874-1"
},
{
"published_at": "2024-08-13",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2024:2896-1",
"url": "https://www.suse.com/support/update/announcement/2024/suse-su-20242896-1"
},
{
"published_at": "2024-08-13",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2024:2893-1",
"url": "https://www.suse.com/support/update/announcement/2024/suse-su-20242893-1"
},
{
"published_at": "2024-08-14",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2024:2901-1",
"url": "https://www.suse.com/support/update/announcement/2024/suse-su-20242901-1"
}
]
}
CERTFR-2021-AVI-635
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans le noyau Linux d'Ubuntu. Elles permettent à un attaquant de provoquer une exécution de code arbitraire, un déni de service et une atteinte à la confidentialité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | ||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Ubuntu 16.04 ESM",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 18.04 LTS",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 21.04",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 20.04 LTS",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 14.04 ESM",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2021-34693",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-34693"
},
{
"name": "CVE-2021-3587",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3587"
},
{
"name": "CVE-2021-3573",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3573"
},
{
"name": "CVE-2021-0129",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0129"
},
{
"name": "CVE-2021-3564",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3564"
},
{
"name": "CVE-2020-26558",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26558"
},
{
"name": "CVE-2021-22555",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22555"
},
{
"name": "CVE-2021-28691",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-28691"
}
],
"initial_release_date": "2021-08-18T00:00:00",
"last_revision_date": "2021-08-18T00:00:00",
"links": [],
"reference": "CERTFR-2021-AVI-635",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2021-08-18T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux\nd\u0027Ubuntu. Elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de\ncode arbitraire, un d\u00e9ni de service et une atteinte \u00e0 la confidentialit\u00e9\ndes donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux d\u0027Ubuntu",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-5044-1 du 18 ao\u00fbt 2021",
"url": "https://ubuntu.com/security/notices/USN-5044-1"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu LSN-0080-1 du 16 ao\u00fbt 2021",
"url": "https://ubuntu.com/security/notices/LSN-0080-1"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-5046-1 du 18 ao\u00fbt 2021",
"url": "https://ubuntu.com/security/notices/USN-5046-1"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-5045-1 du 18 ao\u00fbt 2021",
"url": "https://ubuntu.com/security/notices/USN-5045-1"
}
]
}
CERTFR-2022-AVI-265
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans le noyau Linux de Ubuntu. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire, un déni de service et une atteinte à l'intégrité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | ||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Ubuntu 16.04 ESM",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 18.04 LTS",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 21.10",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 20.04 LTS",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 14.04 ESM",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2021-38208",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-38208"
},
{
"name": "CVE-2021-20317",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20317"
},
{
"name": "CVE-2020-26139",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26139"
},
{
"name": "CVE-2021-45485",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-45485"
},
{
"name": "CVE-2021-33034",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33034"
},
{
"name": "CVE-2021-34693",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-34693"
},
{
"name": "CVE-2020-25672",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25672"
},
{
"name": "CVE-2021-3679",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3679"
},
{
"name": "CVE-2021-3483",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3483"
},
{
"name": "CVE-2021-38204",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-38204"
},
{
"name": "CVE-2020-36385",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36385"
},
{
"name": "CVE-2021-45095",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-45095"
},
{
"name": "CVE-2021-3573",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3573"
},
{
"name": "CVE-2021-38160",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-38160"
},
{
"name": "CVE-2018-5995",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-5995"
},
{
"name": "CVE-2020-12655",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12655"
},
{
"name": "CVE-2021-28711",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-28711"
},
{
"name": "CVE-2021-43975",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-43975"
},
{
"name": "CVE-2021-4135",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4135"
},
{
"name": "CVE-2021-28713",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-28713"
},
{
"name": "CVE-2021-45402",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-45402"
},
{
"name": "CVE-2022-0264",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0264"
},
{
"name": "CVE-2021-44733",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44733"
},
{
"name": "CVE-2021-3506",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3506"
},
{
"name": "CVE-2021-28712",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-28712"
},
{
"name": "CVE-2021-33098",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33098"
},
{
"name": "CVE-2022-0516",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0516"
},
{
"name": "CVE-2021-0129",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0129"
},
{
"name": "CVE-2021-45480",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-45480"
},
{
"name": "CVE-2021-40490",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-40490"
},
{
"name": "CVE-2020-25671",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25671"
},
{
"name": "CVE-2021-38198",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-38198"
},
{
"name": "CVE-2021-29650",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29650"
},
{
"name": "CVE-2020-36322",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36322"
},
{
"name": "CVE-2021-3564",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3564"
},
{
"name": "CVE-2021-43976",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-43976"
},
{
"name": "CVE-2020-26558",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26558"
},
{
"name": "CVE-2021-28688",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-28688"
},
{
"name": "CVE-2021-45469",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-45469"
},
{
"name": "CVE-2022-0492",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0492"
},
{
"name": "CVE-2021-39685",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39685"
},
{
"name": "CVE-2020-26147",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26147"
},
{
"name": "CVE-2022-0435",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0435"
},
{
"name": "CVE-2021-3612",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3612"
},
{
"name": "CVE-2016-2854",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-2854"
},
{
"name": "CVE-2021-39698",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39698"
},
{
"name": "CVE-2022-0382",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0382"
},
{
"name": "CVE-2021-28714",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-28714"
},
{
"name": "CVE-2020-25670",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25670"
},
{
"name": "CVE-2021-42008",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42008"
},
{
"name": "CVE-2021-28972",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-28972"
},
{
"name": "CVE-2021-23134",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23134"
},
{
"name": "CVE-2021-32399",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32399"
},
{
"name": "CVE-2021-20292",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20292"
},
{
"name": "CVE-2019-19449",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19449"
},
{
"name": "CVE-2020-26555",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26555"
},
{
"name": "CVE-2021-28715",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-28715"
},
{
"name": "CVE-2021-33033",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33033"
},
{
"name": "CVE-2016-2853",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-2853"
},
{
"name": "CVE-2021-39648",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39648"
},
{
"name": "CVE-2021-4197",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4197"
},
{
"name": "CVE-2020-25673",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25673"
},
{
"name": "CVE-2022-23222",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23222"
},
{
"name": "CVE-2022-0742",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0742"
},
{
"name": "CVE-2021-43389",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-43389"
}
],
"initial_release_date": "2022-03-23T00:00:00",
"last_revision_date": "2022-03-23T00:00:00",
"links": [],
"reference": "CERTFR-2022-AVI-265",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2022-03-23T00:00:00.000000"
}
],
"risks": [
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Ex\u00e9cution de code arbitraire"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux de\nUbuntu. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer\nune ex\u00e9cution de code arbitraire, un d\u00e9ni de service et une atteinte \u00e0\nl\u0027int\u00e9grit\u00e9 des donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de Ubuntu",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 le noyau Linux de Ubuntu USN-5343-1 du 22 mars 2022",
"url": "https://ubuntu.com/security/notices/USN-5343-1"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 le noyau Linux de Ubuntu USN-5339-1 du 22 mars 2022",
"url": "https://ubuntu.com/security/notices/USN-5339-1"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 le noyau Linux de Ubuntu USN-5338-1 du 22 mars 2022",
"url": "https://ubuntu.com/security/notices/USN-5338-1"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 le noyau Linux de Ubuntu USN-5337-1 du 22 mars 2022",
"url": "https://ubuntu.com/security/notices/USN-5337-1"
}
]
}
CERTFR-2021-AVI-482
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans le noyau Linux de Debian LTS. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire, un déni de service et une atteinte à la confidentialité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | ||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Debian 9 Stretch versions ant\u00e9rieures \u00e0 4.19.194-1~deb9u1",
"product": {
"name": "N/A",
"vendor": {
"name": "Debian",
"scada": false
}
}
},
{
"description": "Debian 9 Stretch versions ant\u00e9rieures \u00e0 4.9.272-1",
"product": {
"name": "N/A",
"vendor": {
"name": "Debian",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2020-26139",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26139"
},
{
"name": "CVE-2021-29264",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29264"
},
{
"name": "CVE-2020-24587",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24587"
},
{
"name": "CVE-2021-33034",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33034"
},
{
"name": "CVE-2020-25672",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25672"
},
{
"name": "CVE-2021-30002",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30002"
},
{
"name": "CVE-2021-29154",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29154"
},
{
"name": "CVE-2021-3483",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3483"
},
{
"name": "CVE-2021-31916",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-31916"
},
{
"name": "CVE-2021-3587",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3587"
},
{
"name": "CVE-2021-3573",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3573"
},
{
"name": "CVE-2021-29647",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29647"
},
{
"name": "CVE-2020-24588",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24588"
},
{
"name": "CVE-2021-28971",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-28971"
},
{
"name": "CVE-2021-23133",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23133"
},
{
"name": "CVE-2021-3428",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3428"
},
{
"name": "CVE-2021-3506",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3506"
},
{
"name": "CVE-2020-24586",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24586"
},
{
"name": "CVE-2021-29265",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29265"
},
{
"name": "CVE-2021-0129",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0129"
},
{
"name": "CVE-2020-25671",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25671"
},
{
"name": "CVE-2021-28950",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-28950"
},
{
"name": "CVE-2021-29650",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29650"
},
{
"name": "CVE-2020-36322",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36322"
},
{
"name": "CVE-2020-29374",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-29374"
},
{
"name": "CVE-2021-3564",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3564"
},
{
"name": "CVE-2020-26558",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26558"
},
{
"name": "CVE-2021-28688",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-28688"
},
{
"name": "CVE-2020-26147",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26147"
},
{
"name": "CVE-2021-29155",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29155"
},
{
"name": "CVE-2020-25670",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25670"
},
{
"name": "CVE-2021-23134",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23134"
},
{
"name": "CVE-2021-32399",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32399"
},
{
"name": "CVE-2021-20292",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20292"
},
{
"name": "CVE-2021-28660",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-28660"
},
{
"name": "CVE-2021-28964",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-28964"
},
{
"name": "CVE-2021-31829",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-31829"
}
],
"initial_release_date": "2021-06-24T00:00:00",
"last_revision_date": "2021-06-24T00:00:00",
"links": [],
"reference": "CERTFR-2021-AVI-482",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2021-06-24T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux de\nDebian LTS. Certaines d\u0027entre elles permettent \u00e0 un attaquant de\nprovoquer une ex\u00e9cution de code arbitraire, un d\u00e9ni de service et une\natteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de Debian LTS",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Debian LTS dla-2689 du 22 juin 2021",
"url": "https://www.debian.org/lts/security/2021/dla-2689"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Debian LTS dla-2690 du 22 juin 2021",
"url": "https://www.debian.org/lts/security/2021/dla-2690"
}
]
}
gsd-2021-0129
Vulnerability from gsd
{
"GSD": {
"alias": "CVE-2021-0129",
"description": "Improper access control in BlueZ may allow an authenticated user to potentially enable information disclosure via adjacent access.",
"id": "GSD-2021-0129",
"references": [
"https://www.suse.com/security/cve/CVE-2021-0129.html",
"https://www.debian.org/security/2021/dsa-4951",
"https://access.redhat.com/errata/RHSA-2021:4356",
"https://access.redhat.com/errata/RHSA-2021:4140",
"https://ubuntu.com/security/CVE-2021-0129",
"https://linux.oracle.com/cve/CVE-2021-0129.html"
]
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2021-0129"
],
"details": "Improper access control in BlueZ may allow an authenticated user to potentially enable information disclosure via adjacent access.",
"id": "GSD-2021-0129",
"modified": "2023-12-13T01:23:07.094605Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "secure@intel.com",
"ID": "CVE-2021-0129",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "BlueZ",
"version": {
"version_data": [
{
"version_value": "See references"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Improper access control in BlueZ may allow an authenticated user to potentially enable information disclosure via adjacent access."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "information disclosure"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00517.html",
"refsource": "MISC",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00517.html"
},
{
"name": "[debian-lts-announce] 20210623 [SECURITY] [DLA 2689-1] linux security update",
"refsource": "MLIST",
"url": "https://lists.debian.org/debian-lts-announce/2021/06/msg00020.html"
},
{
"name": "[debian-lts-announce] 20210623 [SECURITY] [DLA 2690-1] linux-4.19 security update",
"refsource": "MLIST",
"url": "https://lists.debian.org/debian-lts-announce/2021/06/msg00019.html"
},
{
"name": "[debian-lts-announce] 20210626 [SECURITY] [DLA 2692-1] bluez security update",
"refsource": "MLIST",
"url": "https://lists.debian.org/debian-lts-announce/2021/06/msg00022.html"
},
{
"name": "https://security.netapp.com/advisory/ntap-20210716-0002/",
"refsource": "CONFIRM",
"url": "https://security.netapp.com/advisory/ntap-20210716-0002/"
},
{
"name": "DSA-4951",
"refsource": "DEBIAN",
"url": "https://www.debian.org/security/2021/dsa-4951"
},
{
"name": "GLSA-202209-16",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/202209-16"
}
]
}
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:bluez:bluez:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "5.57",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:5.13:rc1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "4.9.270",
"versionStartIncluding": "4.9",
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "4.19.192",
"versionStartIncluding": "4.19",
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "4.14.234",
"versionStartIncluding": "4.14",
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "5.10.40",
"versionStartIncluding": "5.10",
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "5.4.122",
"versionStartIncluding": "5.4",
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "5.12.7",
"versionStartIncluding": "5.12",
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "4.4.270",
"versionStartIncluding": "2.6.12",
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "secure@intel.com",
"ID": "CVE-2021-0129"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "Improper access control in BlueZ may allow an authenticated user to potentially enable information disclosure via adjacent access."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00517.html",
"refsource": "MISC",
"tags": [
"Vendor Advisory"
],
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00517.html"
},
{
"name": "[debian-lts-announce] 20210623 [SECURITY] [DLA 2690-1] linux-4.19 security update",
"refsource": "MLIST",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://lists.debian.org/debian-lts-announce/2021/06/msg00019.html"
},
{
"name": "[debian-lts-announce] 20210623 [SECURITY] [DLA 2689-1] linux security update",
"refsource": "MLIST",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://lists.debian.org/debian-lts-announce/2021/06/msg00020.html"
},
{
"name": "[debian-lts-announce] 20210626 [SECURITY] [DLA 2692-1] bluez security update",
"refsource": "MLIST",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://lists.debian.org/debian-lts-announce/2021/06/msg00022.html"
},
{
"name": "https://security.netapp.com/advisory/ntap-20210716-0002/",
"refsource": "CONFIRM",
"tags": [
"Third Party Advisory"
],
"url": "https://security.netapp.com/advisory/ntap-20210716-0002/"
},
{
"name": "DSA-4951",
"refsource": "DEBIAN",
"tags": [
"Third Party Advisory"
],
"url": "https://www.debian.org/security/2021/dsa-4951"
},
{
"name": "GLSA-202209-16",
"refsource": "GENTOO",
"tags": [
"Third Party Advisory"
],
"url": "https://security.gentoo.org/glsa/202209-16"
}
]
}
},
"impact": {
"baseMetricV2": {
"acInsufInfo": false,
"cvssV2": {
"accessComplexity": "LOW",
"accessVector": "ADJACENT_NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 2.7,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:A/AC:L/Au:S/C:P/I:N/A:N",
"version": "2.0"
},
"exploitabilityScore": 5.1,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "LOW",
"userInteractionRequired": false
},
"baseMetricV3": {
"cvssV3": {
"attackComplexity": "LOW",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.1,
"impactScore": 3.6
}
},
"lastModifiedDate": "2022-10-29T02:49Z",
"publishedDate": "2021-06-09T20:15Z"
}
}
}
ghsa-98mf-qrx3-4856
Vulnerability from github
Improper access control in BlueZ may allow an authenticated user to potentially enable information disclosure via adjacent access.
{
"affected": [],
"aliases": [
"CVE-2021-0129"
],
"database_specific": {
"cwe_ids": [
"CWE-863"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2021-06-09T20:15:00Z",
"severity": "MODERATE"
},
"details": "Improper access control in BlueZ may allow an authenticated user to potentially enable information disclosure via adjacent access.",
"id": "GHSA-98mf-qrx3-4856",
"modified": "2022-07-13T00:00:58Z",
"published": "2022-05-24T19:04:23Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-0129"
},
{
"type": "WEB",
"url": "https://lists.debian.org/debian-lts-announce/2021/06/msg00019.html"
},
{
"type": "WEB",
"url": "https://lists.debian.org/debian-lts-announce/2021/06/msg00020.html"
},
{
"type": "WEB",
"url": "https://lists.debian.org/debian-lts-announce/2021/06/msg00022.html"
},
{
"type": "WEB",
"url": "https://security.gentoo.org/glsa/202209-16"
},
{
"type": "WEB",
"url": "https://security.netapp.com/advisory/ntap-20210716-0002"
},
{
"type": "WEB",
"url": "https://www.debian.org/security/2021/dsa-4951"
},
{
"type": "WEB",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00517.html"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"type": "CVSS_V3"
}
]
}
fkie_cve-2021-0129
Vulnerability from fkie_nvd
| URL | Tags | ||
|---|---|---|---|
| secure@intel.com | https://lists.debian.org/debian-lts-announce/2021/06/msg00019.html | Mailing List, Third Party Advisory | |
| secure@intel.com | https://lists.debian.org/debian-lts-announce/2021/06/msg00020.html | Mailing List, Third Party Advisory | |
| secure@intel.com | https://lists.debian.org/debian-lts-announce/2021/06/msg00022.html | Mailing List, Third Party Advisory | |
| secure@intel.com | https://security.gentoo.org/glsa/202209-16 | Third Party Advisory | |
| secure@intel.com | https://security.netapp.com/advisory/ntap-20210716-0002/ | Third Party Advisory | |
| secure@intel.com | https://www.debian.org/security/2021/dsa-4951 | Third Party Advisory | |
| secure@intel.com | https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00517.html | Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://lists.debian.org/debian-lts-announce/2021/06/msg00019.html | Mailing List, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://lists.debian.org/debian-lts-announce/2021/06/msg00020.html | Mailing List, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://lists.debian.org/debian-lts-announce/2021/06/msg00022.html | Mailing List, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://security.gentoo.org/glsa/202209-16 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://security.netapp.com/advisory/ntap-20210716-0002/ | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://www.debian.org/security/2021/dsa-4951 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00517.html | Vendor Advisory |
| Vendor | Product | Version | |
|---|---|---|---|
| bluez | bluez | * | |
| linux | linux_kernel | * | |
| linux | linux_kernel | * | |
| linux | linux_kernel | * | |
| linux | linux_kernel | * | |
| linux | linux_kernel | * | |
| linux | linux_kernel | * | |
| linux | linux_kernel | * | |
| linux | linux_kernel | 5.13 | |
| redhat | enterprise_linux | 7.0 | |
| redhat | enterprise_linux | 8.0 | |
| debian | debian_linux | 9.0 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:bluez:bluez:*:*:*:*:*:*:*:*",
"matchCriteriaId": "EB5A8356-8D54-48BF-BB7C-399E792B08F6",
"versionEndExcluding": "5.57",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "A2E6872F-0224-4926-998D-21C18423039C",
"versionEndExcluding": "4.4.270",
"versionStartIncluding": "2.6.12",
"vulnerable": false
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "37CBDA9D-1990-4FE7-BBAE-74295AF17599",
"versionEndExcluding": "4.9.270",
"versionStartIncluding": "4.9",
"vulnerable": false
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "74E79EFE-C6F5-4D33-9025-36CC6916EF0A",
"versionEndExcluding": "4.14.234",
"versionStartIncluding": "4.14",
"vulnerable": false
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "44029CEE-959D-499F-8913-FED343DA6B65",
"versionEndExcluding": "4.19.192",
"versionStartIncluding": "4.19",
"vulnerable": false
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C3787113-B7B0-4615-85C5-DDAAE38C1F46",
"versionEndExcluding": "5.4.122",
"versionStartIncluding": "5.4",
"vulnerable": false
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "FAEFD181-62CD-41CD-BFE5-7BC337ADE1CA",
"versionEndExcluding": "5.10.40",
"versionStartIncluding": "5.10",
"vulnerable": false
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "13460FFE-8AA9-4F1C-963C-30982D8858D1",
"versionEndExcluding": "5.12.7",
"versionStartIncluding": "5.12",
"vulnerable": false
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:5.13:rc1:*:*:*:*:*:*",
"matchCriteriaId": "0CBAD0FC-C281-4666-AB2F-F8E6E1165DF7",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*",
"matchCriteriaId": "142AD0DD-4CF3-4D74-9442-459CE3347E3A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*",
"matchCriteriaId": "F4CFF558-3C47-480D-A2F0-BABF26042943",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper access control in BlueZ may allow an authenticated user to potentially enable information disclosure via adjacent access."
},
{
"lang": "es",
"value": "Un control de acceso inapropiado en BlueZ puede permitir a un usuario autenticado permitir potencialmente una divulgaci\u00f3n de informaci\u00f3n por medio de un acceso adyacente"
}
],
"id": "CVE-2021-0129",
"lastModified": "2024-11-21T05:42:01.513",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "LOW",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "ADJACENT_NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 2.7,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:A/AC:L/Au:S/C:P/I:N/A:N",
"version": "2.0"
},
"exploitabilityScore": 5.1,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.1,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2021-06-09T20:15:08.830",
"references": [
{
"source": "secure@intel.com",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://lists.debian.org/debian-lts-announce/2021/06/msg00019.html"
},
{
"source": "secure@intel.com",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://lists.debian.org/debian-lts-announce/2021/06/msg00020.html"
},
{
"source": "secure@intel.com",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://lists.debian.org/debian-lts-announce/2021/06/msg00022.html"
},
{
"source": "secure@intel.com",
"tags": [
"Third Party Advisory"
],
"url": "https://security.gentoo.org/glsa/202209-16"
},
{
"source": "secure@intel.com",
"tags": [
"Third Party Advisory"
],
"url": "https://security.netapp.com/advisory/ntap-20210716-0002/"
},
{
"source": "secure@intel.com",
"tags": [
"Third Party Advisory"
],
"url": "https://www.debian.org/security/2021/dsa-4951"
},
{
"source": "secure@intel.com",
"tags": [
"Vendor Advisory"
],
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00517.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://lists.debian.org/debian-lts-announce/2021/06/msg00019.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://lists.debian.org/debian-lts-announce/2021/06/msg00020.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://lists.debian.org/debian-lts-announce/2021/06/msg00022.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://security.gentoo.org/glsa/202209-16"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://security.netapp.com/advisory/ntap-20210716-0002/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://www.debian.org/security/2021/dsa-4951"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00517.html"
}
],
"sourceIdentifier": "secure@intel.com",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.